Skip to content
Hawkeye Cybersecurity
Menu
  • Home
  • Services
  • About Us
  • Cybersecurity News
  • Contact

Category: Apps

Home » Apps » Page 10
Apps

New Malware Uses Obfuscation and Staged Payload Delivery to Evade Detection

A newly discovered malware campaign is targeting government employees in Pakistan using carefully crafted spear-phishing emails that combine obfuscation and staged payload delivery to stay hidden from security tools. The …

Apps

73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign

The GlassWorm supply chain attack targeting the Open VSX marketplace has escalated with the discovery of 73 new “sleeper” extensions. Identified in April 2026, this cluster marks a dangerous shift …

Apps

Litecoin Zero-Day Vulnerability Exploited in DoS Attack, Disrupts Major Mining Pools

A critical zero-day vulnerability in the Litecoin network was actively exploited to launch a denial-of-service (DoS) attack, temporarily disrupting operations across major mining pools before developers issued a full patch. …

Apps

New Windows RPC Vulnerability Lets Attackers Escalate Privileges Across All Windows Versions

PhantomRPC, a newly identified architectural vulnerability in Windows Remote Procedure Call (RPC) that enables local privilege escalation to SYSTEM-level access, potentially affecting every version of Windows. The research was presented …

Apps

CISA Warns of Multiple SimpleHelp Vulnerabilities Exploited in Attack

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding two actively exploited vulnerabilities in SimpleHelp remote support software. Remote access tools are highly valued targets for …

Apps

Claude AI Agents Close 186 Deals in Anthropic’s Marketplace Experiment

Anthropic’s “Project Deal” has demonstrated that AI agents can autonomously negotiate and close real-world transactions, but the experiment also surfaced a quiet, troubling asymmetry: not all AI representations are created …

Apps

GPT‑5.5 Bio Bug Bounty to Strengthen Advanced AI Capabilities

OpenAI has announced a new Bio Bug Bounty program for GPT-5.5 as part of its efforts to improve safety controls for advanced AI systems and to address misuse in biology. …

Apps

Hackers Can Abuse Entra Agent ID Administrator Role to Hijack Service Principals

A critical scope overreach vulnerability was recently identified in the Microsoft Entra Agent Identity Platform. The newly introduced Agent ID Administrator role allowed accounts to hijack arbitrary service principals and …

Apps

Claude Desktop Reportedly Adds Browser Access Bridge to Multiple Chromium-Based Browsers

A recent technical audit by privacy researcher Alexander Hanff has revealed that Anthropic’s Claude Desktop application for macOS silently installs a Native Messaging bridge into the directories of several Chromium-based …

Apps

Hackers Use Fake CAPTCHA Pages to Trigger Costly International SMS Fraud

Most internet users are familiar with CAPTCHA tests, simple challenges like selecting traffic lights or typing distorted letters to confirm they are human. But cybercriminals have found a way to …

Posts navigation

Older posts
Newer posts

Recent Posts

  • Microsoft Exchange, Windows 11, and Cursor Zero-Days Exploited on Pwn2Own Day 2
  • JDownloader Website Compromised to Distribute Malicious Windows and Linux Installers
  • Malicious JPEG Images Could Trigger PHP Memory Safety Vulnerabilities
  • Critical Linux Kernel Flaw ‘ssh-keysign-pwn’ Exposes SSH Keys and Shadow Passwords
  • Google Project Zero Discloses Zero-Click Exploit Chain for Pixel 10 Devices

Archives

  • May 2026
  • April 2026
  • March 2026

Categories

  • Apps
Let's Connect!
Copyright © 2026 Hawkeye Cybersecurity. Veteran Owned and Operated.