HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks
Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware
Claude Mythos AI Finds 10,000 High-Severity Flaws in Widely Used Software
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild

A recently disclosed maximum-severity security flaw impacting the Wing FTP Server has come under active exploitation in the…
July 11, 2025
  • Data Breaches

Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals

An Iranian-backed ransomware-as-a-service (RaaS) named Pay2Key has resurfaced in the wake of the Israel-Iran-U.S. conflict last month, offering…
July 11, 2025
  • Data Breaches

CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Citrix NetScaler…
July 11, 2025
  • Data Breaches

Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods

The U.K. National Crime Agency (NCA) on Thursday announced that four people have been arrested in connection with…
July 10, 2025
  • Data Breaches

What Security Leaders Need to Know About AI Governance for SaaS

Generative AI is not arriving with a bang, it’s slowly creeping into the software that companies already use…
July 10, 2025
  • Data Breaches

New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

Cybersecurity researchers have discovered new artifacts associated with an Apple macOS malware called ZuRu, which is known to…
July 10, 2025
  • Data Breaches

AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs

Semiconductor company AMD is warning of a new set of vulnerabilities affecting a broad range of chipsets that…
July 10, 2025
  • Data Breaches

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs

A high-severity security flaw has been disclosed in ServiceNow’s platform that, if successfully exploited, could result in data…
July 10, 2025
  • Data Breaches

DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware

A threat actor with suspected ties to India has been observed targeting a European foreign affairs ministry with…
July 9, 2025
  • Data Breaches

U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Tuesday sanctioned a member of…
July 9, 2025

Posts pagination

Previous 1 … 74 75 76 … 112 Next
Featured Posts
  • npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks

    May 23, 2026
  • Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware

    May 23, 2026
  • Claude Mythos AI Finds 10,000 High-Severity Flaws in Widely Used Software

    May 23, 2026
  • Laravel-Lang PHP Packages Compromised to Deliver Cross-Platform Credential Stealer

    May 23, 2026
  • LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root

    May 23, 2026
Recent Posts
  • Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEV

  • First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,104)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0