Skip to content
February 11, 2026
  • Claude Desktop Extensions Vulnerable to Command Injection
  • Russian Buyer, U.S. Cyber Tools, and an Executive on the Run
  • New BitLocker Vulnerabilities Threaten Windows Data Protection
  • Four-Year Sentence for Student Behind PowerSchool Data Breach

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • UK map with incident markers showing four nationally significant cyber attacks weekly

    Behind the Surge: UK Sees Four Major Cyber Incidents Weekly

    4 months ago4 months ago
  • KimWolf malware Android botnet infecting millions of mobile devices worldwide

    KimWolf Android Botnet Shows Growing Mobile Malware Threat

    1 month ago1 month ago
  • MongoDB vulnerability exploit flow showing unauthorized database access through misconfigured access controls

    MongoDB CVE-2025-14847 Affects Database Access Controls

    1 month ago1 month ago
  • Threat landscape shaping cybersecurity in 2025 with evolving attack vectors and defensive challenges

    Key Threats That Shaped the Cybersecurity Landscape in 2025

    1 month ago1 month ago
  • Illustration showing YouTube logo with malware download links emerging from

    YouTube Malware Campaign Uses 3,000+ Compromised Videos

    4 months ago4 months ago
  • Trust Wallet Chrome extension attack flow showing malicious code injection and wallet compromise

    Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk

    2 months ago2 months ago
Cyber threat escalation in modern manufacturing environments showing rising OT security risks, ransomware pressure and supply-chain exploitation.
  • Bypass
  • LATEST
  • vulnerability

2025 Manufacturing Under Siege: Cyber Threats Reach Levels

yohanmanuja2 months ago2 months ago05 mins

Manufacturers face the most dangerous cyber landscape in their industry’s history. Attackers now target OT systems, supply chains and intellectual property with unprecedented sophistication, creating widespread operational and financial impact.

Read More
Windows Patch Tuesday fixes kernel zero-day and GDI+ zero-click RCE
  • LATEST
  • vulnerability
  • Zeroday

Windows admins: prioritize November zero-day and RCE

yohanmanuja3 months ago3 months ago55 mins

Microsoft’s November update fixes an exploited Windows Kernel zero-day (CVE-2025-62215) and a critical zero-click GDI+ RCE (CVE-2025-60724). Therefore, prioritize domain controllers, management servers, upload-handling services, and developer workstations using WSLg. Then complete fleet rollout and validate Kerberos delegation settings to blunt identity abuse.

Read More
TruffleNet attack flow from stolen AWS keys to Amazon SES abuse and BEC
  • LATEST
  • vulnerability

TruffleNet: Stolen AWS Keys, SES Abuse, BEC Defense

yohanmanuja3 months ago3 months ago05 mins

TruffleNet validates stolen AWS keys, profiles accounts, and abuses Amazon SES to run high-leverage BEC. Therefore, clamp down on access keys, isolate SES to a low-trust account, and alert on first-seen identity actions. Consequently, you deny validation, break pivots, and stop invoice fraud before it lands.

Read More
Illustration of EtherRAT smart-contract RAT targeting Web3 developers via React2Shell exploit
  • Bypass
  • LATEST
  • Malware
  • vulnerability

EtherRAT: North Korean targeting developers via React2Shell

yohanmanuja2 months ago2 months ago14 mins

North Korean–linked attackers exploited a critical React2Shell vulnerability (CVE-2025-55182) to deploy a new smart-contract based RAT named EtherRAT. The malware uses Ethereum smart-contracts for C2 resolution, hides payloads through obfuscation, and employs multiple persistence mechanisms — a serious threat to Web3 and developer environments.

Read More
Cl0p ransomware breach affecting Barts Health NHS Trust with stolen patient, staff, and supplier invoice data exposed on the dark web.
  • Data Breaches
  • LATEST
  • Malware
  • vulnerability

Cl0p Attack Hits Barts Health: Full Invoice Database Leaked

yohanmanuja2 months ago2 months ago15 mins

Cl0p ransomware exploited a zero-day in Oracle E-Business Suite to steal years of invoice data from Barts Health NHS Trust. The leak exposed names, addresses, and payment info of patients, staff, and suppliers, now circulating on the dark web. Learn what was compromised, who’s at risk, and how to protect yourself.

Read More
Rhysida ransomware gang claims Maryland transportation hack
  • Malware
  • National Security
  • Ransomware

Rhysida Hackers Claim Attack on Maryland Department of Transportation

yohanmanuja5 months ago5 months ago13 mins

The Rhysida ransomware gang claims to have breached Maryland’s Department of Transportation, leaking personal data and demanding a $3.3 million ransom. Officials confirmed data loss affecting Maryland Transit Administration systems but said core services remain operational.

Read More
An architectural diagram showing an NGINX gateway performing API rate limiting, throttling a flood of abusive requests while allowing a steady stream to reach the backend service
  • LATEST
  • TOPICS

API Abuse Defense with NGINX: Best Practices + Snippets

yohanmanuja3 months ago3 months ago810 mins

API rate limiting protects capacity and user experience. This guide shows how to ship it correctly on NGINX: define limit_req zones, tune burst/nodelay, add per-IP and per-token limits, return proper 429s with Retry-After, and combine limit_conn for connection abuse. You’ll get production-ready snippets and a safe rollout plan.

Read More
Windows Recovery Environment screen showing USB keyboard and mouse input failure”
  • LATEST

Microsoft Fixes USB Input Bug in Windows Recovery

yohanmanuja4 months ago4 months ago15 mins

Microsoft’s emergency out-of-band update (KB5070773) fixes a USB input failure in the Windows Recovery Environment that impacted Windows 11 and Server 2025 devices. This article explains the bug, affected platforms, and recommended actions for IT professionals.

Read More
Microsoft Exchange 2016 and 2019 end of support notice on admin dashboard
  • LATEST

Microsoft Announces End of Support for Exchange Servers

yohanmanuja4 months ago4 months ago23 mins

Microsoft has officially ended support for Exchange Server 2016 and 2019, marking the end of a major on-premises email era.
Enterprises still running these versions now face significant security and compliance risks, as both will receive no further patches or updates.

Read More
Malicious MCP server exfiltration concept illustration
  • AI
  • Data Breaches
  • LATEST
  • Malware

Malicious MCP Server Steals Secrets From Applications & Dev Environments

yohanmanuja4 months ago4 months ago13 mins

A malicious MCP server can exfiltrate API keys and sensitive data from applications, exposing how trust in developer frameworks can be abused.

Read More
  • 1
  • …
  • 26
  • 27
  • 28
  • 29
  • 30
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (UK)
English (United States)