Skip to content
February 11, 2026
  • TP-Link Archer Routers Affected by Severe Security Vulnerability
  • WhatsApp Rolls Out Lockdown-Style Mode to Protect Users
  • Instagram Data Leak Exposes Sensitive Information of Millions
  • Exploited VMware Vulnerabilities Used by Chinese-Linked Hackers

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • Critical TP-Link Archer router vulnerability exposing home and small office networks to remote attacks

    TP-Link Archer Routers Affected by Severe Security Vulnerability

    2 weeks ago2 weeks ago
  • WhatsApp Lockdown Mode interface showing restricted features and enhanced security protections

    WhatsApp Rolls Out Lockdown-Style Mode to Protect Users

    2 weeks ago2 weeks ago
  • Instagram data leak exposing sensitive information of millions of user accounts

    Instagram Data Leak Exposes Sensitive Information of Millions

    1 month ago1 month ago
  • Chinese-linked hackers targeting VMware infrastructure through exploited vulnerabilities

    Exploited VMware Vulnerabilities Used by Chinese-Linked Hackers

    1 month ago1 month ago
  • UAT-7290 threat group targeting critical infrastructure systems with cyber attacks

    UAT-7290 Hackers Intensify Cyber Attacks on Critical Infrastructure

    1 month ago1 month ago
  • Europe encouraging local technology solutions over dominant global tech companies

    Europe Moves Away From Big Tech Companies Toward Local Tech

    1 month ago1 month ago
FBI and French law enforcement cyber team seizing a ransomware leak site
  • LATEST

Leak Site Tied to Scattered Spider Seized by FBI and French Police

yohanmanuja4 months ago4 months ago13 mins

Global law enforcement has seized a dark web leak site allegedly operated by Scattered Spider, halting a notorious pipeline of stolen corporate data. Here’s what cybersecurity experts need to know about the takedown.

Read More
Senior cyber-weapons division executive working late, silhouetted by laptop code overlay
  • Data Breaches
  • LATEST

Russian Buyer, U.S. Cyber Tools, and an Executive on the Run

yohanmanuja4 months ago4 months ago14 mins

A former general manager at a top-tier cyber-weapons developer faces criminal charges after allegedly stealing eight trade secrets between 2022 and 2025 and selling them to a Russian buyer. The case underscores serious risks to national security, supply-chain oversight, and insider threat policies across the defense-cyber industry.

Read More
Qilin ransomware BYOVD hybrid attack diagram showing Linux payload and vulnerable driver abuse
  • Bypass
  • LATEST
  • Ransomware
  • vulnerability

How Qilin Uses BYOVD and Linux Payloads to Escape Detection

yohanmanuja4 months ago4 months ago25 mins

Qilin ransomware now combines a Linux payload with a BYOVD (Bring-Your-Own-Vulnerable-Driver) exploit, enabling affiliates to bypass endpoint controls and compromise virtualised and Windows environments. This briefing explains the attack chain, detection challenges, and immediate defensive steps security teams must apply.

Read More
Illustration showing ChatGPT’s Atlas Browser manipulated by hidden prompt injection commands
  • LATEST
  • vulnerability

ChatGPT’s Atlas Browser Vulnerable to Prompt Injection Exploits

yohanmanuja4 months ago4 months ago45 mins

Security researchers revealed that ChatGPT’s Atlas Browser can be manipulated through hidden prompt injections, allowing attackers to hijack AI behavior, leak data, and bypass safeguards. Learn how it works and how to defend against it.

Read More
LockBit 5.0 ransomware cross-platform Windows Linux ESXi attack
  • LATEST
  • Malware
  • Ransomware
  • vulnerability

LockBit 5.0 Ransomware Variant Targets Hypervisors and Servers

yohanmanuja4 months ago4 months ago34 mins

The latest version of the ransomware family known as LockBit has resurfaced with a potent new variant, LockBit 5.0, capable of striking Windows endpoints, Linux servers and VMware ESXi hypervisor platforms in one campaign. Organisations must reassess their ransomware defences and detection posture now.

Read More
Illustration of RedTiger infostealer targeting Discord and gaming credentials
  • LATEST
  • Malware
  • Tools

RedTiger Toolkit Repurposed: Stealing Discord Tokens and Wallets

yohanmanuja4 months ago4 months ago05 mins

A newly weaponized version of the open-source toolkit RedTiger is actively targeting Discord accounts and gaming credentials. This article examines the malware’s mechanics, why gamers and enterprises should care, and outlines a mitigation roadmap.

Read More
Security analyst reviewing job-offer phishing email targeting drone manufacturer under Lazarus Group campaign
  • LATEST
  • Malware

North Korean Hackers Hit UAV Industry with Job Offer Malware

yohanmanuja4 months ago4 months ago33 mins

The Lazarus Group launched a sophisticated social-engineering campaign targeting European unmanned aerial vehicle (UAV) manufacturers via fake job offers to steal intellectual property and design data. Understanding the “Operation DreamJob” method, infection chain and mitigation is critical for defense supply-chain security.

Read More
Microsoft Copilot Studio agent interface illustrating token phishing redirection
  • LATEST
  • Malware

CoPhish Exploit Shows Trusted Microsoft Domains Aren’t Safe

yohanmanuja4 months ago4 months ago04 mins

A new phishing technique called CoPhish abuses Microsoft Copilot Studio agents to steal OAuth tokens via trusted Microsoft domains, bypassing traditional security filters and highlighting the growing threat within low-code platforms.

Read More
Custom graphic depicting a motherboard’s SPI bus with a TPM module and decrypted BitLocker volume icon
  • LATEST
  • vulnerability

BitLocker Encryption Bypassed: TPM SPI Attack on PIN Method

yohanmanuja4 months ago4 months ago85 mins

A breakthrough hardware-based technique intercepts TPM communications over the SPI bus to unlock BitLocker volumes protected by TPM + PIN. This article analyses the method and its implications for enterprise encryption strategies.

Read More
AI ransomware lifecycle automating attack stages using machine learning
  • AI
  • LATEST
  • Malware
  • Ransomware

AI Ransomware Revolution: What Security Teams Must Know

yohanmanuja4 months ago4 months ago44 mins

AI-powered ransomware is revolutionizing cybercrime. Using artificial intelligence, attackers automate targeting, evasion, and encryption enabling self-learning, large-scale attacks that outpace human defenses.

Read More
  • 1
  • …
  • 19
  • 20
  • 21
  • 22
  • 23
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (UK)
English (United States)