Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

March 24, 2026
  • News

5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

  • News

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

  • News

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

  • News

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

  • News

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

March 21, 2026
  • News

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

NEWSMarch 24, 202606 mins

An ongoing phishing campaign is targeting French-speaking corporate environments with fake resumes that lead to the deployment of cryptocurrency miners…

  • News

5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

NEWSMarch 24, 2026021 mins

On February 25, 2026, Gartner published its inaugural Market Guide for Guardian Agents, marking an important milestone for this emerging…

  • News

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

NEWSMarch 24, 202609 mins

Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive…

  • News

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

NEWSMarch 23, 202606 mins

Cybersecurity researchers have uncovered malicious artifacts distributed via Docker Hub following the Trivy supply chain attack, highlighting the widening blast…

  • News

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

NEWSMarch 23, 202603 mins

Threat actors are suspected to be exploiting a maximum-severity security flaw impacting Quest KACE Systems Management Appliance (SMA), according to…

  • News

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

NEWSMarch 21, 202607 mins

Threat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications (CMAs) like WhatsApp and…

  • News

Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

NEWSMarch 21, 202608 mins

The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks…

  • News

CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

NEWSMarch 21, 202606 mins

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws impacting Apple, Craft CMS, and Laravel…

  • News

Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

NEWSMarch 21, 202608 mins

The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks…

  • News

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

NEWSMarch 20, 202609 mins

Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and…

  • 1
  • 2
  • 3
  • …
  • 54

Recent Posts

  • Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner
  • 5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents
  • Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
  • Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper
  • Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
View all

You May Have Missed

  • News

5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

NEWS March 24, 2026
  • News

DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide

NEWS December 31, 2025
  • News

Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

NEWS February 17, 2026
  • News

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

NEWS October 22, 2025
  • News

Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks

NEWS January 29, 2026
  • News

Your Digital Footprint Can Lead Right to Your Front Door

NEWS January 16, 2026
  • News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

NEWS December 2, 2025
  • News

⚡ Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More

NEWS September 29, 2025
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}