Skip to content
  • Contact Us
  • Cookie Policy (EU)
  • Privacy Policy
  • Terms & Conditions
Facebook Instagram Twitter

HackVolt News

  • Contact Us
  • Cookie Policy (EU)
  • Privacy Policy
  • Terms & Conditions
Random News

August 2025

  • news

Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign

NEWSAugust 29, 202509 mins

An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part…

  • news

Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

NEWSAugust 29, 202504 mins

Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the…

  • news

Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page

NEWSAugust 29, 202503 mins

Click Studios, the developer of enterprise-focused password management solution Passwordstate, said it has released security updates to address an authentication…

  • news

Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain

NEWSAugust 29, 202505 mins

Authorities from the Netherlands and the United States have announced the dismantling of an illicit marketplace called VerifTools that peddled…

  • news

Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations

NEWSAugust 29, 202504 mins

Google has revealed that the recent wave of attacks targeting Salesforce instances via Salesloft Drift is much broader in scope…

  • news

Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide

NEWSAugust 28, 202509 mins

The China-linked advanced persistent threat (APT) actor known as Salt Typhoon has continued its attacks targeting networks across the world,…

  • news

Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them

NEWSAugust 28, 2025012 mins

Every day, businesses, teams, and project managers trust platforms like Trello, Asana, etc., to collaborate and manage tasks. But what…

  • news

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

NEWSAugust 28, 2025010 mins

The maintainers of the nx build system have alerted users to a supply chain attack that allowed attackers to publish…

  • news

Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

NEWSAugust 27, 202507 mins

The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion…

  • news

Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model

NEWSAugust 27, 202506 mins

Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock. Written in Golang, the…

  • 1
  • 2
  • 3
  • …
  • 8

Recent Posts

  • Step Into the Password Graveyard… If You Dare (and Join the Live Session)
  • Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
  • OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them
  • New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise

Recent Comments

No comments to show.

Archives

  • October 2025
  • September 2025
  • August 2025

Categories

  • news
Facebook Instagram Twitter
News Event - Modern WordPress Theme. Developed by. Blaze Themes.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}