HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for an “influence-as-a-service”…
May 1, 2025
  • Data Breaches

New Research Reveals: 95% of AppSec Fixes Don’t Reduce Risk

For over a decade, application security teams have faced a brutal irony: the more advanced the detection tools…
May 1, 2025
  • Data Breaches

DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics

Russian companies have been targeted as part of a large-scale phishing campaign that’s designed to deliver a known…
May 1, 2025
  • Data Breaches

Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found…
April 30, 2025
  • Data Breaches

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore. Today’s attackers don’t…
April 30, 2025
  • Data Breaches

Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called…
April 30, 2025
  • Data Breaches

Customer Account Takeovers: The Multi-Billion Dollar Problem You Don’t Know About

Everyone has cybersecurity stories involving family members. Here’s a relatively common one. The conversation usually goes something like…
April 30, 2025
  • Data Breaches

Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks

Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous Mantis that has deployed a…
April 30, 2025
  • Data Breaches

WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy

Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence (AI)…
April 29, 2025
  • Data Breaches

New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems

Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak attacks that make…
April 29, 2025

Posts pagination

Previous 1 … 77 78 79 … 89 Next
Featured Posts
  • North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

    February 11, 2026
  • DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

    February 10, 2026
  • Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

    February 10, 2026
  • From Ransomware to Residency: Inside the Rise of the Digital Parasite

    February 10, 2026
  • Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

    February 10, 2026
Recent Posts
  • China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

  • SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

Categories
  • Cyber Attacks (5)
  • Data Breaches (882)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0