Skip to content
November 12, 2025
  • Oracle EBS Zero-Day Fallout: More Victims Emerge
  • Exploit Published for Sudo CVE-2025-32463 Urgent Patch Needed
  • Cl0p-Linked Hackers Launch New Data-Leak Campaign
  • Governing AI at Scale and Speed: A Practical Security Framework

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • Cisco ASA/FTD firewall under attack, unexpected reload warning on dashboard

    Cisco ASA/FTD Attack Forces Reloads Update Immediately

    6 days ago6 days ago
  • StealIt malware abusing NodeJS SingleFile module to exfiltrate sensitive data from compromised environments

    Open-Source Module Abused by StealIt Malware for Data Theft

    1 month ago1 month ago
  • AWS data-centre racks and network cables lit by red warning lights

    Massive AWS Outage Oct 2025: Snapchat, Fortnite & Amazon Hit

    3 weeks ago3 weeks ago
  • Firefox browser extensions data-collection disclosure

    Mandatory Data-Disclosure for Firefox Extensions Takes Effect

    3 weeks ago3 weeks ago
  • TP-Link Omada gateway vulnerability diagram showing remote command injection path

    TP-Link Omada Gateways Hit by Critical Command Injection Flaw

    3 weeks ago3 weeks ago
  • Russia 24-hour SIM cooling-off after roaming or 72h inactivity, data and SMS paused

    Russia Adds 24-Hour SIM Cooling-Off After Roaming

    5 hours ago5 hours ago
Diagram illustrating DLL side‑loading delivering PlugX and Bookworm malware
  • LATEST
  • Malware
  • National Security

PlugX and Bookworm Deployed via DLL Side‑Loading in Targeted Cyber Espionage Campaign

yohanmanuja2 months ago2 months ago03 mins

A sophisticated cyber campaign used DLL side‑loading to deliver a hybrid PlugX variant and the Bookworm backdoor to telecom and ASEAN networks, revealing renewed tactics by China‑linked threat actors.

Read More
Cisco ASA/FTD firewall under attack, unexpected reload warning on dashboard
  • Data Breaches
  • LATEST
  • vulnerability

Cisco ASA/FTD Attack Forces Reloads Update Immediately

yohanmanuja6 days ago6 days ago04 mins

A new attack variant against Cisco Secure Firewall ASA/FTD can force unexpected reloads, dropping VPNs and disrupting edge traffic. Reduce exposure, apply fixed releases, and harden management access. Validate HA under load and stream telemetry off-box to preserve evidence while you monitor for recurrence.

Read More
CabinetRAT backdoor cyberattack warning from Ukraine
  • LATEST
  • Malware

CERT-UA Issues Alert on CabinetRAT Backdoor Cyber Threat

yohanmanuja1 month ago1 month ago23 mins

Ukraine’s CERT-UA has warned that CabinetRAT backdoor malware is being actively deployed in cyber espionage campaigns targeting government and critical networks.

Read More
Malware analyst examining bitmap image used by Caminho loader to conceal .NET payload via LSB steganography
  • LATEST
  • Malware
  • vulnerability

Defending Against Caminho Loader’s Image-based Delivery Chain

yohanmanuja3 weeks ago3 weeks ago13 mins

The Brazilian-origin Caminho Loader uses least significant bit (LSB) steganography to hide .NET payloads inside image files, enabling fileless malware delivery across South America, Africa and Eastern Europe. This advanced threat demands immediate action from security teams.

Read More
EvilAI malware as AI tool disguise
  • AI
  • LATEST

EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations

yohanmanuja1 month ago1 month ago23 mins

EvilAI operators are hiding malware in legitimate-looking AI tools that appear functional and signed, enabling reconnaissance, browser data exfiltration, and encrypted C2 communication across global targets.

Read More
Garden Bitcoin bridge hack ~$11M drained after AML flags
  • Data Breaches
  • LATEST

Garden Bitcoin Bridge Breach: Validate Deposits and Harden Keys

yohanmanuja2 weeks ago2 weeks ago05 mins

Garden, a fast BTC bridge, was drained for roughly $11 million days after AML concerns surfaced about flows tied to prior thefts. Consequently, exchanges, market makers, and bridge integrators should validate exposure, add watchlists for tainted flows, and harden solver, deployer, and validator controls before operations resume.

Read More
Apple logo over digital circuit background
  • Bypass
  • LATEST
  • Zeroday

Apple Devices Vulnerable to ASLR Bypass Through JSON Serialization Trick

yohanmanuja2 months ago2 months ago24 mins

Google’s Project Zero team uncovered a method to bypass ASLR on Apple devices by exploiting NSDictionary’s JSON serialization behavior, potentially weakening memory protections.

Read More
A diagram showing how LAPS and AD Tiering stop a Pass-the-Hash attack. The attack is blocked both laterally between workstations by LAPS and vertically between tiers by the tiering model
  • LATEST
  • TOPICS

Your Small AD Blueprint: LAPS, Tiering, and PtH Control

yohanmanuja5 days ago5 days ago010 mins

Pass-the-Hash succeeds when local admin passwords repeat and admins sign in everywhere. Small ADs can end that pattern fast. Use Windows LAPS to rotate a unique secret per device and enforce a Tier 0/1/2 admin model so privileged credentials never roam. Add Credential Guard and LSA Protection to shrink theft opportunities.

Read More
Harrods store exterior in London, photo by Cedric Weber
  • Data Breaches
  • LATEST

Harrods Warns Customers of Data Breach Involving Third-Party Provider

yohanmanuja2 months ago2 months ago03 mins

Harrods informed loyalty program members of a data breach tied to a third-party provider. The luxury retailer is investigating and urging customer caution.

Read More
Illustration showing ChatGPT’s Atlas Browser manipulated by hidden prompt injection commands
  • LATEST
  • vulnerability

ChatGPT’s Atlas Browser Vulnerable to Prompt Injection Exploits

yohanmanuja2 weeks ago2 weeks ago45 mins

Security researchers revealed that ChatGPT’s Atlas Browser can be manipulated through hidden prompt injections, allowing attackers to hijack AI behavior, leak data, and bypass safeguards. Learn how it works and how to defend against it.

Read More
  • 1
  • …
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (UK)
English (United States)