Skip to content
Hawkeye Cybersecurity
Menu
  • Home
  • Services
  • About Us
  • Cybersecurity News
  • Contact

Category: Apps

Home » Apps » Page 17
Apps

EngageSDK Vulnerability Exposes Millions of Crypto Wallet Users to Cyberattacks

A serious security flaw found inside a widely used Android library called EngageSDK has put over 30 million cryptocurrency wallet users at risk of financial theft and personal data exposure. …

Apps

Hackers Use AiTM Session Hijacking to Redirect Employee Salaries in New Storm-2755 Campaign

A financially motivated threat group called Storm-2755 has launched a campaign that quietly reroutes employee salary payments to attacker-controlled bank accounts. Targeting Canadian workers, the group uses adversary-in-the-middle (AiTM) techniques …

Apps

France to Replace Windows with Linux on Government Desktops

France has taken a decisive step toward digital sovereignty, announcing plans to migrate government workstations from Microsoft Windows to Linux. The move was formally declared during an interministerial seminar held …

Apps

Hackers Use Fake BTS World Tour Ticket Sites to Scam Fans Across Multiple Countries

Cybercriminals are capitalizing on the excitement around BTS’s long-awaited return to the world stage by setting up fraudulent ticket websites that steal money from unsuspecting fans. The campaign has already …

Apps

Censys Warns 5,219 Rockwell/Allen-Bradley PLCs Are Exposed Amid Iranian APT Activity

The FBI, CISA, NSA, EPA, DOE, and U.S. Cyber Command jointly disclosed on April 7, 2026, that Iranian-affiliated advanced persistent threat (APT) actors are actively targeting internet-facing Rockwell Automation/Allen-Bradley programmable …

Apps

New ClickFix Campaign Uses macOS Script Editor to Deliver Atomic Stealer

A newly discovered ClickFix campaign is targeting macOS users through a technique that completely bypasses Terminal, using Script Editor to drop the Atomic Stealer infostealer onto compromised systems. This campaign …

Apps

Hackers Use ClickFix and Malicious DMG Files to Deliver notnullOSX on macOS

A new macOS info-stealer named notnullOSX has surfaced, targeting crypto holders with wallets above $10,000. Written in Go, it uses two parallel attack paths — ClickFix social engineering and malicious …

Apps

New STX RAT Uses Hidden Remote Desktop and Infostealer Features to Evade Detection

A newly discovered remote access trojan called STX RAT has emerged as a serious cybersecurity threat in 2026, combining hidden remote desktop access with credential-stealing features to quietly compromise targeted …

Apps

Hackers Use Fake Security Software to Deliver LucidRook Malware in Taiwan Attacks

A newly identified malware called LucidRook has been spotted targeting organizations across Taiwan, hiding inside what appears to be legitimate security software. The attackers went out of their way to …

Apps

Hackers Impersonate Linux Foundation Leader in Slack to Target Open Source Developers

Open source developers are facing a growing and sophisticated threat — one that does not rely on complex exploits or hidden vulnerabilities but instead uses something far simpler: trust. A …

Posts navigation

Older posts
Newer posts

Recent Posts

  • Microsoft Exchange, Windows 11, and Cursor Zero-Days Exploited on Pwn2Own Day 2
  • JDownloader Website Compromised to Distribute Malicious Windows and Linux Installers
  • Malicious JPEG Images Could Trigger PHP Memory Safety Vulnerabilities
  • Critical Linux Kernel Flaw ‘ssh-keysign-pwn’ Exposes SSH Keys and Shadow Passwords
  • Google Project Zero Discloses Zero-Click Exploit Chain for Pixel 10 Devices

Archives

  • May 2026
  • April 2026
  • March 2026

Categories

  • Apps
Let's Connect!
Copyright © 2026 Hawkeye Cybersecurity. Veteran Owned and Operated.