Skip to content
Facebook Instagram Twitter

Hackvolt — IT Security News

  • News
Random News
  • News

Password Reuse in Disguise: An Often-Missed Risky Workaround

NEWSJanuary 28, 2026010 mins

When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These attack…

  • News

ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services

NEWSJanuary 27, 2026014 mins

Cybersecurity researchers have disclosed details of a new campaign that combines ClickFix-style fake CAPTCHAs with a signed Microsoft Application Virtualization…

  • News

Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware

NEWSJanuary 26, 202606 mins

Cybersecurity researchers have discovered an ongoing campaign that’s targeting Indian users with a multi-stage backdoor as part of a suspected…

  • News

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

NEWSJanuary 26, 2026011 mins

If there’s a constant in cybersecurity, it’s that adversaries are always innovating. The rise of offensive AI is transforming attack…

  • News

Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

NEWSJanuary 24, 2026012 mins

A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called…

  • News

CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog

NEWSJanuary 24, 202603 mins

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server…

  • News

Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents

NEWSJanuary 24, 2026012 mins

AI agents are accelerating how work gets done. They schedule meetings, access data, trigger workflows, write code, and take action…

  • News

New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

NEWSJanuary 24, 202604 mins

The Russian nation-state hacking group known as Sandworm has been attributed to what has been described as the “largest cyber…

  • News

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

NEWSJanuary 23, 202603 mins

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV)…

  • News

Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls

NEWSJanuary 23, 202603 mins

Fortinet has officially confirmed that it’s working to completely plug a FortiCloud SSO authentication bypass vulnerability following reports of fresh…

  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 49

Recent Posts

  • ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
  • 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
  • Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
  • Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
  • Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Recent Comments

No comments to show.

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025

Categories

  • News
Facebook Instagram Twitter
  • Contact Us
  • Privacy Policy
  • Cookie Policy (EU)
  • Terms & Conditions
News Event - Hackvolt. Copyright 2026
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}