Skip to content
Hawkeye Cybersecurity
Menu
  • Home
  • Services
  • About Us
  • Cybersecurity News
  • Contact

Category: Apps

Home » Apps » Page 3
Apps

Popular Go Library fsnotify Raises Supply Chain Alarms After Maintainer Access Changes

A widely used Go library called fsnotify has found itself at the center of a supply chain security scare after a sudden change in maintainer access triggered alarm across the …

Apps

Google Warns of Hackers Using AI to Create Working Zero-Day Exploit

Google Threat Intelligence Group recently published an alarming report detailing the rapid industrialization of generative artificial intelligence in adversarial workflows. The most significant finding reveals that a cybercriminal syndicate successfully …

Apps

Hackers Use PlugX-Like DLL Sideloading Chain in Fake Claude Malware Campaign

Cybercriminals are getting creative with how they lure victims into downloading malware, and a new campaign involving a fake version of Anthropic’s Claude AI assistant is raising serious concerns. Attackers …

Apps

Hackers Use Fake DeepSeek TUI GitHub Repositories to Deliver Malware

Hackers are once again targeting developers and AI enthusiasts by impersonating popular open-source tools on GitHub. This time, the target is DeepSeek TUI, a legitimate terminal-based intelligent agent that allows …

Apps

ShinyHunters Breaches Instructure Canvas LMS Through Free-For-Teacher Account Program

The infamous hacking group ShinyHunters has struck again, this time targeting Instructure, the company behind Canvas Learning Management System (LMS). In early May 2026, Instructure confirmed unauthorized activity on its …

Apps

New cPanel and WHM Flaws Enable Code Execution, DoS Attacks

cPanel has disclosed three critical security vulnerabilities tracked as CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203 affecting its widely deployed cPanel & WHM web hosting control panel and WP Squared (WP2) platform. The …

Apps

TCLBANKER Malware Targets Users Through Self-Propagating WhatsApp and Outlook Worm Modules

A highly sophisticated Brazilian banking trojan named TCLBANKER, tracked under the campaign REF3076, this malware represents a major update to the older Maverick and SORVEPOTEL families. It stands out because …

Apps

NVIDIA Data Breach Reportedly Exposes Personal Information of GeForce Users

A data breach at GFN.AM, an authorized NVIDIA GeForce NOW cloud gaming service provider operating under “GFN CLOUD INTERNET SERVICES” LLC, has exposed personal information belonging to registered users. The …

Apps

Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate Incident

Let’s Encrypt temporarily suspended all certificate issuance on May 8, 2026, after engineers identified a critical issue involving a cross-signed certificate linking the organization’s Generation X root to its upcoming …

Apps

Critical Microsoft 365 Copilot Vulnerabilities Expose sensitive Information

Microsoft has disclosed and fully remediated three critical information disclosure vulnerabilities affecting Microsoft 365 Copilot and Copilot Chat in Microsoft Edge, all released on May 7, 2026, requiring no action …

Posts navigation

Older posts
Newer posts

Recent Posts

  • Gunra Ransomware Expands RaaS Operations After Shifting From Conti-Based Locker
  • OpenClaw Chain Vulnerabilities Expose 245,000 Public AI Agent Servers to Attack
  • Shai-Hulud Worm Steals npm, GitHub, AWS, and Kubernetes Secrets From Developers
  • Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens
  • Microsoft Edge, Windows 11 and LiteLLM Hacked in Pwn2Own Berlin 2026

Archives

  • May 2026
  • April 2026
  • March 2026

Categories

  • Apps
Let's Connect!
Copyright © 2026 Hawkeye Cybersecurity. Veteran Owned and Operated.