HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices
First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the…
May 15, 2025
  • Data Breaches

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for…
May 15, 2025
  • Data Breaches

Pen Testing for Compliance Only? It’s Time to Change Your Approach

Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In…
May 15, 2025
  • Data Breaches

New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

Google on Wednesday released updates to address four security issues in its Chrome web browser, including one for…
May 15, 2025
  • Data Breaches

5 BCDR Essentials for Effective Ransomware Defense

Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any…
May 15, 2025
  • Data Breaches

Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit

Samsung has released software updates to address a critical security flaw in MagicINFO 9 Server that has been…
May 14, 2025
  • Data Breaches

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security…
May 14, 2025
  • Data Breaches

Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering

A Chinese-language, Telegram-based marketplace called Xinbi Guarantee has facilitated no less than $8.4 billion in transactions since 2022,…
May 14, 2025
  • Data Breaches

CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users

A new global phishing threat called “Meta Mirage” has been uncovered, targeting businesses using Meta’s Business Suite. This…
May 14, 2025
  • Data Breaches

Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns

A cyber espionage group known as Earth Ammit has been linked to two related but distinct campaigns from…
May 14, 2025

Posts pagination

Previous 1 … 72 73 74 … 90 Next
Featured Posts
  • Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

    February 12, 2026
  • First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

    February 11, 2026
  • APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

    February 11, 2026
  • Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

    February 11, 2026
  • Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

    February 11, 2026
Recent Posts
  • North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

  • DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

Categories
  • Cyber Attacks (5)
  • Data Breaches (887)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0