Skip to content
  • Contact Us
  • Cookie Policy (EU)
  • Privacy Policy
  • Terms & Conditions
Facebook Instagram Twitter

HackVolt News

  • Contact Us
  • Cookie Policy (EU)
  • Privacy Policy
  • Terms & Conditions
Random News

news

  • news

New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module

NEWSSeptember 26, 202505 mins

Cybersecurity researchers have discovered an updated version of a known Apple macOS malware called XCSSET that has been observed in…

  • news

Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure

NEWSSeptember 26, 202505 mins

Cybersecurity company watchTowr Labs has disclosed that it has “credible evidence” of active exploitation of the recently disclosed security flaw…

  • news

Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

NEWSSeptember 26, 202508 mins

The U.K. National Cyber Security Centre (NCSC) has revealed that threat actors have exploited the recently disclosed security flaws impacting…

  • news

Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive

NEWSSeptember 25, 202504 mins

Cisco is urging customers to patch two security flaws impacting the VPN web server of Cisco Secure Firewall Adaptive Security…

  • news

Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection

NEWSSeptember 25, 202505 mins

Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence (AI) agents, that could…

  • news

North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers

NEWSSeptember 25, 2025011 mins

The North Korea-linked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented backdoor called…

  • news

Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds

NEWSSeptember 25, 202507 mins

The latest Gcore Radar report analyzing attack data from Q1–Q2 2025, reveals a 41% year-on-year increase in total attack volume….

  • news

Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed

NEWSSeptember 25, 202504 mins

Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called fast_log to steal Solana and Ethereum wallet…

  • news

Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike

NEWSSeptember 24, 202505 mins

A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning Africa, Asia,…

  • news

UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

NEWSSeptember 24, 202508 mins

Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the U.S. have been…

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 18

Recent Posts

  • Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
  • From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on Ukraine
  • Step Into the Password Graveyard… If You Dare (and Join the Live Session)
  • Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
  • OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

Recent Comments

No comments to show.

Archives

  • October 2025
  • September 2025
  • August 2025

Categories

  • news
Facebook Instagram Twitter
News Event - Modern WordPress Theme. Developed by. Blaze Themes.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}