Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers

February 16, 2026
  • News

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

  • News

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

  • News

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

  • News

The CTEM Divide: Why 84% of Security Programs Are Falling Behind

  • News

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

February 10, 2026
  • News

Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers

NEWSFebruary 16, 202608 mins

A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery…

  • News

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

NEWSFebruary 16, 202607 mins

Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim’s OpenClaw (formerly Clawdbot…

  • News

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

NEWSFebruary 13, 202604 mins

A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat…

  • News

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

NEWSFebruary 13, 202607 mins

A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its…

  • News

The CTEM Divide: Why 84% of Security Programs Are Falling Behind

NEWSFebruary 12, 202607 mins

A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between organizations…

  • News

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

NEWSFebruary 10, 2026011 mins

The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions…

  • News

From Ransomware to Residency: Inside the Rise of the Digital Parasite

NEWSFebruary 10, 2026013 mins

Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise…

  • News

Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data

NEWSFebruary 10, 202604 mins

The Netherlands’ Dutch Data Protection Authority (AP) and the Council for the Judiciary confirmed both agencies (Rvdr) have disclosed that…

  • News

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

NEWSFebruary 9, 202608 mins

The threat actor known as Bloody Wolf has been linked to a campaign targeting Uzbekistan and Russia to infect systems…

  • News

BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

NEWSFebruary 9, 202604 mins

BeyondTrust has released updates to address a critical security flaw impacting Remote Support (RS) and Privileged Remote Access (PRA) products…

  • 1
  • 2
  • 3
  • …
  • 46

Recent Posts

  • Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers
  • Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
  • Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
  • UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
  • The CTEM Divide: Why 84% of Security Programs Are Falling Behind

Recent Comments

No comments to show.

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
View all

You May Have Missed

  • News

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

NEWS August 26, 2025
  • News

Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

NEWS January 24, 2026
  • News

How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

NEWS October 1, 2025
  • News

Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign

NEWS August 29, 2025
  • News

Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign

NEWS October 17, 2025
  • News

New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands

NEWS January 6, 2026
  • News

Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector

NEWS December 15, 2025
  • News

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775

NEWS August 26, 2025
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}