HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root
Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEV
First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

Cybersecurity researchers have discovered a novel attack technique called TokenBreak that can be used to bypass a large…
June 12, 2025
  • Data Breaches

Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction

A novel attack technique named EchoLeak has been characterized as a “zero-click” artificial intelligence (AI) vulnerability that allows…
June 12, 2025
  • Data Breaches

Non-Human Identities: How to Address the Expanding Security Risk

Human identities management and control is pretty well done with its set of dedicated tools, frameworks, and best…
June 12, 2025
  • Data Breaches

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

ConnectWise has disclosed that it’s planning to rotate the digital code signing certificates used to sign ScreenConnect, ConnectWise…
June 12, 2025
  • Data Breaches

Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

Cybersecurity researchers have uncovered a new account takeover (ATO) campaign that leverages an open-source penetration testing framework called…
June 12, 2025
  • Data Breaches

Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

Former members tied to the Black Basta ransomware operation have been observed sticking to their tried-and-tested approach of…
June 11, 2025
  • Data Breaches

Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps

Adobe on Tuesday pushed security updates to address a total of 254 security flaws impacting its software products,…
June 10, 2025
  • Data Breaches

Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

Cybersecurity researchers have uncovered over 20 configuration-related risks affecting Salesforce Industry Cloud (aka Salesforce Industries), exposing sensitive data…
June 10, 2025
  • Data Breaches

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

The financially motivated threat actor known as FIN6 has been observed leveraging fake resumes hosted on Amazon Web…
June 10, 2025
  • Data Breaches

Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users

Cybersecurity researchers have shed light on a previously undocumented Rust-based information stealer called Myth Stealer that’s being propagated…
June 10, 2025

Posts pagination

Previous 1 … 84 85 86 … 111 Next
Featured Posts
  • LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root

    May 23, 2026
  • Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEV

    May 23, 2026
  • First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups

    May 22, 2026
  • Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware

    May 22, 2026
  • Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows

    May 22, 2026
Recent Posts
  • CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV

  • Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,100)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0