Skip to content
Hawkeye Cybersecurity
Menu
  • Home
  • Services
  • About Us
  • Cybersecurity News
  • Contact

Category: Apps

Home » Apps » Page 24
Apps

CISA Warns of Langflow Code Injection Vulnerability Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical security flaw affecting the Langflow platform to its Known Exploited Vulnerabilities (KEV) catalog on March 25, 2026. The …

Apps

IDrive for Windows Vulnerability Let Attackers Escalate Privileges

A critical local privilege escalation vulnerability has been identified in the IDrive Cloud Backup Client for Windows. Tracked as CVE-2026-1995, this local privilege escalation vulnerability affects the IDrive Cloud Backup Client …

Apps

China-Linked Hackers Breach Southeast Asian Military Systems in Long-Running Spy Campaign

A sophisticated and long-running cyber espionage campaign, tracked as CL-STA-1087, has been quietly targeting military organizations across Southeast Asia since at least 2020. The operation, assessed with moderate confidence to be …

Apps

Open Directory Malware Campaign Uses Obfuscated VBS, PNG Loaders and RAT Payloads

A sophisticated multi-stage malware campaign has surfaced, deploying obfuscated Visual Basic Script (VBS) files, PNG-embedded loaders, and remote access trojans (RATs) to target systems without leaving a trace on disk. …

Apps

Mirai-Based Botnets Evolve Into Massive DDoS and Proxy Abuse Threat

The internet has seen a sharp rise in botnet-driven threats over the past year, with much of the activity tracing back to one of the most influential malware families in …

Apps

Linux Ransomware Pay2Key Attacking Organizations Ervers, Virtualization Hosts, and Cloud Workloads

Linux has long been considered a more secure operating system than Windows, but that reputation is being tested. A ransomware group known as Pay2Key, attributed to Iranian threat actors, has …

Apps

macOS Threats Are the Biggest Security Gap in 2026: How SOC Teams Close It 

macOS has become a standard part of modern business environments, especially across engineering, product, and leadership teams. That makes it a growing security concern: when a Mac used by a …

Apps

HackerOne Data Breach – Employees Data Stolen Following Navia Hack

HackerOne recently disclosed a data breach affecting 287 of its employees following a cyberattack on its U.S. benefits administrator, Navia Benefit Solutions. The breach stemmed from a Broken Object Level …

Apps

Dell Wyse Management Vulnerabilities Enables Complete System Compromise

A recent security analysis has revealed how chaining seemingly minor logic flaws in Dell Wyse Management Suite (WMS) On-Premises can result in a complete system compromise. Security researchers demonstrated that …

Apps

Tycoon2FA Operators Resume Cloud Account Phishing After Infrastructure Disruption

Cybercriminals behind Tycoon2FA, a phishing-as-a-service (PhaaS) platform, have resumed targeting cloud accounts with near-full force despite a coordinated law enforcement takedown on March 4, 2026. Europol, working alongside authorities from …

Posts navigation

Older posts
Newer posts

Recent Posts

  • Microsoft Exchange, Windows 11, and Cursor Zero-Days Exploited on Pwn2Own Day 2
  • JDownloader Website Compromised to Distribute Malicious Windows and Linux Installers
  • Malicious JPEG Images Could Trigger PHP Memory Safety Vulnerabilities
  • Critical Linux Kernel Flaw ‘ssh-keysign-pwn’ Exposes SSH Keys and Shadow Passwords
  • Google Project Zero Discloses Zero-Click Exploit Chain for Pixel 10 Devices

Archives

  • May 2026
  • April 2026
  • March 2026

Categories

  • Apps
Let's Connect!
Copyright © 2026 Hawkeye Cybersecurity. Veteran Owned and Operated.