Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws

NEWSNovember 12, 202505 mins

Amazon’s threat intelligence team on Wednesday disclosed that it observed an advanced threat actor exploiting two then-zero-day security flaws in…

  • News

Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security

NEWSNovember 12, 2025010 mins

Active Directory remains the authentication backbone for over 90% of Fortune 1000 companies. AD’s importance has grown as companies adopt…

  • News

WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

NEWSNovember 11, 2025012 mins

Threat hunters have uncovered similarities between a banking malware called Coyote and a newly disclosed malicious program dubbed Maverick that…

  • News

GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites

NEWSNovember 11, 202506 mins

The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to…

  • News

CISO’s Expert Guide To AI Supply Chain Attacks

NEWSNovember 11, 2025014 mins

AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now…

  • News

⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

NEWSNovember 10, 2025034 mins

Cyber threats didn’t slow down last week—and attackers are getting smarter. We’re seeing malware hidden in virtual machines, side-channel leaks…

  • News

New Browser Security Report Reveals Emerging Threats for Enterprises

NEWSNovember 10, 202509 mins

According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge…

  • News

Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware

NEWSNovember 10, 202509 mins

Cybersecurity researchers have called attention to a massive phishing campaign targeting the hospitality industry that lures hotel managers to ClickFix-style…

  • News

Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic

NEWSNovember 8, 202509 mins

Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with…

  • News

Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp

NEWSNovember 7, 202505 mins

A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a “commercial-grade” Android spyware…

  • 1
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • …
  • 40

Recent Posts

  • 4 Outdated Habits Destroying Your SOC’s MTTR in 2026
  • Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
  • Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
  • New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

Recent Comments

No comments to show.

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}