Skip to content
February 11, 2026
  • TP-Link Archer Routers Affected by Severe Security Vulnerability
  • WhatsApp Rolls Out Lockdown-Style Mode to Protect Users
  • Instagram Data Leak Exposes Sensitive Information of Millions
  • Exploited VMware Vulnerabilities Used by Chinese-Linked Hackers

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • Critical TP-Link Archer router vulnerability exposing home and small office networks to remote attacks

    TP-Link Archer Routers Affected by Severe Security Vulnerability

    2 weeks ago2 weeks ago
  • WhatsApp Lockdown Mode interface showing restricted features and enhanced security protections

    WhatsApp Rolls Out Lockdown-Style Mode to Protect Users

    2 weeks ago2 weeks ago
  • Instagram data leak exposing sensitive information of millions of user accounts

    Instagram Data Leak Exposes Sensitive Information of Millions

    1 month ago1 month ago
  • Chinese-linked hackers targeting VMware infrastructure through exploited vulnerabilities

    Exploited VMware Vulnerabilities Used by Chinese-Linked Hackers

    1 month ago1 month ago
  • UAT-7290 threat group targeting critical infrastructure systems with cyber attacks

    UAT-7290 Hackers Intensify Cyber Attacks on Critical Infrastructure

    1 month ago1 month ago
  • Europe encouraging local technology solutions over dominant global tech companies

    Europe Moves Away From Big Tech Companies Toward Local Tech

    1 month ago1 month ago
Diagram of Chrome browser exploitation via ROP chain and WebAssembly memory attack
  • vulnerability

Chrome Remote Code Execution Exposed!! What You Need to Do

yohanmanuja4 months ago4 months ago03 mins

A recently disclosed Chrome RCE exploit uses Wasm and JavaScript to manipulate memory and execute shellcode in the browser. Update to version M137.0.7151.57 immediately to prevent remote compromise.

Read More
Signal app with German flag and encryption shield graphic
  • LATEST
  • National Security

Signal Urges Germany Not to “Capitulate” to Client-Side Scanning

yohanmanuja4 months ago4 months ago14 mins

Signal has called on Germany to reject the EU’s chat control proposal, warning that client-side scanning would break encryption, facilitate surveillance, and undermine trust in private communication.

Read More
Oracle EBS server under assault, Cl0p zero-day exploit scenario
  • LATEST
  • vulnerability
  • Zeroday

CVE-2025-61882: Oracle’s Emergency Patch After Cl0p Exploits

yohanmanuja4 months ago4 months ago13 mins

A zero-day vulnerability in Oracle E-Business Suite, CVE-2025-61882, has been actively exploited by Cl0p in data theft campaigns. Oracle’s emergency patch addresses unauthenticated remote code execution in the BI Publisher integration component.

Read More
OpenAI Sora interface with character generation settings
  • AI
  • LATEST

Sora Update: Creator Control and Revenue Models for Characters

yohanmanuja4 months ago4 months ago14 mins

OpenAI plans to give content owners greater control over how their characters appear in Sora, moving toward an opt-in model and instituting revenue-sharing for participating rights holders.

Read More
Zimbra ICS calendar exploit injecting JavaScript into webmail session
  • LATEST
  • vulnerability
  • Zeroday

ICS Calendar XSS Risk: New Zimbra Zero-Day Exploit Revealed

yohanmanuja4 months ago4 months ago04 mins

Researchers discovered a zero-day in Zimbra webmail where malicious JavaScript injected into .ICS calendar files executes within session context — allowing attackers to steal emails, credentials, and forward mail.

Read More
Exposed Cisco ASA firewall devices with threat overlay & Red Hat GitLab breach visualization
  • AI
  • Bypass
  • Data Breaches
  • Malware

Cisco Firewalls at Risk as Red Hat Reports GitLab Security Incident

yohanmanuja4 months ago4 months ago13 mins

Despite Cisco’s warnings, many ASA/FTD firewalls remain vulnerable. Simultaneously, threat actors claim they breached Red Hat’s GitLab instance. This article merges both crisis points and guides the fixes.

Read More
South Korea cyber defense center monitoring national networks after major breaches
  • Data Breaches
  • National Security
  • vulnerability

South Korea’s Cybersecurity Under Fire After Another Major Breach

yohanmanuja4 months ago4 months ago24 mins

South Korea’s cybersecurity faces unprecedented strain after months of continuous data breaches across public and private sectors, revealing deep governance and policy flaws.

Read More
WireTap attack with DDR4 bus interposer extracting Intel SGX attestation key
  • Malware
  • vulnerability

Beyond Speculation: Physical DDR4 Tap Undercuts SGX Security

yohanmanuja4 months ago4 months ago03 mins

WireTap shows how a passive DDR4 interposer can recover Intel SGX attestation keys under physical access. The attack reframes trust in SGX-based services and demands stronger physical and cryptographic safeguards.

Read More
TikTok search bar showing explicit suggestion to a child account
  • National Security

Algorithmic Fail: TikTok Sends Minors Explicit Search Suggestions

yohanmanuja4 months ago4 months ago34 mins

Despite enabling safety filters, child accounts on TikTok have received explicit content suggestions via search. This investigation reveals algorithmic failures and urges stronger oversight for youth protection.

Read More
Browser-based CometJacking attack using WebSockets to hijack bandwidth
  • AI
  • Data Breaches
  • LATEST
  • vulnerability

CometJacking Turns Browser Sessions into Covert Proxy Channels

yohanmanuja4 months ago4 months ago15 mins

CometJacking abuses browser WebSockets to hijack user connections, turning them into proxy nodes with a single click. The exploit marks a new wave of malware-less attacks that rely on web technologies rather than traditional payloads.

Read More
  • 1
  • …
  • 29
  • 30
  • 31
  • 32
  • 33
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (UK)
English (United States)