HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory
Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code
China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies…
May 21, 2025
  • Data Breaches

PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms

Russian organizations have become the target of a phishing campaign that distributes malware called PureRAT, according to new…
May 21, 2025
  • Data Breaches

Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims

Counterfeit Facebook pages and sponsored ads on the social media platform are being employed to direct users to…
May 21, 2025
  • Data Breaches

Securing CI/CD workflows with Wazuh

Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to…
May 21, 2025
  • Data Breaches

How to Detect Phishing Attacks Faster: Tycoon2FA Example

It takes just one email to compromise an entire system. A single well-crafted message can bypass filters, trick…
May 21, 2025
  • Data Breaches

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery

A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including…
May 20, 2025
  • Data Breaches

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads

An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that…
May 20, 2025
  • Data Breaches

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could…
May 20, 2025
  • Data Breaches

The Crowded Battle: Key Insights from the 2025 State of Pentesting Report

In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISOs from global enterprises (200 from…
May 20, 2025
  • Data Breaches

South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware

High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the target of a new campaign…
May 20, 2025

Posts pagination

Previous 1 … 68 69 70 … 88 Next
Featured Posts
  • New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

    December 27, 2025
  • Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

    December 26, 2025
  • China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

    December 26, 2025
  • Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

    December 26, 2025
  • ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

    December 25, 2025
Recent Posts
  • LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

  • Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

Categories
  • Cyber Attacks (5)
  • Data Breaches (867)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0