Skip to content
December 27, 2025
  • Windows 10 ESU: KB5068781 fails with 0x800f0922 for some orgs
  • New MatrixPDF Attack Weaponizes PDFs for Phishing Campaigns
  • LandFall Android Spyware Resurfaces With WhatsApp-Delivered Payloads
  • Luxury Brand Impersonation Wave: 1,330 Domains

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • Browser notification panel hijacked by a malicious Matrix Push C2 interface delivering phishing alerts

    Matrix Push C2 Hijacks Browser Notifications for Stealth Phishing

    1 month ago1 month ago
  • Salesforce headquarters with digital lock overlay symbolizing data breach and extortion

    Salesforce Customers Targeted by Data-Theft Extortion Campaign

    3 months ago3 months ago
  • Illustration showing ChatGPT’s Atlas Browser manipulated by hidden prompt injection commands

    ChatGPT’s Atlas Browser Vulnerable to Prompt Injection Exploits

    2 months ago2 months ago
  • Microsoft Edge IE Mode security update interface showing lockdown options

    Microsoft Patches IE Mode Bug Exploited in Targeted Attacks

    2 months ago2 months ago
  • Engineer reviewing unmanned aerial vehicle in European drone facility under cyber-attack warning

    Lazarus Group and the European Drone Industry: What’s at Risk

    2 months ago2 months ago
  • Cl0p ransomware breach affecting Barts Health NHS Trust with stolen patient, staff, and supplier invoice data exposed on the dark web.

    Cl0p Attack Hits Barts Health: Full Invoice Database Leaked

    3 weeks ago3 weeks ago
Android logo overlaid by Rust gear icon, symbolizing memory-safe systems development
  • LATEST
  • vulnerability

How Rust Transformed Android Memory-Safety Vulnerabilities

yohanmanuja1 month ago1 month ago25 mins

Google’s push to adopt Rust across Android’s native-code stack has delivered remarkable results. Memory-safety bugs now account for less than 20 % of all platform vulnerabilities, and engineering teams are shipping faster with fewer rollbacks.

Read More
Spanish police dismantle GXC Team cybercrime syndicate in Europol-backed operation
  • National Security

Massive Cybercrime Group GXC Team Dismantled in Spain

yohanmanuja3 months ago3 months ago03 mins

Spanish authorities have dismantled the notorious GXC Team cybercrime syndicate, arresting its leader and several members in a joint operation with Europol.
The group allegedly ran large-scale credential theft, malware distribution, and financial fraud campaigns targeting victims across Europe and beyond.

Read More
Apple cyber-threat notification alert displayed conceptually across multiple countries
  • LATEST
  • Malware
  • vulnerability

Massive Apple Cyber-Threat Alert Hits 84 Countries: What It Means

yohanmanuja3 weeks ago3 weeks ago16 mins

Apple has issued a sweeping new round of cyber-threat notifications to users across 84 countries, signaling a global escalation in targeted spyware operations. This analysis explains what triggered the alerts, how attackers operate, and what high-risk users must do immediately.

Read More
Australia considers GitHub age restriction for child safety
  • Github
  • LATEST

Australia May Restrict GitHub for Kids Under 16

yohanmanuja3 months ago3 months ago13 mins

Australia’s eSafety Commissioner may classify GitHub as a social network and ban kids under 16 from using it. Officials argue GitHub’s social features resemble TikTok and Discord, but critics say the move could block young coders from learning and accessing open-source tools

Read More
Huawei headquarters building with data stream graphics symbolizing cyber breach
  • Data Breaches
  • LATEST

Huawei Data Breach Exposes Partner and Employee Information

yohanmanuja3 months ago3 months ago14 mins

Huawei confirmed a data breach stemming from a compromised vendor system, exposing partner and employee records. Security experts warn of new supply-chain risks.

Read More
Custom graphic depicting a motherboard’s SPI bus with a TPM module and decrypted BitLocker volume icon
  • LATEST
  • vulnerability

BitLocker Encryption Bypassed: TPM SPI Attack on PIN Method

yohanmanuja2 months ago2 months ago85 mins

A breakthrough hardware-based technique intercepts TPM communications over the SPI bus to unlock BitLocker volumes protected by TPM + PIN. This article analyses the method and its implications for enterprise encryption strategies.

Read More
Visualization of JSSmuggler JavaScript smuggling technique showing encoded script blocks used to deliver Windows malware.
  • LATEST
  • Malware
  • vulnerability

JSSmuggler Exposed: Insights Into JavaScript Smuggling Attacks

yohanmanuja3 weeks ago3 weeks ago25 mins

JSSmuggler uses JavaScript-based smuggling to hide and reassemble Windows malware at runtime, bypassing security tools and enabling advanced payload delivery. This analysis explains how it works and how defenders can counter it.

Read More
Apple logo over digital circuit background
  • Bypass
  • LATEST
  • Zeroday

Apple Devices Vulnerable to ASLR Bypass Through JSON Serialization Trick

yohanmanuja3 months ago3 months ago34 mins

Google’s Project Zero team uncovered a method to bypass ASLR on Apple devices by exploiting NSDictionary’s JSON serialization behavior, potentially weakening memory protections.

Read More
Concept illustration of Tim Cook’s silhouette fading into John Ternus against the Apple Park campus, symbolising Apple CEO succession.
  • LATEST

Tim Cook Rumors: How Apple Is Quietly Preparing Its Next CEO

yohanmanuja1 month ago1 month ago08 mins

Reports suggest Apple is intensifying CEO succession planning as Tim Cook approaches a natural retirement window. This analysis looks at the Tim Cook retirement rumors, John Ternus’ rise as the likely successor and how a carefully staged transition could shape Apple’s next decade.

Read More
TikTok search bar showing explicit suggestion to a child account
  • National Security

Algorithmic Fail: TikTok Sends Minors Explicit Search Suggestions

yohanmanuja3 months ago3 months ago34 mins

Despite enabling safety filters, child accounts on TikTok have received explicit content suggestions via search. This investigation reveals algorithmic failures and urges stronger oversight for youth protection.

Read More
  • 1
  • …
  • 32
  • 33
  • 34
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (UK)
English (United States)