Skip to content
November 12, 2025
  • GootLoader’s comeback: hidden filenames, ZIP-JS payloads
  • npm typosquat targets GitHub Actions to steal tokens and artifacts
  • Rhadamanthys disruption derails credential-theft campaigns
  • Windows admins: prioritize November zero-day and RCE

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • GootLoader returns with web-font obfuscation on WordPress and SEO-poisoned downloads

    GootLoader’s comeback: hidden filenames, ZIP-JS payloads

    4 hours ago4 hours ago
  • npm typosquat “@acitons/artifact” exfiltrating GitHub Actions tokens during postinstall in CI

    npm typosquat targets GitHub Actions to steal tokens and artifacts

    4 hours ago4 hours ago
  • Rhadamanthys disruption locking out criminal control panels and servers

    Rhadamanthys disruption derails credential-theft campaigns

    4 hours ago4 hours ago
  • Windows Patch Tuesday fixes kernel zero-day and GDI+ zero-click RCE

    Windows admins: prioritize November zero-day and RCE

    4 hours ago4 hours ago
  • Russia 24-hour SIM cooling-off after roaming or 72h inactivity, data and SMS paused

    Russia Adds 24-Hour SIM Cooling-Off After Roaming

    4 hours ago4 hours ago
  • Zoom for Windows security update blocks DLL hijacking and privilege escalation (CVE-2025-49457)

    Zoom for Enterprise: close DLL path attacks, move to 6.3.10 today

    17 hours ago17 hours ago
Diagram of Chrome browser exploitation via ROP chain and WebAssembly memory attack
  • vulnerability

Chrome Remote Code Execution Exposed!! What You Need to Do

yohanmanuja1 month ago1 month ago03 mins

A recently disclosed Chrome RCE exploit uses Wasm and JavaScript to manipulate memory and execute shellcode in the browser. Update to version M137.0.7151.57 immediately to prevent remote compromise.

Read More
Signal app with German flag and encryption shield graphic
  • LATEST
  • National Security

Signal Urges Germany Not to “Capitulate” to Client-Side Scanning

yohanmanuja1 month ago1 month ago04 mins

Signal has called on Germany to reject the EU’s chat control proposal, warning that client-side scanning would break encryption, facilitate surveillance, and undermine trust in private communication.

Read More
Oracle EBS server under assault, Cl0p zero-day exploit scenario
  • LATEST
  • vulnerability
  • Zeroday

CVE-2025-61882: Oracle’s Emergency Patch After Cl0p Exploits

yohanmanuja1 month ago1 month ago13 mins

A zero-day vulnerability in Oracle E-Business Suite, CVE-2025-61882, has been actively exploited by Cl0p in data theft campaigns. Oracle’s emergency patch addresses unauthenticated remote code execution in the BI Publisher integration component.

Read More
OpenAI Sora interface with character generation settings
  • AI
  • LATEST

Sora Update: Creator Control and Revenue Models for Characters

yohanmanuja1 month ago1 month ago04 mins

OpenAI plans to give content owners greater control over how their characters appear in Sora, moving toward an opt-in model and instituting revenue-sharing for participating rights holders.

Read More
Zimbra ICS calendar exploit injecting JavaScript into webmail session
  • LATEST
  • vulnerability
  • Zeroday

ICS Calendar XSS Risk: New Zimbra Zero-Day Exploit Revealed

yohanmanuja1 month ago1 month ago04 mins

Researchers discovered a zero-day in Zimbra webmail where malicious JavaScript injected into .ICS calendar files executes within session context — allowing attackers to steal emails, credentials, and forward mail.

Read More
Exposed Cisco ASA firewall devices with threat overlay & Red Hat GitLab breach visualization
  • AI
  • Bypass
  • Data Breaches
  • Malware

Cisco Firewalls at Risk as Red Hat Reports GitLab Security Incident

yohanmanuja1 month ago1 month ago13 mins

Despite Cisco’s warnings, many ASA/FTD firewalls remain vulnerable. Simultaneously, threat actors claim they breached Red Hat’s GitLab instance. This article merges both crisis points and guides the fixes.

Read More
South Korea cyber defense center monitoring national networks after major breaches
  • Data Breaches
  • National Security
  • vulnerability

South Korea’s Cybersecurity Under Fire After Another Major Breach

yohanmanuja1 month ago1 month ago24 mins

South Korea’s cybersecurity faces unprecedented strain after months of continuous data breaches across public and private sectors, revealing deep governance and policy flaws.

Read More
WireTap attack with DDR4 bus interposer extracting Intel SGX attestation key
  • Malware
  • vulnerability

Beyond Speculation: Physical DDR4 Tap Undercuts SGX Security

yohanmanuja1 month ago1 month ago03 mins

WireTap shows how a passive DDR4 interposer can recover Intel SGX attestation keys under physical access. The attack reframes trust in SGX-based services and demands stronger physical and cryptographic safeguards.

Read More
TikTok search bar showing explicit suggestion to a child account
  • National Security

Algorithmic Fail: TikTok Sends Minors Explicit Search Suggestions

yohanmanuja1 month ago1 month ago24 mins

Despite enabling safety filters, child accounts on TikTok have received explicit content suggestions via search. This investigation reveals algorithmic failures and urges stronger oversight for youth protection.

Read More
Browser-based CometJacking attack using WebSockets to hijack bandwidth
  • AI
  • Data Breaches
  • LATEST
  • vulnerability

CometJacking Turns Browser Sessions into Covert Proxy Channels

yohanmanuja1 month ago1 month ago15 mins

CometJacking abuses browser WebSockets to hijack user connections, turning them into proxy nodes with a single click. The exploit marks a new wave of malware-less attacks that rely on web technologies rather than traditional payloads.

Read More
  • 1
  • …
  • 16
  • 17
  • 18
  • 19
  • 20
  • …
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (UK)
English (United States)