Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

NEWSJanuary 10, 202603 mins

The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom…

  • News

Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime

NEWSJanuary 10, 202603 mins

Europol on Friday announced the arrest of 34 individuals in Spain who are alleged to be part of an international…

  • News

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions

NEWSJanuary 9, 202603 mins

Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including…

  • News

WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging

NEWSJanuary 8, 202605 mins

Cybersecurity researchers have disclosed details of a new campaign that uses WhatsApp as a distribution vector for a Windows banking…

  • News

The State of Trusted Open Source

NEWSJanuary 8, 2026014 mins

Chainguard, the trusted source for open source, has a unique view into how modern organizations actually consume open source software…

  • News

Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers

NEWSJanuary 7, 202604 mins

A newly discovered critical security flaw in legacy D-Link DSL gateway routers has come under active exploitation in the wild….

  • News

Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users

NEWSJanuary 6, 202609 mins

Cybersecurity researchers have discovered two new malicious extensions on the Chrome Web Store that are designed to exfiltrate OpenAI ChatGPT…

  • News

Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat

NEWSJanuary 6, 202606 mins

Source: Securonix Cybersecurity researchers have disclosed details of a new campaign dubbed PHALT#BLYX that has leveraged ClickFix-style lures to display…

  • News

What is Identity Dark Matter?

NEWSJanuary 6, 202606 mins

The Invisible Half of the Identity Universe Identity used to live in one place – an LDAP directory, an HR…

  • News

New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands

NEWSJanuary 6, 202603 mins

A new critical security vulnerability has been disclosed in n8n, an open-source workflow automation platform, that could enable an authenticated…

  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • 49

Recent Posts

  • ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
  • 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
  • Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
  • Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
  • Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Recent Comments

No comments to show.

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}