Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers

NEWSOctober 21, 202507 mins

A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025,…

  • News

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

NEWSOctober 20, 202504 mins

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities (KEV)…

  • News

⚡ Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More

NEWSOctober 20, 2025040 mins

It’s easy to think your defenses are solid — until you realize attackers have been inside them the whole time….

  • News

Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide

NEWSOctober 19, 202505 mins

Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its…

  • News

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs

NEWSOctober 18, 202504 mins

Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with…

  • News

Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

NEWSOctober 18, 2025011 mins

The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China…

  • News

Identity Security: Your First and Last Line of Defense

NEWSOctober 17, 202507 mins

The danger isn’t that AI agents have bad days — it’s that they never do. They execute faithfully, even when…

  • News

Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices

NEWSOctober 17, 202505 mins

Cybersecurity researchers have disclosed details of a recently patched critical security flaw in WatchGuard Fireware that could allow unauthenticated attackers…

  • News

Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign

NEWSOctober 17, 202504 mins

Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla…

  • News

ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More

NEWSOctober 16, 2025037 mins

The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn…

  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • 30

Recent Posts

  • Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
  • North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
  • Why Organizations Are Turning to RPAM
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2025
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}