Skip to content
December 28, 2025
  • TeamViewer DEX Vulnerabilities Expose Enterprise Endpoint Risks
  • Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk
  • LangChain Core Vulnerability Highlights Risks in AI Frameworks
  • China-Linked Actors Abuse DNS in Advanced Espionage Malware

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • TeamViewer DEX vulnerability exposure affecting enterprise endpoint monitoring systems

    TeamViewer DEX Vulnerabilities Expose Enterprise Endpoint Risks

    1 day ago1 day ago
  • Trust Wallet Chrome extension attack flow showing malicious code injection and wallet compromise

    Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk

    1 day ago1 day ago
  • Critical LangChain Core vulnerability represented by a broken chain symbolizing insecure AI application logic

    LangChain Core Vulnerability Highlights Risks in AI Frameworks

    1 day ago1 day ago
  • China-linked cyber espionage malware abusing DNS traffic for stealthy command and control

    China-Linked Actors Abuse DNS in Advanced Espionage Malware

    1 day ago1 day ago
  • Parrot OS 7.0 security-focused Linux distribution showcasing updated desktop and penetration testing tools

    Parrot OS 7.0 Focuses on Reliable Penetration Testing Workflows

    2 days ago2 days ago
  • Cybersecurity threat landscape showing stealth malware loaders and AI-assisted attack techniques

    Stealth Malware Loaders and AI-Assisted Attacks Reshape

    2 days ago2 days ago
Illustration of EtherRAT smart-contract RAT targeting Web3 developers via React2Shell exploit
  • Bypass
  • LATEST
  • Malware
  • vulnerability

EtherRAT: North Korean targeting developers via React2Shell

yohanmanuja3 weeks ago3 weeks ago14 mins

North Korean–linked attackers exploited a critical React2Shell vulnerability (CVE-2025-55182) to deploy a new smart-contract based RAT named EtherRAT. The malware uses Ethereum smart-contracts for C2 resolution, hides payloads through obfuscation, and employs multiple persistence mechanisms — a serious threat to Web3 and developer environments.

Read More
SAP critical vulnerabilities affecting Solution Manager, Commerce Cloud, and jConnect SDK illustrated in an enterprise security diagram
  • LATEST
  • Malware
  • vulnerability

SAP Security Alert: Critical Flaws Enable Remote Code Execution

yohanmanuja3 weeks ago3 weeks ago05 mins

SAP has released fixes for three SAP critical vulnerabilities affecting Solution Manager, Commerce Cloud, and the jConnect SDK. These flaws enable remote code execution and unsafe deserialization, posing significant risk to enterprise systems. This article breaks down technical details and offers mitigation guidance.

Read More
Ransomware long-tail impact affecting Japanese industries and supply chains
  • LATEST
  • Malware
  • Ransomware
  • vulnerability

Japan’s Long-Term Struggle Against Persistent Ransomware

yohanmanuja3 weeks ago3 weeks ago06 mins

Japanese organizations continue facing ransomware incidents that cause months of operational disruption. This investigative analysis explores how long-tail damage unfolds, why attackers target Japan’s supply chain ecosystem, and how companies can strengthen long-term resilience.

Read More
Microsoft Patch Tuesday security update December 2025
  • Bypass
  • LATEST
  • vulnerability

December 9, 2025: Microsoft Patches 56 Vulnerabilities

yohanmanuja3 weeks ago3 weeks ago07 mins

Microsoft’s December 2025 Patch Tuesday delivers critical security updates — 56 vulnerabilities across Windows, Office, Exchange and more including three zero-day flaws. Attackers exploited at least one, making immediate patching vital for enterprise and personal systems alike.

Read More
CastleLoader malware loader architecture diagram — multi-stage infection chain
  • LATEST
  • Malware

CastleLoader Threat Clusters: What Enterprises Must Know Now

yohanmanuja3 weeks ago3 weeks ago16 mins

GrayBravo’s modular loader, CastleLoader, now powers four distinct threat clusters targeting logistics, travel, and enterprise users a clear sign of rapid MaaS expansion and rising risk for global organizations.

Read More
Storm-0249 ransomware attack chain showing ClickFix social engineering, fileless PowerShell execution, and DLL sideloading techniques
  • LATEST
  • Ransomware

Storm-0249’s Ransomware : What Security Teams Must Know

yohanmanuja3 weeks ago3 weeks ago15 mins

A chilling evolution: Storm-0249 has shifted from selling access to enabling full-blown ransomware campaigns. Their new combination of ClickFix social-engineering, fileless PowerShell and DLL sideloading dramatically increases stealth and persistence across enterprise environments.

Read More
Critical Ivanti Endpoint Manager vulnerability CVE-2025-10573 enabling stored XSS and admin session hijacking
  • Bypass
  • LATEST
  • Malware

Critical Ivanti Endpoint Code Execution Flaw Exposes Admin

yohanmanuja3 weeks ago3 weeks ago07 mins

A critical Ivanti Endpoint Manager code execution flaw, tracked as CVE-2025-10573, allows unauthenticated attackers to plant malicious JavaScript in the EPM dashboard and hijack admin sessions. This article explains how the bug works, which versions are affected, and how to patch and harden EPM cores.

Read More
Cloud-AI budget drain vulnerability caused by misconfigured permissions in Cursor and AWS Bedrock
  • LATEST

How Cursor and AWS Bedrock Can Trigger Runaway Cloud Costs

yohanmanuja3 weeks ago3 weeks ago06 mins

A misconfiguration in Cursor’s integration with AWS Bedrock allows non-admin users or attackers with minimal access to raise spending caps and drain cloud budgets rapidly. Here’s what happened, why it matters, and how to secure your AI-cloud environment.

Read More
Visualization of JSSmuggler JavaScript smuggling technique showing encoded script blocks used to deliver Windows malware.
  • LATEST
  • Malware
  • vulnerability

JSSmuggler Exposed: Insights Into JavaScript Smuggling Attacks

yohanmanuja3 weeks ago3 weeks ago25 mins

JSSmuggler uses JavaScript-based smuggling to hide and reassemble Windows malware at runtime, bypassing security tools and enabling advanced payload delivery. This analysis explains how it works and how defenders can counter it.

Read More
Polish authorities detaining suspects carrying advanced wireless hacking equipment near critical infrastructure
  • LATEST
  • National Security
  • vulnerability

Poland Detains Ukrainians Operating Covert Tech Infrastructure

yohanmanuja3 weeks ago3 weeks ago05 mins

Two Ukrainian nationals were arrested in Poland while carrying advanced hacking equipment capable of probing sensitive wireless networks. Their actions raised concerns about espionage operations targeting critical infrastructure, prompting a wider investigation into cross-border surveillance activities.

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (UK)
English (United States)