Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

NEWSNovember 10, 2025034 mins

Cyber threats didn’t slow down last week—and attackers are getting smarter. We’re seeing malware hidden in virtual machines, side-channel leaks…

  • News

New Browser Security Report Reveals Emerging Threats for Enterprises

NEWSNovember 10, 202509 mins

According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge…

  • News

Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware

NEWSNovember 10, 202509 mins

Cybersecurity researchers have called attention to a massive phishing campaign targeting the hospitality industry that lures hotel managers to ClickFix-style…

  • News

Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic

NEWSNovember 8, 202509 mins

Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with…

  • News

Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp

NEWSNovember 7, 202505 mins

A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a “commercial-grade” Android spyware…

  • News

From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools

NEWSNovember 7, 2025011 mins

A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to…

  • News

Enterprise Credentials at Risk – Same Old, Same Old?

NEWSNovember 7, 202509 mins

Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She…

  • News

Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts

NEWSNovember 7, 202507 mins

Google on Thursday said it’s rolling out a dedicated form to allow businesses listed on Google Maps to report extortion…

  • News

Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362

NEWSNovember 6, 202504 mins

Cisco on Wednesday disclosed that it became aware of a new attack variant that’s designed to target devices running Cisco…

  • News

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

NEWSNovember 6, 202506 mins

A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting…

  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 30

Recent Posts

  • Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
  • North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
  • Why Organizations Are Turning to RPAM
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2025
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}