Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

January 14, 2026
  • News

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

  • News

New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

  • News

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

  • News

ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

  • News

What Should We Learn From How Attackers Leveraged AI in 2025?

January 13, 2026
  • News

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

NEWSJanuary 14, 202608 mins

The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated…

  • News

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

NEWSJanuary 14, 202609 mins

Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary…

  • News

New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

NEWSJanuary 14, 2026011 mins

Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from…

  • News

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

NEWSJanuary 13, 202606 mins

Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that’s capable of stealing API keys associated with MEXC,…

  • News

ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

NEWSJanuary 13, 202603 mins

ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow AI Platform that could enable an unauthenticated…

  • News

What Should We Learn From How Attackers Leveraged AI in 2025?

NEWSJanuary 13, 202606 mins

Old Playbook, New Scale: While defenders are chasing trends, attackers are optimizing the basics The security industry loves talking about…

  • News

⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & More

NEWSJanuary 12, 2026037 mins

This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned…

  • News

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

NEWSJanuary 10, 202603 mins

The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom…

  • News

Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime

NEWSJanuary 10, 202603 mins

Europol on Friday announced the arrest of 34 individuals in Spain who are alleged to be part of an international…

  • News

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions

NEWSJanuary 9, 202603 mins

Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including…

  • 1
  • 2
  • 3
  • …
  • 39

Recent Posts

  • Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
  • New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
  • Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
  • ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

Recent Comments

No comments to show.

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
View all

You May Have Missed

  • News

U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions

NEWS August 15, 2025
  • News

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

NEWS November 19, 2025
  • News

New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station

NEWS August 26, 2025
  • News

RaccoonO365 Phishing Network Dismantled as Microsoft, Cloudflare Take Down 338 Domains

NEWS September 17, 2025
  • News

Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet

NEWS November 18, 2025
  • News

Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets

NEWS December 1, 2025
  • News

Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data

NEWS December 9, 2025
  • News

New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP

NEWS August 11, 2025
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}