HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Entra ID Data Protection: Essential or Overkill?

Microsoft Entra ID (formerly Azure Active Directory) is the backbone of modern identity management, enabling secure access to…
May 6, 2025
  • Data Breaches

Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi

Cybersecurity researchers have disclosed a series of now-patched security vulnerabilities in Apple’s AirPlay protocol that, if successfully exploited,…
May 5, 2025
  • Data Breaches

Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a maximum-severity security flaw impacting Commvault Command Center…
May 5, 2025
  • Data Breaches

⚡ Weekly Recap: Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors

What if attackers aren’t breaking in—they’re already inside, watching, and adapting? This week showed a sharp rise in…
May 5, 2025
  • Data Breaches

Perfection is a Myth. Leverage Isn’t: How Small Teams Can Secure Their Google Workspace

Let’s be honest: if you’re one of the first (or the first) security hires at a small or…
May 5, 2025
  • Data Breaches

Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data

The threat actors known as Golden Chickens have been attributed to two new malware families dubbed TerraStealerV2 and…
May 5, 2025
  • Data Breaches

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that can…
May 3, 2025
  • Data Breaches

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware

An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion aimed at a critical national…
May 3, 2025
  • Data Breaches

U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying…
May 3, 2025
  • Data Breaches

TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China

Ireland’s Data Protection Commission (DPC) on Friday fined popular video-sharing platform TikTok €530 million ($601 million) for infringing…
May 2, 2025

Posts pagination

Previous 1 … 96 97 98 … 110 Next
Featured Posts
  • UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

    April 3, 2026
  • Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture

    April 3, 2026
  • New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

    April 3, 2026
  • Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

    April 3, 2026
  • Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

    April 2, 2026
Recent Posts
  • Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

  • The State of Trusted Open Source Report

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,088)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0