Skip to content
February 11, 2026
  • LANSCOPE Endpoint Manager Zero-Day Added to CISA KEV List
  • Cloud Break: How Hackers Hijack IoT Through Cloud Firewalls
  • Malicious MCP Server Steals Secrets From Applications & Dev Environments
  • LAMEHUG Malware Uses AI to Generate Commands and Steal Data

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • Cisco firewall under attack, illustrative exploit boundary overflow

    Cisco Firewall Vulnerability CVE-20333 Allows RCE — Update Now

    4 months ago4 months ago
  • South Korea cyber defense center monitoring national networks after major breaches

    South Korea’s Cybersecurity Under Fire After Another Major Breach

    4 months ago4 months ago
  • Hackers breach Red Hat and GitHub to steal customer data

    Red Hat, GitHub Cyberattack Exposes Customer Information

    4 months ago4 months ago
  • Custom illustration showing a WordPress dashboard, W3 Total Cache plugin icon, and a warning overlay about CVE-2025-9501 command injection risk

    W3 Total Cache Plugin Bug Threatens Over 1 Million WordPress

    3 months ago3 months ago
  • SonicWall SMA1000 zero-day vulnerability exploitation targeting remote access infrastructure

    SonicWall SMA1000 Zero-Day Vulnerability Exploited in Attacks

    2 months ago2 months ago
  • Security analysts at a major U.S. bank reviewing a third-party vendor cyber breach and potential JPMorgan Citi data exposure on large security dashboards

    JPMorgan and Citi Face Data Exposure Fears After Major Breach

    3 months ago3 months ago
Massive LinkedIn-related data exposure revealing billions of structured professional records
  • Bypass
  • LATEST
  • Malware
  • vulnerability

LinkedIn-Related Data Exposure Sparks Global Phishing Risk

yohanmanuja2 months ago2 months ago06 mins

A massive misconfigured database exposed billions of LinkedIn-related records, enabling attackers to refine phishing, impersonation, and identity-based attacks. This investigative report examines how the leak happened and why its long-tail impact will persist for years.

Read More
Map showing Oracle-linked hacking campaign targeting global organizations.
  • Bypass
  • Data Breaches
  • vulnerability

Google Issues Warning on Expanding Oracle-Linked Threat Activity

yohanmanuja4 months ago4 months ago14 mins

Google has disclosed a widespread Oracle-linked hacking campaign impacting dozens of organizations across sectors including energy, tech, and logistics. The operation, active since mid-2025, exploited software integrations between vendors and clients marking one of the year’s most significant supply chain cyberattacks.

Read More
Malicious npm packages abusing cloud services and developer tools to distribute malware
  • Bypass
  • LATEST
  • Malware

Malicious npm Turn Developer Tools Into Attack Infrastructure

yohanmanuja1 month ago1 month ago24 mins

Malicious npm packages are being used as hidden attack infrastructure, abusing the open-source supply chain to distribute malware, evade detection, and compromise developer environments.

Read More
Illustration showing YouTube logo with malware download links emerging from
  • LATEST
  • Malware
  • vulnerability

YouTube Malware Campaign Uses 3,000+ Compromised Videos

yohanmanuja4 months ago4 months ago14 mins

Threat actors behind a coordinated network on YouTube have uploaded over 3,000 videos that masquerade as software tutorials and cheat walkthroughs, yet lead to credential‐stealer malware downloads. The operation uses compromised channels, fake engagement and download links to evade detection posing a new category of platform-based threat for security teams.

Read More
Europe encouraging local technology solutions over dominant global tech companies
  • LATEST
  • National Security
  • Privacy

Europe Moves Away From Big Tech Companies Toward Local Tech

yohanmanuja1 month ago1 month ago06 mins

Europe moves away from big tech companies toward regional technology alternatives driven by privacy, compliance, and digital sovereignty priorities.

Read More
MongoDB vulnerability exploit flow showing unauthorized database access through misconfigured access controls
  • Data Breaches
  • LATEST
  • vulnerability

MongoDB CVE-2025-14847 Affects Database Access Controls

yohanmanuja1 month ago1 month ago04 mins

A MongoDB vulnerability tracked as CVE-2025-14847 highlights how weaknesses in access control handling can expose database environments to unauthorized access and data compromise.

Read More
Student Hacker Sentenced for PowerSchool Cyberattack on Education Systems
  • Data Breaches
  • LATEST

Four-Year Sentence for Student Behind PowerSchool Data Breach

yohanmanuja4 months ago4 months ago15 mins

A college student has been sentenced to four years in federal prison for orchestrating a PowerSchool cyberattack that compromised sensitive education data. The case highlights growing concerns over insider-driven breaches targeting school information systems.

Read More
Redis database symbol with binary overflow highlighting CVE-2025-23345 critical flaw
  • vulnerability

Redis Users Warned: Decade-Old Bug Now Exploited in Wild

yohanmanuja4 months ago4 months ago04 mins

A Redis vulnerability (CVE-2025-23345) active for 13 years exposes servers to remote code execution. Rated CVSS 10.0, it affects millions of instances.

Read More
Cisco firewall under attack, illustrative exploit boundary overflow
  • LATEST
  • vulnerability
  • Zeroday

Cisco Firewall Vulnerability CVE-20333 Allows RCE — Update Now

yohanmanuja4 months ago4 months ago23 mins

A 0-day buffer overflow vulnerability in Cisco ASA and FTD devices, exploitable via WebVPN, allows unauthenticated remote code execution. Cisco has released patches and issued guidance for mitigation.

Read More
UK Cyber Security and Resilience Bill strengthens defenses for NHS, water, transport, and energy
  • LATEST
  • National Security
  • Privacy

UK Unveils Cyber Resilience Bill, Tougher Rules for NHS, Water

yohanmanuja3 months ago3 months ago14 mins

The UK introduced a Cyber Security and Resilience Bill to harden essential services and their suppliers. Consequently, regulators expand scope, speed incident reporting, and push provable resilience across NHS, water, transport, and energy.

Read More
  • 1
  • 2
  • 3
  • 4
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (UK)
English (United States)