Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News

News

  • News

Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

NEWSJanuary 15, 202604 mins

A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according…

  • News

4 Outdated Habits Destroying Your SOC’s MTTR in 2026

NEWSJanuary 15, 2026010 mins

It’s 2026, yet many SOCs are still operating the way they did years ago, using tools and processes designed for…

  • News

Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud

NEWSJanuary 15, 2026011 mins

Microsoft on Wednesday announced that it has taken a “coordinated legal action” in the U.S. and the U.K. to disrupt…

  • News

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

NEWSJanuary 14, 202608 mins

The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated…

  • News

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

NEWSJanuary 14, 202609 mins

Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary…

  • News

New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

NEWSJanuary 14, 2026011 mins

Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from…

  • News

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

NEWSJanuary 13, 202606 mins

Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that’s capable of stealing API keys associated with MEXC,…

  • News

What Should We Learn From How Attackers Leveraged AI in 2025?

NEWSJanuary 13, 202606 mins

Old Playbook, New Scale: While defenders are chasing trends, attackers are optimizing the basics The security industry loves talking about…

  • News

ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

NEWSJanuary 13, 202603 mins

ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow AI Platform that could enable an unauthenticated…

  • News

⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & More

NEWSJanuary 12, 2026037 mins

This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned…

  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • 49

Recent Posts

  • ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
  • 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
  • Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
  • Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
  • Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Recent Comments

No comments to show.

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}