Skip to content
December 27, 2025
  • ShadowPad APT Weaponizes WSUS RCE CVE-2025-59287
  • Behind the Surge: UK Sees Four Major Cyber Incidents Weekly
  • North Korean Hackers Hit UAV Industry with Job Offer Malware
  • EDR vs Antivirus for Small Business: What to Buy in 2025

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • Cl0p ransomware breach affecting Barts Health NHS Trust with stolen patient, staff, and supplier invoice data exposed on the dark web.

    Cl0p Attack Hits Barts Health: Full Invoice Database Leaked

    3 weeks ago3 weeks ago
  • Capita headquarters with cybersecurity overlay showing breach timeline

    Capita Data Breach 2023: ICO Fine Reveals the True Cost of Delay

    2 months ago2 months ago
  • Ollama AI server parsing a malicious GGUF model file that leads to remote code execution vulnerability

    Ollama Under Fire: Code Execution in Popular LLM Framework

    1 month ago1 month ago
  • LANSCOPE Endpoint Manager vulnerability alert screen – CVE-2025-61932

    LANSCOPE Endpoint Manager Zero-Day Added to CISA KEV List

    2 months ago2 months ago
  • New macOS XCSSET malware variant targets Firefox and cryptocurrency wallets

    New XCSSET macOS Malware Variant Targets Firefox with Clipper Module

    3 months ago
  • Lanscope Endpoint Manager zero-day exploitation chain with RCE and lateral movement

    Lanscope Endpoint Manager Zero-Day Under Attack

    2 months ago2 months ago
Security researcher analysing Malet macOS malware dataset with Katalina static analysis tool on a MacBook
  • LATEST
  • Malware
  • vulnerability

Public macOS malware dataset Malet supports better EDR

yohanmanuja1 month ago1 month ago07 mins

macOS now attracts serious attention from nation-state and criminal actors, especially credential stealers. A new public dataset, Malet, and a static analysis tool, Katalina, give defenders large-scale visibility into Mach-O malware traits. Teams can use them to tune EDR, test vendor claims, and finally treat Mac fleets as first-class citizens.

Read More
DraftKings credential-stuffing breach exposing customer data and betting account information
  • Data Breaches

DraftKings Accounts Targeted in Credential-Stuffing Wave

yohanmanuja3 months ago3 months ago34 mins

Online betting platform DraftKings has confirmed a credential-stuffing breach exposing customer data. Attackers reused leaked passwords from past breaches to gain access to DraftKings accounts, compromising personal details, account balances, and transaction history. Users are advised to reset passwords and enable multi-factor authentication immediately.

Read More
Confucius hackers launch WooperStealer and Anondoor campaign in Pakistan
  • Malware

Confucius APT Unleashes WooperStealer, Anondoor in Pakistan

yohanmanuja3 months ago3 months ago03 mins

Confucius hackers launched a phishing campaign in Pakistan deploying WooperStealer and Anondoor malware using PPSX and LNK files to compromise sensitive systems.

Read More
Diagram of ClickFix-style attack using Grok and ChatGPT to deliver malware through user-executed commands
  • AI
  • Data Breaches
  • LATEST
  • Malware
  • vulnerability

ClickFix AI Attack Uses Grok and ChatGPT to Deliver Malware

yohanmanuja2 weeks ago2 weeks ago07 mins

A new ClickFix-style attack abuses Grok and ChatGPT to deliver malware by convincing users to run malicious commands disguised as troubleshooting advice. This article explains how the attack works and how defenders can detect and prevent it.

Read More
Spyware alerts dashboard showing global threat activity and Linux backdoor indicators
  • LATEST
  • Malware
  • National Security

ThreatsDay Bulletin: Spyware Alerts and Emerging Global Malware

yohanmanuja2 weeks ago2 weeks ago15 mins

This week’s ThreatsDay Bulletin highlights rising spyware alerts, global scanning activity, and new Linux backdoor threats essential insight for defenders and SOC teams.

Read More
Diagram illustrating Windows BitLocker vulnerability exploit paths
  • Data Breaches
  • LATEST
  • vulnerability

New BitLocker Vulnerabilities Threaten Windows Data Protection

yohanmanuja2 months ago2 months ago36 mins

Security researchers uncovered multiple vulnerabilities in Microsoft’s BitLocker encryption, exposing Windows systems to data theft, privilege escalation, and bypass attacks. This article analyzes the flaws, their potential impact, and how organizations can secure encrypted drives against exploitation.

Read More
Hackers leak Qantas customer data after ransom deadline expires
  • Data Breaches
  • LATEST

Hackers Dump Qantas Data Online After Ransom Deadline Ends

yohanmanuja3 months ago3 months ago14 mins

Hackers have leaked data stolen from Qantas Airways after the airline missed a ransom deadline. The leak includes customer identifiers, flight data, and communication logs. Authorities are working with ACSC and AFP Cybercrime Operations to contain exposure and verify authenticity.

Read More
Zimbra ICS calendar exploit injecting JavaScript into webmail session
  • LATEST
  • vulnerability
  • Zeroday

ICS Calendar XSS Risk: New Zimbra Zero-Day Exploit Revealed

yohanmanuja3 months ago3 months ago04 mins

Researchers discovered a zero-day in Zimbra webmail where malicious JavaScript injected into .ICS calendar files executes within session context — allowing attackers to steal emails, credentials, and forward mail.

Read More
X.com login security key re-enrollment replacing twitter.com
  • LATEST

X Drops Twitter.com: Update Keys And Passkeys Fast

yohanmanuja2 months ago2 months ago05 mins

X plans to retire the twitter.com domain for WebAuthn. Consequently, accounts that use hardware security keys or passkeys must re-enroll under x.com. Otherwise, access can break. This guide explains why re-enrollment matters, how to do it safely, and what SOC teams should monitor during the transition.

Read More
Three interconnected cloud icons labelled as major providers feeding into a central “internet” node, with a broken configuration symbol triggering warning triangles
  • LATEST

Cloudflare, Azure, AWS Outages: The Striking Pattern

yohanmanuja1 month ago1 month ago010 mins

Within four weeks, AWS, Azure and Cloudflare all suffered major outages triggered by internal configuration and metadata failures rather than attacks. This article unpacks the Cloudflare–Azure–AWS outage pattern, examines how cloud centralisation amplifies these incidents and outlines realistic resilience moves for IT, SRE and security teams.

Read More
  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (UK)
English (United States)