Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act

NEWSJanuary 5, 202605 mins

Ilya Lichtenstein, who was sentenced to prison last year for money laundering charges in connection with his role in the…

  • News

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia

NEWSJanuary 2, 2026013 mins

The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic,…

  • News

RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers

NEWSJanuary 1, 202604 mins

Cybersecurity researchers have disclosed details of a persistent nine-month-long campaign that has targeted Internet of Things (IoT) devices and web…

  • News

DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide

NEWSDecember 31, 202508 mins

The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign…

  • News

Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry

NEWSDecember 31, 202508 mins

Cybersecurity researchers have disclosed details of what appears to be a new strain of Shai Hulud on the npm registry…

  • News

IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass

NEWSDecember 31, 202502 mins

IBM has disclosed details of a critical security flaw in API Connect that could allow attackers to gain remote access…

  • News

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

NEWSDecember 30, 202508 mins

The Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new…

  • News

27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials

NEWSDecember 29, 202507 mins

Cybersecurity researchers have disclosed details of what has been described as a “sustained and targeted” spear-phishing campaign that has published…

  • News

MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

NEWSDecember 29, 202504 mins

A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially susceptible…

  • News

MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

NEWSDecember 29, 202504 mins

A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially susceptible…

  • 1
  • …
  • 10
  • 11
  • 12
  • 13
  • 14
  • …
  • 49

Recent Posts

  • ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
  • 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
  • Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
  • Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
  • Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Recent Comments

No comments to show.

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}