HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks
Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware
Claude Mythos AI Finds 10,000 High-Severity Flaws in Widely Used Software
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of…
July 15, 2025
  • Data Breaches

The Unusual Suspect: Git Repos

While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking…
July 14, 2025
  • Data Breaches

⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More

In cybersecurity, precision matters—and there’s little room for error. A small mistake, missed setting, or quiet misconfiguration can…
July 14, 2025
  • Data Breaches

CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center

India’s Central Bureau of Investigation (CBI) has announced that it has taken steps to dismantle what it said…
July 14, 2025
  • Data Breaches

eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

Cybersecurity researchers have discovered a new hacking technique that exploits weaknesses in the eSIM technology used in modern…
July 14, 2025
  • Data Breaches

GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs

NVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant of…
July 12, 2025
  • Data Breaches

Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub

Cybersecurity researchers have discovered a serious security issue that allows leaked Laravel APP_KEYs to be weaponized to gain…
July 12, 2025
  • Data Breaches

Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)

Fortinet has released fixes for a critical security flaw impacting FortiWeb that could enable an unauthenticated attacker to…
July 11, 2025
  • Data Breaches

PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution

Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy’s BlueSDK Bluetooth stack that, if successfully…
July 11, 2025
  • Data Breaches

Securing Data in the AI Era

The 2025 Data Risk Report: Enterprises face potentially serious data loss risks from AI-fueled tools. Adopting a unified,…
July 11, 2025

Posts pagination

Previous 1 … 73 74 75 … 112 Next
Featured Posts
  • npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks

    May 23, 2026
  • Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware

    May 23, 2026
  • Claude Mythos AI Finds 10,000 High-Severity Flaws in Widely Used Software

    May 23, 2026
  • Laravel-Lang PHP Packages Compromised to Deliver Cross-Platform Credential Stealer

    May 23, 2026
  • LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root

    May 23, 2026
Recent Posts
  • Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEV

  • First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,104)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0