Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News

January 2026

  • News

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

NEWSJanuary 14, 202608 mins

The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated…

  • News

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

NEWSJanuary 14, 202609 mins

Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary…

  • News

New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

NEWSJanuary 14, 2026011 mins

Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from…

  • News

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

NEWSJanuary 13, 202606 mins

Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that’s capable of stealing API keys associated with MEXC,…

  • News

ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

NEWSJanuary 13, 202603 mins

ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow AI Platform that could enable an unauthenticated…

  • News

What Should We Learn From How Attackers Leveraged AI in 2025?

NEWSJanuary 13, 202606 mins

Old Playbook, New Scale: While defenders are chasing trends, attackers are optimizing the basics The security industry loves talking about…

  • News

⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & More

NEWSJanuary 12, 2026037 mins

This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned…

  • News

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

NEWSJanuary 10, 202603 mins

The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom…

  • News

Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime

NEWSJanuary 10, 202603 mins

Europol on Friday announced the arrest of 34 individuals in Spain who are alleged to be part of an international…

  • News

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions

NEWSJanuary 9, 202603 mins

Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including…

  • 1
  • 2

Recent Posts

  • Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
  • New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
  • Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
  • ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

Recent Comments

No comments to show.

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}