HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes

A fresh set of 60 malicious packages has been uncovered targeting the RubyGems ecosystem by posing as seemingly…
August 8, 2025
  • Data Breaches

GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions

A newly discovered campaign dubbed GreedyBear has leveraged over 150 malicious extensions to the Firefox marketplace that are…
August 8, 2025
  • Data Breaches

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

The threat actors behind the SocGholish malware have been observed leveraging Traffic Distribution Systems (TDSs) like Parrot TDS…
August 7, 2025
  • Data Breaches

Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need

Python is everywhere in modern software. From machine learning models to production microservices, chances are your code—and your…
August 7, 2025
  • Data Breaches

Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes

Cybersecurity researchers have discovered a set of 11 malicious Go packages that are designed to download additional payloads…
August 7, 2025
  • Data Breaches

The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense

Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence (AI)…
August 7, 2025
  • Data Breaches

Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

Microsoft has released an advisory for a high-severity security flaw affecting on-premise versions of Exchange Server that could…
August 7, 2025
  • Data Breaches

6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits

Cybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis Communications that, if successfully exploited,…
August 7, 2025
  • Data Breaches

SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day

SonicWall has revealed that the recent spike in activity targeting its Gen 7 and newer firewalls with SSL…
August 7, 2025
  • Data Breaches

AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals

As the volume and sophistication of cyber threats and risks grow, cybersecurity has become mission-critical for businesses of…
August 6, 2025

Posts pagination

Previous 1 … 59 60 61 … 108 Next
Featured Posts
  • Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

    March 28, 2026
  • TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

    March 28, 2026
  • CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

    March 28, 2026
  • Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

    March 27, 2026
  • TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

    March 27, 2026
Recent Posts
  • We Are At War

  • Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,064)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0