Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News

News

  • News

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

NEWSDecember 25, 202506 mins

Fortinet on Wednesday said it observed “recent abuse” of a five-year-old security flaw in FortiOS SSL VPN in the wild…

  • News

CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution

NEWSDecember 25, 202502 mins

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a security flaw impacting Digiever DS-2105 Pro network video recorders (NVRs)…

  • News

Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media

NEWSDecember 24, 202506 mins

The fraudulent investment scheme known as Nomani has witnessed an increase by 62%, according to data from ESET, as campaigns…

  • News

Attacks are Evolving: 3 Ways to Protect Your Business in 2026

NEWSDecember 24, 202509 mins

Every year, cybercriminals find new ways to steal money and data from businesses. Breaching a business network, extracting sensitive data,…

  • News

SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips

NEWSDecember 24, 202507 mins

The U.S. Securities and Exchange Commission (SEC) has filed charges against multiple companies for their alleged involvement in an elaborate…

  • News

Passwd: A walkthrough of the Google Workspace Password Manager

NEWSDecember 23, 2025011 mins

Passwd is designed specifically for organizations operating within Google Workspace. Rather than competing as a general consumer password manager, its…

  • News

INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

NEWSDecember 23, 202506 mins

A law enforcement operation coordinated by INTERPOL has led to the recovery of $3 million and the arrest of 574…

  • News

FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks

NEWSDecember 23, 202504 mins

The U.S. Federal Communications Commission (FCC) on Monday announced a ban on all drones and critical components made in a…

  • News

⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

NEWSDecember 22, 2025043 mins

Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They’re going after the…

  • News

Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale

NEWSDecember 22, 2025012 mins

Threat actors have been observed leveraging malicious dropper apps masquerading as legitimate applications to deliver an Android SMS stealer dubbed…

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 39

Recent Posts

  • Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
  • New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
  • Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
  • ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

Recent Comments

No comments to show.

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}