Skip to content
February 12, 2026
  • CVE-2025-25065: Zimbra RSS SSRF Vulnerability Unpacked
  • How Zombie APIs Resurface and Expand Attack Paths
  • NVIDIA’s China Stance: No Active Talks on Blackwell, What It Is
  • AI-Powered Phishing and Cloud Malware Push Threats

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • BRICKSTORM malware used in Chinese cyber operations targeting VMware vSphere and government networks

    CISA Report on Chinese Operations: BRICKSTORM Malware

    2 months ago2 months ago
  • FBI and French law enforcement cyber team seizing a ransomware leak site

    Leak Site Tied to Scattered Spider Seized by FBI and French Police

    4 months ago4 months ago
  • Critical Oracle E-Business Suite vulnerability enabling privilege escalation across enterprise systems

    New Oracle E-Business Suite Flaw Enables Privilege Escalation

    4 months ago4 months ago
  • Threat actors exploiting genAI platforms and trusted cloud apps to breach manufacturing networks and exfiltrate intellectual property

    AI-Powered Phishing and Cloud Malware Push Threats

    3 months ago3 months ago
  • Custom illustration showing fake software installers with TamperedChef branding dropping a hidden JavaScript backdoor on a workstation.

    TamperedChef Malware Uses Fake Installers in Global Campaign

    3 months ago3 months ago
  • Cyber-attacker silhouette against web code analyzing Adobe Commerce session exploit

    Adobe Commerce Security Crisis: SessionReaper Exploits Escalate

    4 months ago4 months ago
OpenAI Sora interface with character generation settings
  • AI
  • LATEST

Sora Update: Creator Control and Revenue Models for Characters

yohanmanuja4 months ago4 months ago14 mins

OpenAI plans to give content owners greater control over how their characters appear in Sora, moving toward an opt-in model and instituting revenue-sharing for participating rights holders.

Read More
Custom graphic depicting a motherboard’s SPI bus with a TPM module and decrypted BitLocker volume icon
  • LATEST
  • vulnerability

BitLocker Encryption Bypassed: TPM SPI Attack on PIN Method

yohanmanuja4 months ago4 months ago85 mins

A breakthrough hardware-based technique intercepts TPM communications over the SPI bus to unlock BitLocker volumes protected by TPM + PIN. This article analyses the method and its implications for enterprise encryption strategies.

Read More
Capita headquarters with cybersecurity overlay showing breach timeline
  • Data Breaches
  • LATEST

Capita Data Breach 2023: ICO Fine Reveals the True Cost of Delay

yohanmanuja4 months ago4 months ago24 mins

Capita’s £14 million penalty for its 2023 data breach affecting 6.6 million people shows how detection without swift response leads to disaster. This in-depth breakdown explores the incident, lessons for CISOs, and the rising cost of regulatory failures.

Read More
Fake Microsoft Teams download page (teams‑install.icu) used to deliver Oyster backdoor
  • LATEST
  • Malware

Weaponized “Microsoft Teams” Installer Delivers Oyster Backdoor via Poisoned Search Results

yohanmanuja5 months ago5 months ago14 mins

A targeted malvertising campaign redirected users from Bing to a fake Teams download site, where a signed MSTeamsSetup.exe installed the Oyster backdoor — blocked just in time by Microsoft Defender ASR.

Read More
SOC analyst reviewing CISA Known Exploited Vulnerabilities catalog alert highlighting five actively exploited CVEs on screen
  • LATEST
  • vulnerability

CISA Adds Five Exploited Vulnerabilities Immediate Patch Steps

yohanmanuja4 months ago4 months ago46 mins

CISA added five actively exploited vulnerabilities to its Known Exploited Vulnerabilities catalog. This article provides a CVE-by-CVE technical breakdown, enterprise impact assessment, detection and mitigation actions, and prioritized remediation guidance for security operations teams. Includes an AEO-optimized FAQ and verified external sources.

Read More
Custom graphic showing Chrome browser extensions being used to hijack WhatsApp Web interface
  • LATEST
  • Malware
  • vulnerability

Chrome Extensions Hijack WhatsApp Web: 131 Add-ons Exposed

yohanmanuja4 months ago4 months ago24 mins

A widespread campaign exploited the Chrome Web Store to distribute 131 rebranded extensions that hijack WhatsApp Web for automated bulk messaging. These add-ons pose a significant risk to organizations and users alike, demanding immediate review of extension governance and messaging platform protections.

Read More
Huawei headquarters building with data stream graphics symbolizing cyber breach
  • Data Breaches
  • LATEST

Huawei Data Breach Exposes Partner and Employee Information

yohanmanuja4 months ago4 months ago14 mins

Huawei confirmed a data breach stemming from a compromised vendor system, exposing partner and employee records. Security experts warn of new supply-chain risks.

Read More
Map showing global distribution of exposed F5 BIG-IP devices tracked by Shadowserver
  • LATEST
  • vulnerability

F5 BIG-IP Exposure: 266,000 Devices Still Open to Remote Attacks

yohanmanuja4 months ago4 months ago43 mins

Shadowserver has identified over 266,000 F5 BIG-IP devices exposed to remote attack after a breach revealed undisclosed vulnerabilities. Organizations must act now to mitigate potential exploitation.

Read More
AWS data-centre racks and network cables lit by red warning lights
  • LATEST
  • National Security
  • Outage

Massive AWS Outage Oct 2025: Snapchat, Fortnite & Amazon Hit

yohanmanuja4 months ago4 months ago44 mins

On October 20, 2025, a critical outage at AWS’s US-EAST-1 region triggered a cascading failure that knocked out major apps and services worldwide. This article dissects the root cause, impact, and what organisations must do now to shore up resilience.

Read More
Exposed Cisco ASA firewall devices with threat overlay & Red Hat GitLab breach visualization
  • AI
  • Bypass
  • Data Breaches
  • Malware

Cisco Firewalls at Risk as Red Hat Reports GitLab Security Incident

yohanmanuja4 months ago4 months ago13 mins

Despite Cisco’s warnings, many ASA/FTD firewalls remain vulnerable. Simultaneously, threat actors claim they breached Red Hat’s GitLab instance. This article merges both crisis points and guides the fixes.

Read More
  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (UK)
English (United States)