Skip to content
December 27, 2025
  • Cl0p Attack Hits Barts Health: Full Invoice Database Leaked
  • Google Workspace Email: Exact DKIM, SPF, and DMARC Settings
  • Australia May Restrict GitHub for Kids Under 16
  • ClayRat Android Spyware Expands Surveillance Reach

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • Conference hall in Hanoi showing cybersecurity delegates at United Nations treaty signing

    UN Cybercrime Pact to Sign in Hanoi: What Analysts Should Know

    2 months ago2 months ago
  • UK investigation into Yutong electric buses highlighting remote shutdown risk and OTA connectivity

    UK Scrutinizes Chinese E-Buses After Norway Kill-Switch Tests

    2 months ago2 months ago
  • Microsoft Edge scareware sensor blocking a fake support alert with local AI and SmartScreen integration

    Edge Security Upgrade: Faster Scareware and Pop-Up Blocking

    2 months ago2 months ago
  • showing zombie apps, APIs, and identities reappearing and the steps to detect and decommission them

    How Zombie APIs Resurface and Expand Attack Paths

    2 months ago2 months ago
  • Japan’s Cybersecurity Shortcomings Exposed!! Rising Threats, Weak Defenses

    3 months ago3 months ago
  • Security researchers reviewing Tor Galois onion encryption diagrams that explain how Counter Galois Onion protects relay traffic in the Tor network

    Tor Adopts Counter Galois Onion Encryption to Reinforce Security

    1 month ago1 month ago
Volkswagen Group headquarters Wolfsburg with cybersecurity data breach overlay
  • LATEST

Volkswagen Group Under 8Base Cyber Attack Data Exposure

yohanmanuja2 months ago2 months ago14 mins

Volkswagen Group faces a serious cybersecurity challenge after ransomware gang 8Base claimed to have stolen sensitive data from its global operations. The incident exposes growing supply-chain risks and highlights how industrial manufacturers remain prime targets for modern cyber-extortion campaigns.

Read More
Google lawsuit targets ‘Lighthouse’ smishing platform behind global SMS phishing
  • LATEST
  • Malware
  • vulnerability

Google sues China-based Lighthouse smishing network

yohanmanuja1 month ago1 month ago44 mins

Google filed a lawsuit in New York to disrupt “Lighthouse,” a phishing-as-a-service network behind large-scale smishing. Consequently, the case seeks injunctions, domain seizures, and damages. For defenders, the move creates detection windows as operators pivot infrastructure so tighten filters, accelerate takedowns, and harden fraud telemetry now.

Read More
Signal app with German flag and encryption shield graphic
  • LATEST
  • National Security

Signal Urges Germany Not to “Capitulate” to Client-Side Scanning

yohanmanuja3 months ago3 months ago14 mins

Signal has called on Germany to reject the EU’s chat control proposal, warning that client-side scanning would break encryption, facilitate surveillance, and undermine trust in private communication.

Read More
AI-generated deepfake masks over digital profiles representing modern fraud
  • AI
  • LATEST
  • Scam
  • vulnerability

AI-Powered Fraud Is Exploding: Why Cybercriminals Are Winning

yohanmanuja1 month ago1 month ago25 mins

AI-powered fraud is expanding at an unprecedented rate as criminals weaponize generative models, deepfakes and automated identity systems. Organizations must strengthen identity verification and adopt resilience-first strategies to withstand this next-generation threat.

Read More
TA585’s MonsterV2 malware attacking enterprise networks through phishing and supply chain compromise
  • LATEST
  • Malware

TA585’s MonsterV2 Malware Hits Finance and Enterprise Networks

yohanmanuja2 months ago2 months ago33 mins

Researchers have uncovered a new global campaign linked to the TA585 threat group, deploying a malware strain called MonsterV2. The campaign targets enterprise, finance, and industrial sectors, leveraging advanced persistence and evasion techniques to steal data and compromise corporate networks

Read More
Futuristic IDE view showing GPT-5.1 Codex as an autonomous coding agent connected to a secure pipeline
  • AI
  • LATEST
  • Privacy

GPT-5.1 Codex: Long-Horizon AI Agents Meet Enterprise Security

yohanmanuja1 month ago1 month ago18 mins

GPT-5.1 Codex-Max can now code independently for hours inside terminals, IDEs and Windows environments. That jump from helper to autonomous coding agent dramatically changes the threat model, turning AI-generated patches, permissions and pipelines into first-class security concerns.

Read More
DevSecOps engineer patching Docker Compose to v2.40.2 and reviewing compose artifact provenance
  • LATEST
  • vulnerability

Docker Compose Security Alert: CVE-2025-62725 Requires v2.40.2

yohanmanuja2 months ago2 months ago05 mins

Docker Compose CVE-2025-62725 enables path traversal that can overwrite host files from malicious compose artifacts. Update to v2.40.2, restrict sources, and audit caches.

Read More
Critical Oracle E-Business Suite vulnerability enabling privilege escalation across enterprise systems
  • Data Breaches
  • LATEST

New Oracle E-Business Suite Flaw Enables Privilege Escalation

yohanmanuja3 months ago3 months ago24 mins

Security researchers discovered a critical vulnerability in Oracle E-Business Suite (EBS) that enables privilege escalation across enterprise systems. The flaw, tracked under CVE-2025-31245, could allow attackers to execute administrative actions without proper authorization if left unpatched.

Read More
Malicious MCP server exfiltration concept illustration
  • AI
  • Data Breaches
  • LATEST
  • Malware

Malicious MCP Server Steals Secrets From Applications & Dev Environments

yohanmanuja3 months ago3 months ago13 mins

A malicious MCP server can exfiltrate API keys and sensitive data from applications, exposing how trust in developer frameworks can be abused.

Read More
Retail store playing AI-generated background music speaker
  • LATEST

AI-Generated Retail Soundtracks Threaten Belgian Music Revenue

yohanmanuja2 months ago2 months ago24 mins

Belgian chains such as Brico and Carrefour are increasingly playing AI-generated, royalty-free music in their stores to cut licensing costs. This shift could slash 25–28 % of public performance income for local artists, warn rights organizations. Here’s how the technology works, the risks it raises, and what defenses stakeholders must consider.

Read More
  • 1
  • …
  • 31
  • 32
  • 33
  • 34
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (UK)
English (United States)