Skip to content
December 27, 2025
  • TeamViewer DEX Vulnerabilities Expose Enterprise Endpoint Risks
  • Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk
  • LangChain Core Vulnerability Highlights Risks in AI Frameworks
  • China-Linked Actors Abuse DNS in Advanced Espionage Malware

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • TeamViewer DEX vulnerability exposure affecting enterprise endpoint monitoring systems

    TeamViewer DEX Vulnerabilities Expose Enterprise Endpoint Risks

    9 hours ago9 hours ago
  • Trust Wallet Chrome extension attack flow showing malicious code injection and wallet compromise

    Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk

    9 hours ago9 hours ago
  • Critical LangChain Core vulnerability represented by a broken chain symbolizing insecure AI application logic

    LangChain Core Vulnerability Highlights Risks in AI Frameworks

    9 hours ago9 hours ago
  • China-linked cyber espionage malware abusing DNS traffic for stealthy command and control

    China-Linked Actors Abuse DNS in Advanced Espionage Malware

    9 hours ago9 hours ago
  • Parrot OS 7.0 security-focused Linux distribution showcasing updated desktop and penetration testing tools

    Parrot OS 7.0 Focuses on Reliable Penetration Testing Workflows

    1 day ago1 day ago
  • Cybersecurity threat landscape showing stealth malware loaders and AI-assisted attack techniques

    Stealth Malware Loaders and AI-Assisted Attacks Reshape

    1 day ago1 day ago
U.S. courthouse exterior symbolizing legal ruling against NSO Group’s WhatsApp spyware targeting
  • LATEST
  • Malware
  • National Security

NSO Group Loses U.S. Court Case on WhatsApp Hacking Claims

yohanmanuja2 months ago2 months ago15 mins

A U.S. court ordered Israeli spyware maker NSO Group to halt operations targeting WhatsApp and reduced damages in Meta’s lawsuit. The decision reinforces accountability for private surveillance firms accused of breaching digital privacy.

Read More
Global visualization showing Silver Fox Winos 4.0 expansion into Japan and Malaysia
  • LATEST
  • Malware

Silver Fox Winos 4.0 Malware Now Strikes in Japan and Malaysia

yohanmanuja2 months ago2 months ago34 mins

The Silver Fox group, long known for precision-targeted malware operations, has extended its Winos 4.0 campaign into Japan and Malaysia. Security experts now observe the deployment of HoldingHands RAT through malicious PDF attachments and deceptive software installers.

Read More
Zimbra SSRF vulnerability in RSS parser internal request
  • LATEST

CVE-2025-25065: Zimbra RSS SSRF Vulnerability Unpacked

yohanmanuja2 months ago2 months ago04 mins

Zimbra Collaboration’s RSS feed parser has a newly disclosed SSRF vulnerability (CVE-2025-25065). Attackers can abuse it to access internal endpoints and internal services that should remain isolated. This article explains how the flaw works, its potential impact, and how you can defend your environment.

Read More
South Korean repatriated detainees arriving at Incheon Airport escorted by security officers after Cambodia online scam arrests
  • LATEST
  • Scam

Seoul Investigates Returnees Linked to Cambodian Scam Network

yohanmanuja2 months ago2 months ago24 mins

Sixty-four South Koreans were repatriated from Cambodia and are now under investigation for alleged involvement in large-scale online scam networks. Their return follows a scandal involving a student’s death, prompting Seoul to launch a crackdown on illicit recruitment and fraud operations.

Read More
ConnectWise Automate update attack vulnerability diagram
  • LATEST

ConnectWise Automate: Securing Updates Against AiTM Attacks

yohanmanuja2 months ago2 months ago03 mins

ConnectWise has patched two critical vulnerabilities (CVE-2025-11492 & CVE-2025-11493) in its Automate platform that allowed adversary-in-the-middle attacks on software updates. MSPs and on-prem deployments must upgrade immediately to prevent malicious update injection and integrity bypass.

Read More
Retail store playing AI-generated background music speaker
  • LATEST

AI-Generated Retail Soundtracks Threaten Belgian Music Revenue

yohanmanuja2 months ago2 months ago24 mins

Belgian chains such as Brico and Carrefour are increasingly playing AI-generated, royalty-free music in their stores to cut licensing costs. This shift could slash 25–28 % of public performance income for local artists, warn rights organizations. Here’s how the technology works, the risks it raises, and what defenses stakeholders must consider.

Read More
Envoy Air Oracle Data Theft Attack Diagram
  • Data Breaches
  • LATEST
  • National Security

Oracle EBS Data Theft at Envoy Air Clop Campaign Overview

yohanmanuja2 months ago2 months ago24 mins

Envoy Air confirmed it was targeted in a Clop-linked campaign exploiting vulnerabilities in Oracle E-Business Suite. While the airline asserts no passenger data was affected, business records may have been stolen. This write-up breaks down the tactics, likely exploited CVEs, impacts, and what organizations must do next.

Read More
Map showing global distribution of exposed F5 BIG-IP devices tracked by Shadowserver
  • LATEST
  • vulnerability

F5 BIG-IP Exposure: 266,000 Devices Still Open to Remote Attacks

yohanmanuja2 months ago2 months ago43 mins

Shadowserver has identified over 266,000 F5 BIG-IP devices exposed to remote attack after a breach revealed undisclosed vulnerabilities. Organizations must act now to mitigate potential exploitation.

Read More
tech support scam impersonating Microsoft logo with fake browser lock overlay
  • LATEST

How the Microsoft Logo Is Being Used in Tech Support Scams

yohanmanuja2 months ago2 months ago14 mins

A new campaign runs a clever tech support scam by hijacking Microsoft’s trusted branding. Victims encounter fake emails, CAPTCHA checks, browser-locking overlays, and a bogus phone “helpdesk” all designed to steal credentials or remote access. This article breaks down how the scam works, real indicators, and how you can defend yourself.

Read More
Visualization of North Korean hackers using EtherHiding malware hidden in blockchain smart contracts on Ethereum and BNB Smart Chain
  • LATEST
  • Malware

How EtherHiding Lets Hackers Hide Malware on BSC & Ethereum

yohanmanuja2 months ago2 months ago24 mins

North Korea–linked hackers now embed JavaScript malware in blockchain smart contracts via EtherHiding. This stealthy method turns public blockchains into resilient drop zones. The multi-stage campaign includes JADESNOW and InvisibleFerret backdoors, demanding new defense strategies.

Read More
  • 1
  • …
  • 22
  • 23
  • 24
  • 25
  • 26
  • …
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (UK)
English (United States)