HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root
Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEV
First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues

Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing…
June 3, 2025
  • Data Breaches

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

Cybersecurity researchers have discovered a new cryptojacking campaign that’s targeting publicly accessible DevOps web servers such as those…
June 2, 2025
  • Data Breaches

Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN

Three security vulnerabilities have been disclosed in preloaded Android applications on smartphones from Ulefone and Krüger&Matz that could…
June 2, 2025
  • Data Breaches

Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU

Qualcomm has shipped security updates to address three zero-day vulnerabilities that it said have been exploited in limited,…
June 2, 2025
  • Data Breaches

⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

If this had been a security drill, someone would’ve said it went too far. But it wasn’t a…
June 2, 2025
  • Data Breaches

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers…
June 2, 2025
  • Data Breaches

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu, Red…
May 31, 2025
  • Data Breaches

U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered services…
May 31, 2025
  • Data Breaches

New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data

A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social…
May 30, 2025
  • Data Breaches

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver has…
May 30, 2025

Posts pagination

Previous 1 … 87 88 89 … 111 Next
Featured Posts
  • LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root

    May 23, 2026
  • Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEV

    May 23, 2026
  • First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups

    May 22, 2026
  • Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware

    May 22, 2026
  • Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows

    May 22, 2026
Recent Posts
  • CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV

  • Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,100)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0