HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices
First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix…
May 23, 2025
  • Data Breaches

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge devices…
May 23, 2025
  • Data Breaches

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

As part of the latest “season” of Operation Endgame, a coalition of law enforcement agencies have taken down…
May 23, 2025
  • Data Breaches

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

From zero-day exploits to large-scale bot attacks — the demand for a powerful, self-hosted, and user-friendly web application…
May 23, 2025
  • Data Breaches

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with DanaBot…
May 23, 2025
  • Data Breaches

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation of a now-patched remote-code-execution vulnerability…
May 22, 2025
  • Data Breaches

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

A privilege escalation flaw has been demonstrated in Windows Server 2025 that makes it possible for attackers to…
May 22, 2025
  • Data Breaches

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software has been exploited by…
May 22, 2025
  • Data Breaches

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

It’s not enough to be secure. In today’s legal climate, you need to prove it. Whether you’re protecting…
May 22, 2025
  • Data Breaches

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

For many organizations, identity security appears to be under control. On paper, everything checks out. But new research…
May 22, 2025

Posts pagination

Previous 1 … 69 70 71 … 90 Next
Featured Posts
  • Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

    February 12, 2026
  • First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

    February 11, 2026
  • APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

    February 11, 2026
  • Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

    February 11, 2026
  • Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

    February 11, 2026
Recent Posts
  • North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

  • DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

Categories
  • Cyber Attacks (5)
  • Data Breaches (887)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0