HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory
Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code
China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

How to Automate CVE and Vulnerability Advisory Response with Tines

Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared…
May 2, 2025
  • Data Breaches

MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks

The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver.…
May 2, 2025
  • Data Breaches

Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support

A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change…
May 2, 2025
  • Data Breaches

Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers

Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a…
May 1, 2025
  • Data Breaches

Why top SOC teams are shifting to Network Detection and Response

Security Operations Center (SOC) teams are facing a fundamentally new challenge — traditional cybersecurity tools are failing to…
May 1, 2025
  • Data Breaches

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for an “influence-as-a-service”…
May 1, 2025
  • Data Breaches

New Research Reveals: 95% of AppSec Fixes Don’t Reduce Risk

For over a decade, application security teams have faced a brutal irony: the more advanced the detection tools…
May 1, 2025
  • Data Breaches

DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics

Russian companies have been targeted as part of a large-scale phishing campaign that’s designed to deliver a known…
May 1, 2025
  • Data Breaches

Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found…
April 30, 2025
  • Data Breaches

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore. Today’s attackers don’t…
April 30, 2025

Posts pagination

Previous 1 … 75 76 77 … 88 Next
Featured Posts
  • New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

    December 27, 2025
  • Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

    December 26, 2025
  • China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

    December 26, 2025
  • Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

    December 26, 2025
  • ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

    December 25, 2025
Recent Posts
  • LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

  • Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

Categories
  • Cyber Attacks (5)
  • Data Breaches (867)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0