HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
The State of Trusted Open Source Report
WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

The threat actor known as Bitter has been assessed to be a state-backed hacking group that’s tasked with…
June 5, 2025
  • Data Breaches

Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation

Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large…
June 5, 2025
  • Data Breaches

Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware

An Iran-aligned hacking group has been attributed to a new set of cyber attacks targeting Kurdish and Iraqi…
June 5, 2025
  • Data Breaches

DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown

The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of cryptocurrency funds and about 145 clearnet…
June 5, 2025
  • Data Breaches

Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

Google has disclosed details of a financially motivated threat cluster that it said “specialises” in voice phishing (aka…
June 4, 2025
  • Data Breaches

Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads

Threat hunters are calling attention to a new variant of a remote access trojan (RAT) called Chaos RAT…
June 4, 2025
  • Data Breaches

Your SaaS Data Isn’t Safe: Why Traditional DLP Solutions Fail in the Browser Era

Traditional data leakage prevention (DLP) tools aren’t keeping pace with the realities of how modern businesses use SaaS…
June 4, 2025
  • Data Breaches

Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks

Several malicious packages have been uncovered across the npm, Python, and Ruby package repositories that drain funds from…
June 4, 2025
  • Data Breaches

HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass

Hewlett Packard Enterprise (HPE) has released security updates to address as many as eight vulnerabilities in its StoreOnce…
June 4, 2025
  • Data Breaches

Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing…
June 3, 2025

Posts pagination

Previous 1 … 84 85 86 … 110 Next
Featured Posts
  • Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

    April 2, 2026
  • The State of Trusted Open Source Report

    April 2, 2026
  • WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

    April 2, 2026
  • Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

    April 2, 2026
  • CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

    April 1, 2026
Recent Posts
  • 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

  • Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,083)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0