Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News

January 2026

  • News

LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords

NEWSJanuary 21, 202603 mins

LastPass is alerting users to a new active phishing campaign that’s impersonating the password management service, which aims to trick…

  • News

North Korea-Linked Hackers Target Developers via Malicious VS Code Projects

NEWSJanuary 20, 2026010 mins

The North Korean threat actors associated with the long-running Contagious Interview campaign have been observed using malicious Microsoft Visual Studio…

  • News

Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers

NEWSJanuary 20, 202606 mins

Cloudflare has addressed a security vulnerability impacting its Automatic Certificate Management Environment (ACME) validation logic that made it possible to…

  • News

⚡ Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More

NEWSJanuary 19, 2026037 mins

In cybersecurity, the line between a normal update and a serious incident keeps getting thinner. Systems that once felt reliable…

  • News

OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans

NEWSJanuary 17, 202605 mins

OpenAI on Friday said it would start showing ads in ChatGPT to logged-in adult U.S. users in both the free…

  • News

GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection

NEWSJanuary 16, 202606 mins

The JavaScript (aka JScript) malware loader called GootLoader has been observed using a malformed ZIP archive that’s designed to sidestep…

  • News

Your Digital Footprint Can Lead Right to Your Front Door

NEWSJanuary 16, 202605 mins

You lock your doors at night. You avoid sketchy phone calls. You’re careful about what you post on social media….

  • News

LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing

NEWSJanuary 16, 202606 mins

Security experts have disclosed details of a new campaign that has targeted U.S. government and policy entities using politically themed…

  • News

Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

NEWSJanuary 15, 202604 mins

A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according…

  • News

Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot

NEWSJanuary 15, 2026010 mins

Cybersecurity researchers have disclosed details of a new attack method dubbed Reprompt that could allow bad actors to exfiltrate sensitive…

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7

Recent Posts

  • ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
  • 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
  • Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
  • Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
  • Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Recent Comments

No comments to show.

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}