HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released
Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging
Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management…
December 16, 2025
  • Data Breaches

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

Cybersecurity researchers have discovered a new malicious NuGet package that typosquats and impersonates the popular .NET tracing library…
December 16, 2025
  • Data Breaches

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

Amazon’s threat intelligence team has disclosed details of a “years-long” Russian state-sponsored campaign that targeted Western critical infrastructure…
December 16, 2025
  • Data Breaches

Why Data Security and Privacy Need to Start in Code

AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now…
December 16, 2025
  • Data Breaches

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor…
December 16, 2025
  • Data Breaches

Google to Shut Down Dark Web Monitoring Tool in February 2026

Google has announced that it’s discontinuing its dark web report tool in February 2026, less than two years…
December 16, 2025
  • Data Breaches

Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

A Google Chrome extension with a “Featured” badge and six million users has been observed silently gathering every…
December 15, 2025
  • Data Breaches

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE

Multiple security vulnerabilities have been disclosed in the open-source private branch exchange (PBX) platform FreePBX, including a critical…
December 15, 2025
  • Data Breaches

⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More

If you use a smartphone, browse the web, or unzip files on your computer, you are in the…
December 15, 2025
  • Data Breaches

Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector

Cybersecurity researchers have disclosed details of an active phishing campaign that’s targeting a wide range of sectors in…
December 15, 2025

Posts pagination

Previous 1 … 7 8 9 … 91 Next
Featured Posts
  • New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released

    February 16, 2026
  • Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging

    February 15, 2026
  • Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

    February 13, 2026
  • Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

    February 13, 2026
  • UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

    February 13, 2026
Recent Posts
  • Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

  • npm’s Update to Harden Their Supply Chain, and Points to Consider

Categories
  • Cyber Attacks (5)
  • Data Breaches (899)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0