HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices
First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign

Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub…
June 18, 2025
  • Data Breaches

Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

A former U.S. Central Intelligence Agency (CIA) analyst has been sentenced to little more than three years in…
June 18, 2025
  • Data Breaches

CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed a security flaw impacting the Linux kernel…
June 18, 2025
  • Data Breaches

Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

Veeam has rolled out patches to contain a critical security flaw impacting its Backup & Replication software that…
June 18, 2025
  • Data Breaches

Are Forgotten AD Service Accounts Leaving You at Risk?

For many organizations, Active Directory (AD) service accounts are quiet afterthoughts, persisting in the background long after their…
June 17, 2025
  • Data Breaches

Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments

Cybersecurity researchers have disclosed three security flaws in the popular Sitecore Experience Platform (XP) that could be chained…
June 17, 2025
  • Data Breaches

Backups Are Under Attack: How to Protect Your Backups

Ransomware has become a highly coordinated and pervasive threat, and traditional defenses are increasingly struggling to neutralize it.…
June 17, 2025
  • Data Breaches

New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks

Cybersecurity researchers have called attention to a new campaign that’s actively exploiting a recently disclosed critical security flaw…
June 17, 2025
  • Data Breaches

TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a high-severity security flaw in TP-Link wireless…
June 17, 2025
  • Data Breaches

⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More

Some of the biggest security problems start quietly. No alerts. No warnings. Just small actions that seem normal…
June 16, 2025

Posts pagination

Previous 1 … 61 62 63 … 90 Next
Featured Posts
  • Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

    February 12, 2026
  • First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

    February 11, 2026
  • APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

    February 11, 2026
  • Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

    February 11, 2026
  • Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

    February 11, 2026
Recent Posts
  • North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

  • DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

Categories
  • Cyber Attacks (5)
  • Data Breaches (887)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0