Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

March 6, 2026
  • News

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

  • News

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

  • News

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

  • News

Where Multi-Factor Authentication Stops and Credential Abuse Starts

  • News

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

March 5, 2026
  • News

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

NEWSMarch 6, 202608 mins

The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence (AI)-powered coding…

  • News

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

NEWSMarch 5, 2026026 mins

Some weeks in cybersecurity feel routine. This one doesn’t. Several new developments surfaced over the past few days, showing how…

  • News

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

NEWSMarch 5, 202604 mins

Most organizations assume encrypted data is safe. But many attackers are already preparing for a future where today’s encryption can…

  • News

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

NEWSMarch 5, 202607 mins

A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country’s…

  • News

Where Multi-Factor Authentication Stops and Credential Abuse Starts

NEWSMarch 5, 2026011 mins

Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows…

  • News

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

NEWSMarch 5, 202607 mins

Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented…

  • News

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

NEWSMarch 4, 2026011 mins

Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed…

  • News

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

NEWSMarch 4, 202605 mins

Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform…

  • News

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

NEWSMarch 4, 202608 mins

Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to…

  • News

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

NEWSMarch 3, 202608 mins

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support…

  • 1
  • 2
  • 3
  • …
  • 50

Recent Posts

  • Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
  • ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
  • Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
  • Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
  • Where Multi-Factor Authentication Stops and Credential Abuse Starts

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
View all

You May Have Missed

  • News

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution

NEWS January 28, 2026
  • News

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

NEWS October 1, 2025
  • News

Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer

NEWS October 3, 2025
  • News

Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks

NEWS December 11, 2025
  • News

Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

NEWS December 9, 2025
  • News

ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories

NEWS December 4, 2025
  • News

SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers

NEWS September 18, 2025
  • News

New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP

NEWS August 11, 2025
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}