Skip to content
Hawkeye Cybersecurity
Menu
  • Home
  • Services
  • About Us
  • Cybersecurity News
  • Contact

Category: Apps

Home » Apps
Apps

Gunra Ransomware Expands RaaS Operations After Shifting From Conti-Based Locker

Gunra ransomware has quickly grown from a new threat into a serious global problem, hitting dozens of organizations in less than a year. The group behind it is not just …

Apps

OpenClaw Chain Vulnerabilities Expose 245,000 Public AI Agent Servers to Attack

A chain of four critical vulnerabilities discovered in OpenClaw, one of the fastest-growing open-source platforms for autonomous AI agents, has left an estimated 245,000 publicly accessible server instances exposed to …

Apps

Shai-Hulud Worm Steals npm, GitHub, AWS, and Kubernetes Secrets From Developers

A dangerous new piece of malware called Shai-Hulud has emerged as one of the most alarming supply chain threats of 2026. It is a self-propagating worm that quietly tunnels through …

Apps

Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens

Hackers are exploiting a little-known feature of Microsoft’s authentication system to steal account credentials at scale. Device code phishing campaigns now target organizations worldwide by manipulating the OAuth device authorization …

Apps

Microsoft Edge, Windows 11 and LiteLLM Hacked in Pwn2Own Berlin 2026

Pwn2Own Berlin 2026 opened with a surge of zero-day exploits targeting modern browsers, operating systems, and emerging AI platforms. On Day One alone, security researchers successfully hacked Microsoft Edge, Windows …

Apps

Sandworm Hackers Pivot From Compromised IT Systems Toward Critical OT Assets

A Russian state-sponsored hacking group known as Sandworm has been caught making a calculated pivot from compromised IT networks into operational technology systems that control physical infrastructure. The campaign is …

Apps

Chinese APT Hackers Exploit Microsoft Exchange to Breach Energy Sector Network

A Chinese state-linked hacking group known as FamousSparrow has quietly infiltrated an Azerbaijani oil and gas company, exploiting an unpatched Microsoft Exchange server to plant multiple backdoors inside the network. …

Apps

New Malware Framework Enables Screen Control, Browser Artifact Access, and UAC Bypass

A newly uncovered malware framework is raising serious alarms across the cybersecurity community. Researchers have identified a previously unknown implant called TencShell, a sophisticated tool capable of giving attackers full …

Apps

node-ipc npm Package with 822K Weekly Downloads Compromised in Supply Chain Attack

A widely used JavaScript inter-process communication library has been weaponized again. Socket and Stepsecurity have confirmed that three newly published versions of node-ipc, a package with over 822,000 weekly downloads, …

Apps

Anthropic’s Mythos AI Reportedly Found macOS Vulnerabilities that Could Bypass Apple Security

Security researchers at Calif, a Palo Alto-based cybersecurity firm, have used techniques derived from an early version of Anthropic’s secretive Mythos AI model to uncover two previously undocumented vulnerabilities in …

Posts navigation

Older posts

Recent Posts

  • Gunra Ransomware Expands RaaS Operations After Shifting From Conti-Based Locker
  • OpenClaw Chain Vulnerabilities Expose 245,000 Public AI Agent Servers to Attack
  • Shai-Hulud Worm Steals npm, GitHub, AWS, and Kubernetes Secrets From Developers
  • Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens
  • Microsoft Edge, Windows 11 and LiteLLM Hacked in Pwn2Own Berlin 2026

Archives

  • May 2026
  • April 2026
  • March 2026

Categories

  • Apps
Let's Connect!
Copyright © 2026 Hawkeye Cybersecurity. Veteran Owned and Operated.