Skip to content
Hawkeye Cybersecurity
Menu
  • Home
  • Services
  • About Us
  • Cybersecurity News
  • Contact

Category: Apps

Home » Apps » Page 6
Apps

DigiCert Hacked via Weaponized Screensaver File to Obtain EV Code Signing Certificates

A sophisticated threat actor breached DigiCert’s internal support environment in early April 2026 by tricking support analysts into executing a disguised malicious screensaver file, ultimately obtaining stolen EV Code Signing …

Apps

New MicroStealer Malware Actively Attacking Telecom & Education Sectors

A new infostealer malware called MicroStealer has quietly entered the threat landscape and is already showing a worrying reach. First spotted in December 2025, the malware has picked up speed …

Apps

Bluekit Phishing Kit Automates Domains, 2FA Lures, and Session Hijacking in One Panel

A newly identified phishing kit called Bluekit is changing how cybercriminals carry out phishing attacks by packing multiple attack capabilities into a single, easy-to-use operator panel. Rather than relying on …

Apps

Malicious Tanstack Package Uses Postinstall Script to Steal Developer Environment Files

A malicious npm package impersonating the widely trusted TanStack project was discovered on April 29, 2026, silently stealing developer environment files the moment it was installed. The attacker registered the …

Apps

New xlabs_v1 Botnet Targets Minecraft Servers Through ADB-Exposed Android Devices

A newly identified botnet called xlabs_v1 has been found targeting Minecraft game servers by exploiting Android devices with the Android Debug Bridge (ADB) port left open and exposed to the …

Apps

Microsoft Defender Mistakenly Flags DigiCert Root Certificates as Malware

Microsoft Defender triggered widespread false positive alerts after a faulty security update caused it to flag two legitimate DigiCert root certificates as malicious, potentially disrupting SSL/TLS validation and code-signing operations …

Apps

Trellix Source Code Breach – Hackers Gain Unauthorized Access to Repository

Cybersecurity giant Trellix has disclosed a significant security incident involving unauthorized access to a portion of its source code repository. The company confirmed the breach in an official statement published …

Apps

Hackers Breach Government and Military Servers by Exploiting cPanel Vulnerability

A sophisticated adversarial campaign targeting South-East Asian government and military infrastructure, combining rapid exploitation of a critical cPanel authentication bypass with a custom zero-day exploit chain against an Indonesian defense-sector …

Apps

Multiple Exim Mail Server Vulnerabilities Leads to Crash with Malicious DNS data

The Exim development team has released version 4.99.2 to address four newly discovered security vulnerabilities affecting their mail server software. These flaws allow attackers to potentially crash servers, corrupt memory, …

Apps

Attackers Deploy AiTM Phishing Pages to Access SharePoint, HubSpot, and Google Workspace

Threat actors are rapidly shifting their intrusion tradecraft toward high-speed, SaaS-centric attacks that completely bypass traditional endpoint security. Since October 2025, security researchers have tracked two distinct adversaries, identified as …

Posts navigation

Older posts
Newer posts

Recent Posts

  • Gunra Ransomware Expands RaaS Operations After Shifting From Conti-Based Locker
  • OpenClaw Chain Vulnerabilities Expose 245,000 Public AI Agent Servers to Attack
  • Shai-Hulud Worm Steals npm, GitHub, AWS, and Kubernetes Secrets From Developers
  • Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens
  • Microsoft Edge, Windows 11 and LiteLLM Hacked in Pwn2Own Berlin 2026

Archives

  • May 2026
  • April 2026
  • March 2026

Categories

  • Apps
Let's Connect!
Copyright © 2026 Hawkeye Cybersecurity. Veteran Owned and Operated.