Skip to content
Hawkeye Cybersecurity
Menu
  • Home
  • Services
  • About Us
  • Cybersecurity News
  • Contact

Category: Apps

Home » Apps » Page 21
Apps

Magecart Hackers Uses 100+ Domains to Hijack eStores Checkouts and Steal Card Data

A sophisticated and long-running Magecart campaign has been quietly operating for over 24 months, infecting e-commerce websites across at least 12 countries using more than 100 malicious domains to steal …

Apps

Google Cloud’s Vertex AI platform Vulnerability Allow Attackers to Access Sensitive Data

Artificial intelligence agents are rapidly becoming integral to enterprise workflows, but they also introduce new attack surfaces. Security researchers recently uncovered a significant vulnerability within Google Cloud Platform’s Vertex AI …

Apps

Hackers Actively Exploiting Critical WebLogic RCE Vulnerabilities in Attacks

A recent cybersecurity study reveals that threat actors are moving faster than ever to weaponize new software flaws. According to data collected from a high-interaction honeypot, hackers are actively exploiting …

Apps

Russian Hackers Using Remote Access Toolkit “CTRL” for  RDP Hijacking

A newly disclosed Russian-linked remote access toolkit called “CTRL” is being used to hijack Remote Desktop Protocol sessions and steal credentials from Windows systems. According to Censys ARC, the malware …

Apps

New Chrome Zero-Day Vulnerability Actively Exploited in Attacks — Patch Now

Google has released an emergency security update for its Chrome browser, patching a zero-day vulnerability that is already being actively exploited in the wild. The Stable channel has been updated …

Apps

Hackers Weaponize Legitimate Windows Tools to Disable Antivirus Before Ransomware Attacks

Ransomware attacks have gone far beyond simple malicious code. Today, attackers operate with the precision of a well-planned business, using trusted Windows tools to quietly tear down defenses before ransomware …

Apps

Google Unveils Ransomware Detection and File Restoration for Google Drive

Google has officially moved its ransomware detection and file restoration features for Google Drive into General Availability. Originally launched in beta in September 2025, the updated security controls offer organizations …

Apps

Hackers Deploy Telegram-Based ResokerRAT With Screenshot and Persistence Features

A new remote access trojan known as ResokerRAT has come to light, using Telegram’s bot API as its core communication channel to silently monitor and control infected Windows machines. What …

Apps

Anthropic’s Claude Code Source Code Reportedly Leaked Via Their npm Registry

Anthropic’s proprietary Claude Code CLI tool has had its full TypeScript source code inadvertently exposed through a misconfigured npm package, after a security researcher discovered a leaked .map file referencing …

Apps

WordPress Plugin Vulnerability Exposes Sensitive Data From 800,000+ Sites

A high-severity security flaw has been disclosed in Smart Slider 3, one of the most widely used WordPress slider builder plugins. With over 800,000 active installations, this vulnerability leaves a massive …

Posts navigation

Older posts
Newer posts

Recent Posts

  • Microsoft Exchange, Windows 11, and Cursor Zero-Days Exploited on Pwn2Own Day 2
  • JDownloader Website Compromised to Distribute Malicious Windows and Linux Installers
  • Malicious JPEG Images Could Trigger PHP Memory Safety Vulnerabilities
  • Critical Linux Kernel Flaw ‘ssh-keysign-pwn’ Exposes SSH Keys and Shadow Passwords
  • Google Project Zero Discloses Zero-Click Exploit Chain for Pixel 10 Devices

Archives

  • May 2026
  • April 2026
  • March 2026

Categories

  • Apps
Let's Connect!
Copyright © 2026 Hawkeye Cybersecurity. Veteran Owned and Operated.