Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide

NEWSDecember 31, 202508 mins

The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign…

  • News

Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry

NEWSDecember 31, 202508 mins

Cybersecurity researchers have disclosed details of what appears to be a new strain of Shai Hulud on the npm registry…

  • News

IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass

NEWSDecember 31, 202502 mins

IBM has disclosed details of a critical security flaw in API Connect that could allow attackers to gain remote access…

  • News

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

NEWSDecember 30, 202508 mins

The Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new…

  • News

27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials

NEWSDecember 29, 202507 mins

Cybersecurity researchers have disclosed details of what has been described as a “sustained and targeted” spear-phishing campaign that has published…

  • News

MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

NEWSDecember 29, 202504 mins

A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially susceptible…

  • News

MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

NEWSDecember 29, 202504 mins

A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially susceptible…

  • News

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

NEWSDecember 26, 202505 mins

A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive…

  • News

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

NEWSDecember 25, 2025031 mins

It’s getting harder to tell where normal tech ends and malicious intent begins. Attackers are no longer just breaking in…

  • News

LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

NEWSDecember 25, 202505 mins

The encrypted vault backups stolen from the 2022 LastPass data breach have enabled bad actors to take advantage of weak…

  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 39

Recent Posts

  • Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
  • New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
  • Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
  • ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

Recent Comments

No comments to show.

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}