Skip to content
December 27, 2025
  • TeamViewer DEX Vulnerabilities Expose Enterprise Endpoint Risks
  • Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk
  • LangChain Core Vulnerability Highlights Risks in AI Frameworks
  • China-Linked Actors Abuse DNS in Advanced Espionage Malware

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • TeamViewer DEX vulnerability exposure affecting enterprise endpoint monitoring systems

    TeamViewer DEX Vulnerabilities Expose Enterprise Endpoint Risks

    5 hours ago5 hours ago
  • Trust Wallet Chrome extension attack flow showing malicious code injection and wallet compromise

    Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk

    5 hours ago5 hours ago
  • Critical LangChain Core vulnerability represented by a broken chain symbolizing insecure AI application logic

    LangChain Core Vulnerability Highlights Risks in AI Frameworks

    5 hours ago5 hours ago
  • China-linked cyber espionage malware abusing DNS traffic for stealthy command and control

    China-Linked Actors Abuse DNS in Advanced Espionage Malware

    5 hours ago5 hours ago
  • Parrot OS 7.0 security-focused Linux distribution showcasing updated desktop and penetration testing tools

    Parrot OS 7.0 Focuses on Reliable Penetration Testing Workflows

    1 day ago1 day ago
  • Cybersecurity threat landscape showing stealth malware loaders and AI-assisted attack techniques

    Stealth Malware Loaders and AI-Assisted Attacks Reshape

    1 day ago1 day ago
Widespread SonicWall SSL VPN account compromise using valid credentials across customer environments.
  • Data Breaches
  • vulnerability

Widespread SonicWall SSL VPN Compromise Confirmed

yohanmanuja3 months ago3 months ago25 mins

Researchers now track a widespread compromise of SonicWall SSL VPN accounts. Because attackers authenticate with valid credentials, defenders face rapid lateral movement and limited warning windows. Therefore, teams must review access logs, reissue secrets, and re-establish trust at the remote edge.

Read More
Hackers inject malicious code into trusted antivirus software installers.
  • Malware

Hackers Use Antivirus Installers as Trojan Delivery System

yohanmanuja3 months ago3 months ago04 mins

Hackers have corrupted trusted antivirus software installers, injecting malicious code that installs hidden malware instead of legitimate protection.
Security researchers warn that this supply chain compromise could expose enterprises and consumers to large-scale remote control and data theft.

Read More
Hackers exploit Velociraptor DFIR forensic tool to deploy hidden backdoors
  • Malware
  • vulnerability

Velociraptor DFIR Abused as New Tool for Cyber Espionage

yohanmanuja3 months ago3 months ago24 mins

Cybercriminals have found a way to turn Velociraptor an open-source DFIR and endpoint monitoring tool into a stealthy persistence mechanism, deploying hidden backdoors on compromised systems. Security researchers warn that trusted forensic tools are increasingly being repurposed for post-exploitation control.

Read More
Hackers exploit zero-day vulnerability in Gladinet CentreStack file-sharing software
  • vulnerability
  • Zeroday

Gladinet File-Sharing Platforms Targeted in Zero-Day Campaign

yohanmanuja3 months ago3 months ago13 mins

A critical zero-day vulnerability in Gladinet’s CentreStack file-sharing software is being actively exploited by attackers, allowing full remote system access and potential data exfiltration. Enterprises are urged to apply temporary mitigations until an official patch becomes available.

Read More
China issues bounty on Taiwan psyops unit amid cross-strait cyber tensions
  • LATEST
  • National Security

China Issues Arrest Bounty Over Taiwan Psyops Campaign

yohanmanuja3 months ago3 months ago24 mins

China’s Ministry of State Security (MSS) has announced a bounty for information on members of Taiwan’s psychological warfare unit, accusing them of separatist activities and cyber influence campaigns. The move signals an escalation in cross-strait information warfare and a growing overlap between propaganda and cybersecurity operations.

Read More
FBI takedown of ShinyHunters’ Salesforce extortion site in 2025 coordinated with Europol
  • Malware
  • Ransomware

FBI Operation Shuts Down ShinyHunters’ Extortion Site

yohanmanuja3 months ago3 months ago04 mins

Federal authorities dismantled the ShinyHunters group’s Salesforce-branded extortion site, marking a major victory against cybercrime networks that traded in stolen corporate data and customer credentials.

Read More
Apple bug bounty zero-click exploit reward reaching $2 million for iOS vulnerabilities
  • Bug Bounty
  • LATEST

Apple Bug Bounty Adds Bonus for Lockdown Bypass Finds

yohanmanuja3 months ago3 months ago25 mins

Apple has expanded its bug bounty program to reward researchers up to $2 million for zero-click exploit chains. Bonuses for Lockdown Mode bypasses and beta findings may push payouts even higher.

Read More
ChaosBot malware exploiting Cisco VPN and Active Directory passwords in global credential harvesting campaign
  • LATEST
  • Malware

New ChaosBot Campaign Hits Active Directory Logins

yohanmanuja3 months ago3 months ago23 mins

The ChaosBot malware campaign is exploiting Cisco VPN credentials and Active Directory passwords to infiltrate enterprise environments. By combining brute-force attacks with credential reuse, ChaosBot’s operators are building a fast-spreading botnet focused on corporate VPN and identity systems.

Read More
StealIt malware abusing NodeJS SingleFile module to exfiltrate sensitive data from compromised environments
  • LATEST
  • Malware
  • vulnerability

Open-Source Module Abused by StealIt Malware for Data Theft

yohanmanuja3 months ago3 months ago14 mins

Security researchers have identified a new StealIt malware campaign abusing the NodeJS SingleFile module to exfiltrate sensitive data from compromised environments. This JavaScript-based threat demonstrates how legitimate developer tools can be turned into effective espionage vectors within open-source ecosystems.

Read More
Cl0p ransomware breach targeting global organizations in 2025 data-leak campaign
  • Data Breaches
  • LATEST
  • vulnerability

Cl0p-Linked Hackers Launch New Data-Leak Campaign

yohanmanuja3 months ago3 months ago14 mins

A new Cl0p ransomware breach has hit dozens of organizations across finance, energy, and logistics sectors. Analysts warn the campaign marks a resurgence of the group’s dark-web leak operations, signaling a return to large-scale, supply-chain-style extortion attacks.

Read More
  • 1
  • …
  • 25
  • 26
  • 27
  • 28
  • 29
  • …
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (UK)
English (United States)