HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

Multiple threat activity clusters with ties to North Korea (aka Democratic People’s Republic of Korea or DPRK) have…
April 23, 2025
  • Data Breaches

Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign

The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part…
April 23, 2025
  • Data Breaches

Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices

Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes…
April 23, 2025
  • Data Breaches

Three Reasons Why the Browser is Best for Stopping Phishing Attacks

Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques…
April 23, 2025
  • Data Breaches

Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp

Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights…
April 23, 2025
  • Data Breaches

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a previously undocumented technique to mine…
April 22, 2025
  • Data Breaches

GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker…
April 22, 2025
  • Data Breaches

5 Major Concerns With Employees Using The Browser

As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However,…
April 22, 2025
  • Data Breaches

Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

In what has been described as an “extremely sophisticated phishing attack,” threat actors have leveraged an uncommon approach…
April 22, 2025
  • Data Breaches

Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach

Microsoft on Monday announced that it has moved the Microsoft Account (MSA) signing service to Azure confidential virtual…
April 22, 2025

Posts pagination

Previous 1 … 80 81 82 … 89 Next
Featured Posts
  • North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

    February 11, 2026
  • DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

    February 10, 2026
  • Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

    February 10, 2026
  • From Ransomware to Residency: Inside the Rise of the Digital Parasite

    February 10, 2026
  • Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

    February 10, 2026
Recent Posts
  • China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

  • SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

Categories
  • Cyber Attacks (5)
  • Data Breaches (882)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0