Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News

News

  • News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

NEWSNovember 14, 202504 mins

The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage…

  • News

Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

NEWSNovember 14, 202507 mins

Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta,…

  • News

Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts

NEWSNovember 14, 202504 mins

Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that could allow an attacker…

  • News

Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data

NEWSNovember 13, 202509 mins

A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of…

  • News

Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain

NEWSNovember 13, 202504 mins

Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to exfiltrate…

  • News

When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security

NEWSNovember 13, 2025014 mins

The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed…

  • News

Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown

NEWSNovember 13, 202503 mins

Malware families like Rhadamanthys Stealer, Venom RAT, and the Elysium botnet have been disrupted as part of a coordinated law…

  • News

ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories

NEWSNovember 13, 2025036 mins

Behind every click, there’s a risk waiting to be tested. A simple ad, email, or link can now hide something…

  • News

CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks

NEWSNovember 13, 202503 mins

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting WatchGuard Fireware to its…

  • News

Over 46,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack

NEWSNovember 13, 2025011 mins

Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake…

  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • …
  • 40

Recent Posts

  • 4 Outdated Habits Destroying Your SOC’s MTTR in 2026
  • Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
  • Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
  • New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

Recent Comments

No comments to show.

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}