HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV
Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access
Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers

Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a…
May 1, 2025
  • Data Breaches

Why top SOC teams are shifting to Network Detection and Response

Security Operations Center (SOC) teams are facing a fundamentally new challenge — traditional cybersecurity tools are failing to…
May 1, 2025
  • Data Breaches

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for an “influence-as-a-service”…
May 1, 2025
  • Data Breaches

New Research Reveals: 95% of AppSec Fixes Don’t Reduce Risk

For over a decade, application security teams have faced a brutal irony: the more advanced the detection tools…
May 1, 2025
  • Data Breaches

DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics

Russian companies have been targeted as part of a large-scale phishing campaign that’s designed to deliver a known…
May 1, 2025
  • Data Breaches

Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found…
April 30, 2025
  • Data Breaches

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore. Today’s attackers don’t…
April 30, 2025
  • Data Breaches

Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called…
April 30, 2025
  • Data Breaches

Customer Account Takeovers: The Multi-Billion Dollar Problem You Don’t Know About

Everyone has cybersecurity stories involving family members. Here’s a relatively common one. The conversation usually goes something like…
April 30, 2025
  • Data Breaches

Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks

Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous Mantis that has deployed a…
April 30, 2025

Posts pagination

Previous 1 … 98 99 100 … 111 Next
Featured Posts
  • CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV

    May 22, 2026
  • Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access

    May 22, 2026
  • Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor

    May 21, 2026
  • ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

    May 21, 2026
  • Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

    May 21, 2026
Recent Posts
  • China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

  • Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,095)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0