Skip to content
Hawkeye Cybersecurity
Menu
  • Home
  • Services
  • About Us
  • Cybersecurity News
  • Contact

Category: Apps

Home » Apps » Page 13
Apps

North Korea-Linked UNC1069 Uses Fake Zoom and Teams Meetings to Hack Crypto Professionals

A North Korean threat group known as UNC1069 has been running a sophisticated campaign that tricks cryptocurrency and Web3 professionals into joining fake online meetings, only to infect their computers …

Apps

Researchers Say Iranian MOIS Uses Multiple Hacker Personas for One Coordinated Cyber Campaign

Iran’s Ministry of Intelligence and Security (MOIS) has been running a long and carefully organized cyber campaign using three separate hacker identities. These identities, known as Homeland Justice, Karma/KarmaBelow80, and …

Apps

Lovable AI App Builder Reportedly Exposes Thousands of Projects Data via API Flaw

A critical Broken Object Level Authorization (BOLA) vulnerability in Lovable, the popular AI-powered app builder platform, is reportedly allowing unauthorized users to access sensitive project data, including source code, database …

Apps

Microsoft Teams Right-Click Paste Broken Following Edge Browser Update

A confirmed bug in Microsoft Teams desktop client version 26072.519.4556.7438 is disabling the right-click paste option for users on Windows and macOS, with Microsoft attributing the root cause to a …

Apps

OpenAI Expands Cyber Defense Program With GPT-5.4-Cyber Access for Trusted Organizations

OpenAI has officially launched the expanded phase of its Trusted Access for Cyber program. Granting select organizations access to its specialized GPT-5.4-Cyber model to strengthen digital defenses across critical infrastructure, financial services, and open-source …

Apps

Apple Works on Fix for iPhone Passcode Bug Linked to Missing Czech Keyboard Character

Apple is reportedly developing a software fix for a frustrating iOS 26 bug that has left some users entirely locked out of their iPhones for months. According to a recent …

Apps

Researcher Uses Claude Opus to Build a Working Chrome Exploit Chain

Amidst the heated debate surrounding Anthropic’s recent announcement of its Mythos and Project Glasswing models, a security researcher has demonstrated the tangible cybersecurity implications of frontier AI. Moving beyond theoretical …

Apps

Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say

Freelance service platform Fiverr is facing a significant privacy incident after researchers discovered that sensitive customer files are publicly accessible and indexed by Google search. According to a recent disclosure …

Apps

Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations

A new iteration of the notorious Mirai botnet, dubbed Nexcorium, has emerged in the wild, aggressively targeting internet-connected video recording devices. According to recent threat research published by Fortinet’s FortiGuard …

Apps

Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns

According to a recent April 2026 report by security researcher Himaja Motheram at Censys, just under 6 million internet-facing hosts are still running the File Transfer Protocol (FTP). While this …

Posts navigation

Older posts
Newer posts

Recent Posts

  • Microsoft Exchange, Windows 11, and Cursor Zero-Days Exploited on Pwn2Own Day 2
  • JDownloader Website Compromised to Distribute Malicious Windows and Linux Installers
  • Malicious JPEG Images Could Trigger PHP Memory Safety Vulnerabilities
  • Critical Linux Kernel Flaw ‘ssh-keysign-pwn’ Exposes SSH Keys and Shadow Passwords
  • Google Project Zero Discloses Zero-Click Exploit Chain for Pixel 10 Devices

Archives

  • May 2026
  • April 2026
  • March 2026

Categories

  • Apps
Let's Connect!
Copyright © 2026 Hawkeye Cybersecurity. Veteran Owned and Operated.