Skip to content
Hawkeye Cybersecurity
Menu
  • Home
  • Services
  • About Us
  • Cybersecurity News
  • Contact

Category: Apps

Home » Apps » Page 8
Apps

FBI and CISA Released Zero Trust Principles Implementation Guide for OT Environments

The FBI and CISA, the Department of Energy (DOE), and defense partners published a joint intelligence document. Titled “Adapting Zero Trust Principles to Operational Technology,” this guide provides critical infrastructure …

Apps

SAP npm Packages Compromised to Harvest Developer and CI/CD Secrets

A new supply chain attack dubbed “mini Shai Hulud” has compromised four SAP-related npm packages by injecting malicious preinstall scripts that silently execute during dependency installation, targeting developer environments and …

Apps

Lazarus Hackers Attacking macOS Users With ‘Mach-O Man’ Malware Kit

North Korea’s state-sponsored Lazarus Group has unleashed a newly identified, modular macOS malware kit dubbed “Mach-O Man” a sophisticated, four-stage attack chain targeting fintech executives, crypto developers, and high-value enterprise …

Apps

Brinker Introduces a Novel Approach to Deepfake Detection

WILMINGTON, Delaware, April 29th, 2026, CyberNewswire Malicious intent-based deepfake detection shifts the focus from purely technical analysis to real-world risk and impact Brinker, recently named “Narrative Intelligence Solution of the …

Apps

Cursor AI Coding Agent Vulnerability Allow Attackers to Execute Code on Developer’s Machine

A high-severity vulnerability in Cursor, one of the most widely used AI-powered coding environments today, has put developers at direct risk of remote code execution. Tracked as CVE-2026-26268, the flaw …

Apps

SLOTAGENT Malware Uses API Hashing and Encrypted Strings to Hinder Reverse Engineering

A newly identified malware called SLOTAGENT has drawn attention in the cybersecurity community for its strong ability to resist analysis and avoid detection. The malware does not rely on brute …

Apps

New BlobPhish Attack Leverages Browser Blob Objects to Steal Users’ Login Credentials

A sophisticated, memory-resident phishing campaign called BlobPhish, active since October 2024, that exploits browser Blob URL APIs to silently steal credentials from Microsoft 365 users, major U.S. banks, and financial …

Apps

Critical GitHub.com and Enterprise Server RCE Vulnerability Enables Full Server Compromise

A critical remote code execution (RCE) vulnerability tracked as CVE-2026-3854 in GitHub’s internal git infrastructure that could have allowed any authenticated user to compromise backend servers, access millions of private …

Apps

Microsoft Confirms Remote Desktop Warnings May Display Incorrectly After April Update

Microsoft has officially acknowledged a known issue in its April 2026 Windows 11 cumulative update: Remote Desktop Protocol (RDP) security warning dialogs may render incorrectly on certain system configurations, a …

Apps

Checkmarx Confirms GitHub Repository Data Published on Dark Web

Application security testing firm Checkmarx has confirmed a significant escalation in its ongoing security incident. Cybercriminals have officially published company data on the dark web. This new development directly ties …

Posts navigation

Older posts
Newer posts

Recent Posts

  • Gunra Ransomware Expands RaaS Operations After Shifting From Conti-Based Locker
  • OpenClaw Chain Vulnerabilities Expose 245,000 Public AI Agent Servers to Attack
  • Shai-Hulud Worm Steals npm, GitHub, AWS, and Kubernetes Secrets From Developers
  • Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens
  • Microsoft Edge, Windows 11 and LiteLLM Hacked in Pwn2Own Berlin 2026

Archives

  • May 2026
  • April 2026
  • March 2026

Categories

  • Apps
Let's Connect!
Copyright © 2026 Hawkeye Cybersecurity. Veteran Owned and Operated.