Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

February 28, 2026
  • News

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

  • News

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

  • News

Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

  • News

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

  • News

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

February 25, 2026
  • News

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

NEWSFebruary 28, 2026013 mins

OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to…

  • News

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

NEWSFebruary 27, 202603 mins

The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of…

  • News

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

NEWSFebruary 27, 202605 mins

Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to…

  • News

Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

NEWSFebruary 26, 202608 mins

A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has…

  • News

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

NEWSFebruary 25, 202605 mins

Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic’s Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result…

  • News

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

NEWSFebruary 25, 202606 mins

The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to…

  • News

Manual Processes Are Putting National Security at Risk

NEWSFebruary 25, 2026014 mins

Why automating sensitive data transfers is now a mission-critical priority More than half of national security organizations still rely on…

  • News

Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem

NEWSFebruary 24, 2026012 mins

Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control…

  • News

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

NEWSFebruary 23, 202609 mins

Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a…

  • News

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

NEWSFebruary 23, 2026038 mins

Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some…

  • 1
  • 2
  • 3
  • …
  • 49

Recent Posts

  • ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
  • 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
  • Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
  • Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
  • Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Recent Comments

No comments to show.

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
View all

You May Have Missed

  • News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

NEWS November 14, 2025
  • News

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

NEWS August 10, 2025
  • News

Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts

NEWS September 11, 2025
  • News

AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals

NEWS September 3, 2025
  • News

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

NEWS February 5, 2026
  • News

Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts

NEWS November 14, 2025
  • News

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

NEWS August 27, 2025
  • News

Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra

NEWS August 27, 2025
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}