Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

NEWSNovember 18, 202503 mins

You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps…

  • News

Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet

NEWSNovember 18, 202504 mins

Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service (DDoS) attack targeting a single endpoint in…

  • News

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

NEWSNovember 17, 2025010 mins

The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codenamed RONINGLOADER to deliver…

  • News

Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time

NEWSNovember 17, 202504 mins

Google has disclosed that the company’s continued adoption of the Rust programming language in Android has resulted in the number…

  • News

RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

NEWSNovember 15, 202503 mins

The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could…

  • News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

NEWSNovember 14, 202504 mins

The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage…

  • News

Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

NEWSNovember 14, 202507 mins

Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta,…

  • News

Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts

NEWSNovember 14, 202504 mins

Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that could allow an attacker…

  • News

Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data

NEWSNovember 13, 202509 mins

A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of…

  • News

Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain

NEWSNovember 13, 202504 mins

Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to exfiltrate…

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 30

Recent Posts

  • Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
  • North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
  • Why Organizations Are Turning to RPAM
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2025
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}