Skip to content
December 28, 2025
  • Zoom for Enterprise: close DLL path attacks, move to 6.3.10 today
  • Volkswagen Group Under 8Base Cyber Attack Data Exposure
  • Redis Users Warned: Decade-Old Bug Now Exploited in Wild
  • npm typosquat targets GitHub Actions to steal tokens and artifacts

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • Gootloader return showing SEO-poisoned template site, stealth font swap, and ZIP dropping JavaScript

    Gootloader Revival Targets Legal-Doc Searches With Fresh Tactics

    2 months ago2 months ago
  • Huawei headquarters building with data stream graphics symbolizing cyber breach

    Huawei Data Breach Exposes Partner and Employee Information

    3 months ago3 months ago
  • Cisco firewall under attack, illustrative exploit boundary overflow

    Cisco Firewall Vulnerability CVE-20333 Allows RCE — Update Now

    3 months ago3 months ago
  • Cyber-espionage campaign architecture showing Neursite and NeuralExecutor implant workflow

    PassiveNeuron APT Exposed: Inside Neursite Malware

    2 months ago2 months ago
  • China National Time Service Centre Shaanxi with cyber-attack visual overlay

    China’s National Time Agency Targeted by U.S. Cyber Espionage

    2 months ago2 months ago
  • Custom illustration showing fake software installers with TamperedChef branding dropping a hidden JavaScript backdoor on a workstation.

    TamperedChef Malware Uses Fake Installers in Global Campaign

    1 month ago1 month ago
Grafana vulnerability exploit CVE-2025 critical risk
  • Bypass
  • vulnerability

Grafana Users Urged to Patch Critical Exploit Affecting Dashboards

yohanmanuja3 months ago3 months ago13 mins

A newly disclosed Grafana vulnerability is under active exploitation, with attackers targeting enterprise dashboards and infrastructure. Security teams must apply patches immediately.

Read More
China issues bounty on Taiwan psyops unit amid cross-strait cyber tensions
  • LATEST
  • National Security

China Issues Arrest Bounty Over Taiwan Psyops Campaign

yohanmanuja3 months ago3 months ago24 mins

China’s Ministry of State Security (MSS) has announced a bounty for information on members of Taiwan’s psychological warfare unit, accusing them of separatist activities and cyber influence campaigns. The move signals an escalation in cross-strait information warfare and a growing overlap between propaganda and cybersecurity operations.

Read More
TikTok post showing a ‘Wanted: dead or alive’ message targeting Pam Bondi
  • Data Breaches
  • LATEST

Pam Bondi TikTok Threat: Tech Firms Hand Over User Data to FBI

yohanmanuja2 months ago2 months ago14 mins

When a TikTok video depicting a “wanted: dead or alive” poster of U.S. Attorney General Pam Bondi appeared, major platforms responded. This article unpacks how TikTok, Google and Comcast cooperated with the FBI, the device and IP information they provided, and the broader implications for how threats on social media become federal investigations.

Read More
New macOS XCSSET malware variant targets Firefox and cryptocurrency wallets
  • Malware

New XCSSET macOS Malware Variant Targets Firefox with Clipper Module

yohanmanuja3 months ago12 mins

A new XCSSET malware variant for macOS introduces a clipboard hijacker to steal cryptocurrency and expands to Firefox browser data theft. Security researchers warn developers to inspect Xcode projects and apply strong defenses against this evolving threat.

Read More
Enterprise dashboard showing AI agent governance metrics at scale
  • AI
  • LATEST

Governing AI at Scale and Speed: A Practical Security Framework

yohanmanuja2 months ago2 months ago14 mins

As organisations deploy hundreds of AI agents each year, security teams face unprecedented risk. This article outlines a robust framework to govern AI at scale, align speed with control and embed security from day one.

Read More
smartphone screen showing “Unpaid Toll Notice” and red alert icon
  • LATEST
  • Malware

Smishing Triad Toll-Text Scam: What Security Teams Must Know

yohanmanuja2 months ago2 months ago03 mins

A sophisticated mobile-fraud campaign dubbed the Smishing Triad is spoofing toll-agency alerts and flooding users with fake unpaid-toll texts. Read on for how the scam works and how to defend your devices.

Read More
Windows Recovery Environment screen showing USB keyboard and mouse input failure”
  • LATEST

Microsoft Fixes USB Input Bug in Windows Recovery

yohanmanuja2 months ago2 months ago15 mins

Microsoft’s emergency out-of-band update (KB5070773) fixes a USB input failure in the Windows Recovery Environment that impacted Windows 11 and Server 2025 devices. This article explains the bug, affected platforms, and recommended actions for IT professionals.

Read More
Diagram of Chrome browser exploitation via ROP chain and WebAssembly memory attack
  • vulnerability

Chrome Remote Code Execution Exposed!! What You Need to Do

yohanmanuja3 months ago3 months ago03 mins

A recently disclosed Chrome RCE exploit uses Wasm and JavaScript to manipulate memory and execute shellcode in the browser. Update to version M137.0.7151.57 immediately to prevent remote compromise.

Read More
Canadian prime minister and U.S. president face off over tariffs, with a Reagan quote on screen and a trade graph fading into the background
  • LATEST
  • National Security

PM Apologizes to Trump after Reagan Anti-Tariff Spot

yohanmanuja2 months ago2 months ago04 mins

A Reagan-themed anti-tariff ad paused U.S.–Canada talks. Canada’s prime minister apologized to Trump, seeking to cool tempers, protect exporters, and restart negotiations.

Read More
Fake-hotel-booking site screen with travel brand logos used for credential harvesting
  • LATEST
  • Malware
  • Scam

Russian Travel Phishing Ring Used 4,300 Fake Hotel Booking Sites

yohanmanuja1 month ago1 month ago24 mins

A threat actor has registered over 4,300 look-alike hotel booking domains, launching a large-scale phishing campaign that impersonates major travel brands to steal payment card data from unsuspecting guests.

Read More
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (UK)
English (United States)