Skip to content
February 11, 2026
  • Louvre Password Heist: Weak Credentials, Wide Open Risk
  • Malicious npm Packages Hide Code in Invisible Dependencies
  • UN Cybercrime Pact to Sign in Hanoi: What Analysts Should Know
  • Mandatory Data-Disclosure for Firefox Extensions Takes Effect

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • Engineer reviewing unmanned aerial vehicle in European drone facility under cyber-attack warning

    Lazarus Group and the European Drone Industry: What’s at Risk

    4 months ago4 months ago
  • Illustration of EtherRAT smart-contract RAT targeting Web3 developers via React2Shell exploit

    EtherRAT: North Korean targeting developers via React2Shell

    2 months ago2 months ago
  • Cybersecurity newsletter graphic with attack and vulnerability icons

    Cybersecurity Newsletter Weekly, Chrome 0-Day, 22.2 Tbps DDoS Attack & More

    5 months ago5 months ago
  • Smishing text claiming a lost iPhone was found, with fake iCloud link

    Lost iPhone Smishing: Don’t Tap “We Found Your Phone” Links

    3 months ago3 months ago
  • Japan’s Cybersecurity Shortcomings Exposed!! Rising Threats, Weak Defenses

    5 months ago5 months ago
  • Redis database symbol with binary overflow highlighting CVE-2025-23345 critical flaw

    Redis Users Warned: Decade-Old Bug Now Exploited in Wild

    4 months ago4 months ago
Signed RMM installers let attackers enroll logistics endpoints and hijack dispatch workflows to steal cargo
  • LATEST
  • National Security

Cyber Gangs Use RMM to Hijack Freight Loads

yohanmanuja3 months ago3 months ago04 mins

Criminal crews deploy legitimate RMM tools inside carriers and brokers, then hijack booking and dispatch to steal real freight. This body explains how access lands, which artifacts reveal the intrusion, and what controls stop RMM-driven cargo theft without breaking logistics operations or delaying shipments.

Read More
Cisco ASA firewall zero-day exploit campaign illustration
  • LATEST

Cisco ASA Zero-Day Alerts Ignored, Thousands of Devices at Risk

yohanmanuja4 months ago4 months ago33 mins

Despite Cisco and global agencies issuing urgent zero-day alerts, nearly 48,000 Cisco ASA firewalls remain vulnerable and exposed to ongoing exploit campaigns.

Read More
ChaosBot malware exploiting Cisco VPN and Active Directory passwords in global credential harvesting campaign
  • LATEST
  • Malware

New ChaosBot Campaign Hits Active Directory Logins

yohanmanuja4 months ago4 months ago23 mins

The ChaosBot malware campaign is exploiting Cisco VPN credentials and Active Directory passwords to infiltrate enterprise environments. By combining brute-force attacks with credential reuse, ChaosBot’s operators are building a fast-spreading botnet focused on corporate VPN and identity systems.

Read More
Malicious PyPI package disguised as SOCKS5 proxy tool
  • Bypass
  • Malware

Malicious PyPI Package Masquerades as SOCKS5 Proxy Tool

yohanmanuja4 months ago4 months ago13 mins

The PyPI “SoopSocks” package claims to be a SOCKS5 proxy solution but conceals backdoor capabilities, enabling attackers to control compromised systems remotely.

Read More
Fake “Safery” Chrome wallet exfiltrates seed phrases using Sui micro-transactions
  • LATEST
  • Malware
  • vulnerability

Fake “Safery” Chrome wallet exfiltrates seed phrases on Sui

yohanmanuja3 months ago3 months ago04 mins

A fake Chrome wallet called “Safery” steals seed phrases by encoding them into Sui addresses and sending dust transactions, allowing attackers to reconstruct mnemonics later. Consequently, users risk full account takeover. Enforce extension allowlists, remove unknown wallets, rotate seeds, and migrate assets to new addresses immediately.

Read More
TA585’s MonsterV2 malware attacking enterprise networks through phishing and supply chain compromise
  • LATEST
  • Malware

TA585’s MonsterV2 Malware Hits Finance and Enterprise Networks

yohanmanuja4 months ago4 months ago33 mins

Researchers have uncovered a new global campaign linked to the TA585 threat group, deploying a malware strain called MonsterV2. The campaign targets enterprise, finance, and industrial sectors, leveraging advanced persistence and evasion techniques to steal data and compromise corporate networks

Read More
  • 1
  • …
  • 34
  • 35
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (UK)
English (United States)