HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data

Germany’s Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown linked to…
May 10, 2025
  • Data Breaches

BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation

A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that’s…
May 9, 2025
  • Data Breaches

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a…
May 9, 2025
  • Data Breaches

Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials

Cybersecurity researchers are warning of a new campaign that’s targeting Portuguese-speaking users in Brazil with trial versions of…
May 9, 2025
  • Data Breaches

Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business

AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user…
May 9, 2025
  • Data Breaches

Beyond Vulnerability Management – Can You CVE What I CVE?

The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security…
May 9, 2025
  • Data Breaches

38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases

Cybersecurity researchers have exposed what they say is an “industrial-scale, global cryptocurrency phishing operation” engineered to steal digital…
May 8, 2025
  • Data Breaches

Security Tools Alone Don’t Protect You — Control Effectiveness Does

61% of security leaders reported suffering a breach due to failed or misconfigured controls over the past 12…
May 8, 2025
  • Data Breaches

SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

SonicWall has released patches to address three security flaws affecting SMA 100 Secure Mobile Access (SMA) appliances that…
May 8, 2025
  • Data Breaches

Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures

Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a…
May 8, 2025

Posts pagination

Previous 1 … 94 95 96 … 110 Next
Featured Posts
  • UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

    April 3, 2026
  • Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture

    April 3, 2026
  • New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

    April 3, 2026
  • Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

    April 3, 2026
  • Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

    April 2, 2026
Recent Posts
  • Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

  • The State of Trusted Open Source Report

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,088)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0