HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV
Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access
Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

The North Korea-linked threat actor known as Konni APT has been attributed to a phishing campaign targeting government…
May 13, 2025
  • Data Breaches

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

Moldovan law enforcement authorities have arrested a 45-year-old foreign man suspected of involvement in a series of ransomware…
May 13, 2025
  • Data Breaches

ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files

ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could enable…
May 12, 2025
  • Data Breaches

⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams

What do a source code editor, a smart billboard, and a web server have in common? They’ve all…
May 12, 2025
  • Data Breaches

The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That

Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the equation—is…
May 12, 2025
  • Data Breaches

Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures

Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a lure to entice users into…
May 12, 2025
  • Data Breaches

Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection

Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits that…
May 10, 2025
  • Data Breaches

Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data

Germany’s Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown linked to…
May 10, 2025
  • Data Breaches

BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation

A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that’s…
May 9, 2025
  • Data Breaches

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a…
May 9, 2025

Posts pagination

Previous 1 … 94 95 96 … 111 Next
Featured Posts
  • CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV

    May 22, 2026
  • Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access

    May 22, 2026
  • Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor

    May 21, 2026
  • ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

    May 21, 2026
  • Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

    May 21, 2026
Recent Posts
  • China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

  • Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,095)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0