HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory
Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code
China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds

Everybody knows browser extensions are embedded into nearly every user’s daily workflow, from spell checkers to GenAI tools.…
April 15, 2025
  • Data Breaches

Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect Orders

Cybersecurity researchers have disclosed a malicious package uploaded to the Python Package Index (PyPI) repository that’s designed to…
April 15, 2025
  • Data Breaches

Crypto Developers Targeted by Python Malware Disguised as Coding Challenges

The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has been…
April 15, 2025
  • Data Breaches

ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading

Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks…
April 14, 2025
  • Data Breaches

Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that the stolen…
April 14, 2025
  • Data Breaches

⚡ Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More

Attackers aren’t waiting for patches anymore — they are breaking in before defenses are ready. Trusted security tools…
April 14, 2025
  • Data Breaches

Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind

AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate reconnaissance, generate…
April 14, 2025
  • Data Breaches

Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT

A threat actor with ties to Pakistan has been observed targeting various sectors in India with various remote…
April 14, 2025
  • Data Breaches

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices…
April 11, 2025
  • Data Breaches

Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors

The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant…
April 11, 2025

Posts pagination

Previous 1 … 82 83 84 … 88 Next
Featured Posts
  • New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

    December 27, 2025
  • Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

    December 26, 2025
  • China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

    December 26, 2025
  • Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

    December 26, 2025
  • ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

    December 25, 2025
Recent Posts
  • LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

  • Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

Categories
  • Cyber Attacks (5)
  • Data Breaches (867)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0