Skip to content
November 12, 2025
  • GootLoader’s comeback: hidden filenames, ZIP-JS payloads
  • npm typosquat targets GitHub Actions to steal tokens and artifacts
  • Rhadamanthys disruption derails credential-theft campaigns
  • Windows admins: prioritize November zero-day and RCE

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • GootLoader returns with web-font obfuscation on WordPress and SEO-poisoned downloads

    GootLoader’s comeback: hidden filenames, ZIP-JS payloads

    6 hours ago6 hours ago
  • npm typosquat “@acitons/artifact” exfiltrating GitHub Actions tokens during postinstall in CI

    npm typosquat targets GitHub Actions to steal tokens and artifacts

    6 hours ago6 hours ago
  • Rhadamanthys disruption locking out criminal control panels and servers

    Rhadamanthys disruption derails credential-theft campaigns

    6 hours ago6 hours ago
  • Windows Patch Tuesday fixes kernel zero-day and GDI+ zero-click RCE

    Windows admins: prioritize November zero-day and RCE

    6 hours ago6 hours ago
  • Russia 24-hour SIM cooling-off after roaming or 72h inactivity, data and SMS paused

    Russia Adds 24-Hour SIM Cooling-Off After Roaming

    6 hours ago6 hours ago
  • Zoom for Windows security update blocks DLL hijacking and privilege escalation (CVE-2025-49457)

    Zoom for Enterprise: close DLL path attacks, move to 6.3.10 today

    20 hours ago20 hours ago
StealIt malware abusing NodeJS SingleFile module to exfiltrate sensitive data from compromised environments
  • LATEST
  • Malware
  • vulnerability

Open-Source Module Abused by StealIt Malware for Data Theft

yohanmanuja1 month ago1 month ago14 mins

Security researchers have identified a new StealIt malware campaign abusing the NodeJS SingleFile module to exfiltrate sensitive data from compromised environments. This JavaScript-based threat demonstrates how legitimate developer tools can be turned into effective espionage vectors within open-source ecosystems.

Read More
Cl0p ransomware breach targeting global organizations in 2025 data-leak campaign
  • Data Breaches
  • LATEST
  • vulnerability

Cl0p-Linked Hackers Launch New Data-Leak Campaign

yohanmanuja1 month ago1 month ago14 mins

A new Cl0p ransomware breach has hit dozens of organizations across finance, energy, and logistics sectors. Analysts warn the campaign marks a resurgence of the group’s dark-web leak operations, signaling a return to large-scale, supply-chain-style extortion attacks.

Read More
ClayRat Android spyware infection targeting users through state-sponsored mobile espionage
  • LATEST
  • Malware

ClayRat Android Spyware Expands Surveillance Reach

yohanmanuja1 month ago1 month ago33 mins

The newly discovered ClayRat Android spyware represents one of 2025’s most sophisticated state-sponsored mobile espionage tools. Designed to collect device data, intercept communications, and monitor app activity, ClayRat’s discovery highlights how Android remains a prime target in global intelligence operations.

Read More
Map showing Oracle-linked hacking campaign targeting global organizations.
  • Bypass
  • Data Breaches
  • vulnerability

Google Issues Warning on Expanding Oracle-Linked Threat Activity

yohanmanuja1 month ago1 month ago14 mins

Google has disclosed a widespread Oracle-linked hacking campaign impacting dozens of organizations across sectors including energy, tech, and logistics. The operation, active since mid-2025, exploited software integrations between vendors and clients marking one of the year’s most significant supply chain cyberattacks.

Read More
Data-leak sites hit an all-time high as ransomware groups expand dark web leak platforms
  • Data Breaches
  • LATEST

Massive Spike in Data-Leak Platforms Marks Cybercrime Shift

yohanmanuja1 month ago1 month ago04 mins

The number of data-leak sites hit an all-time high in 2025, marking a major escalation in the ransomware ecosystem. Threat groups expanded their leak operations across the dark web, with some running multiple extortion portals at once. Analysts say this surge reflects a fundamental shift in how ransomware crews monetize stolen data.

Read More
Hacktivists target critical infrastructure through a decoy water plant used for studying cyberattacks
  • Bypass

Hackers Claim Water Plant Attack But It Was a Honeypot All Along

yohanmanuja1 month ago1 month ago05 mins

A new cyberattack demonstrates how hacktivists target critical infrastructure with increasing precision. In this case, attackers believed they breached a real water treatment facility, yet the environment was a sophisticated decoy — a honeypot designed to study intrusions into industrial control systems (ICS).

Read More
DraftKings credential-stuffing breach exposing customer data and betting account information
  • Data Breaches

DraftKings Accounts Targeted in Credential-Stuffing Wave

yohanmanuja1 month ago1 month ago14 mins

Online betting platform DraftKings has confirmed a credential-stuffing breach exposing customer data. Attackers reused leaked passwords from past breaches to gain access to DraftKings accounts, compromising personal details, account balances, and transaction history. Users are advised to reset passwords and enable multi-factor authentication immediately.

Read More
Service Finder WordPress authentication bypass (CVE-2025-5947) enabling admin takeover
  • Bypass
  • vulnerability

Service Finder Plugin Flaw (CVE-2025-5947) Abused in Attacks

yohanmanuja1 month ago1 month ago15 mins

A critical vulnerability in the Service Finder Bookings plugin bundled with the Service Finder WordPress theme allows unauthenticated attackers to log in as administrators. The flaw, tracked as CVE-2025-5947, is actively exploited in the wild with a CVSS 9.8 rating. Users must patch immediately to prevent takeovers.

Read More
Chinese hackers weaponizing open-source code to target global infrastructure systems
  • Malware
  • vulnerability

Open-Source Projects Exploited by Chinese State-Backed Hackers

yohanmanuja1 month ago1 month ago14 mins

Security researchers have exposed a large-scale espionage campaign where Chinese hackers weaponized open-source tools to infiltrate critical infrastructure systems worldwide. The operation showcases a shift toward covert, community-blended tactics where public codebases become vectors for nation-state exploitation.

Read More
Google AI Vulnerability Reward Program banner offering up to $30,000 for critical flaws
  • Bug Bounty
  • LATEST

Google Rewards AI Vulnerability Reports With Up to $30K

yohanmanuja1 month ago1 month ago05 mins

Google has launched a new AI Vulnerability Reward Program (AI VRP) that pays up to $30,000 for critical flaws in its AI systems. Covering products such as Gemini, Search, and Workspace, the initiative bridges responsible AI research with traditional bug bounty frameworks, rewarding ethical hackers who strengthen AI security.

Read More
  • 1
  • …
  • 14
  • 15
  • 16
  • 17
  • 18
  • …
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (UK)
English (United States)