Skip to content
November 12, 2025
  • GootLoader’s comeback: hidden filenames, ZIP-JS payloads
  • npm typosquat targets GitHub Actions to steal tokens and artifacts
  • Rhadamanthys disruption derails credential-theft campaigns
  • Windows admins: prioritize November zero-day and RCE

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • GootLoader returns with web-font obfuscation on WordPress and SEO-poisoned downloads

    GootLoader’s comeback: hidden filenames, ZIP-JS payloads

    6 hours ago6 hours ago
  • npm typosquat “@acitons/artifact” exfiltrating GitHub Actions tokens during postinstall in CI

    npm typosquat targets GitHub Actions to steal tokens and artifacts

    6 hours ago6 hours ago
  • Rhadamanthys disruption locking out criminal control panels and servers

    Rhadamanthys disruption derails credential-theft campaigns

    6 hours ago6 hours ago
  • Windows Patch Tuesday fixes kernel zero-day and GDI+ zero-click RCE

    Windows admins: prioritize November zero-day and RCE

    6 hours ago6 hours ago
  • Russia 24-hour SIM cooling-off after roaming or 72h inactivity, data and SMS paused

    Russia Adds 24-Hour SIM Cooling-Off After Roaming

    6 hours ago6 hours ago
  • Zoom for Windows security update blocks DLL hijacking and privilege escalation (CVE-2025-49457)

    Zoom for Enterprise: close DLL path attacks, move to 6.3.10 today

    19 hours ago19 hours ago
Malware analyst examining bitmap image used by Caminho loader to conceal .NET payload via LSB steganography
  • LATEST
  • Malware
  • vulnerability

Defending Against Caminho Loader’s Image-based Delivery Chain

yohanmanuja3 weeks ago3 weeks ago13 mins

The Brazilian-origin Caminho Loader uses least significant bit (LSB) steganography to hide .NET payloads inside image files, enabling fileless malware delivery across South America, Africa and Eastern Europe. This advanced threat demands immediate action from security teams.

Read More
WordPress admin dashboard warning showing plugin vulnerability alert
  • LATEST
  • vulnerability

WordPress Plugin Vulnerabilities Lead to Mass Site Compromise

yohanmanuja3 weeks ago3 weeks ago04 mins

Hackers are conducting mass exploitation campaigns against outdated WordPress plugins, allowing remote code execution and full site compromise. This attack wave highlights the urgent need for timely updates and plugin security hygiene.

Read More
Graphic showing engineering consultancy data breach affecting homeowners in Ireland’s defective-block scheme
  • LATEST
  • National Security
  • vulnerability

Defective block homeowners’ data at risk following cyberattack

yohanmanuja3 weeks ago3 weeks ago03 mins

An engineering-consultant firm supporting Ireland’s defective-block grant scheme suffered a breach that may have exposed homeowner personal data. This article explains the incident, the risks and the lessons cybersecurity teams must apply.

Read More
smartphone screen showing “Unpaid Toll Notice” and red alert icon
  • LATEST
  • Malware

Smishing Triad Toll-Text Scam: What Security Teams Must Know

yohanmanuja3 weeks ago3 weeks ago03 mins

A sophisticated mobile-fraud campaign dubbed the Smishing Triad is spoofing toll-agency alerts and flooding users with fake unpaid-toll texts. Read on for how the scam works and how to defend your devices.

Read More
Malicious Python RAT disguised as a Minecraft mod installer screen for “Nursultan Client”
  • LATEST
  • Malware

Minecraft Mod Exploit: RAT Built in Python Targets Gaming PCs

yohanmanuja3 weeks ago3 weeks ago13 mins

A major rat campaign disguised as the Minecraft mod “Nursultan Client” is compromising gamers via a Python-based Trojan using Telegram bot infrastructure. This tool steals browser tokens, captures webcams, and uses a gamified lure to breach systems and security teams need to view gaming endpoints as serious risk zones.

Read More
Illustration showing YouTube logo with malware download links emerging from
  • LATEST
  • Malware
  • vulnerability

YouTube Malware Campaign Uses 3,000+ Compromised Videos

yohanmanuja3 weeks ago3 weeks ago04 mins

Threat actors behind a coordinated network on YouTube have uploaded over 3,000 videos that masquerade as software tutorials and cheat walkthroughs, yet lead to credential‐stealer malware downloads. The operation uses compromised channels, fake engagement and download links to evade detection posing a new category of platform-based threat for security teams.

Read More
Cyber-attacker silhouette against web code analyzing Adobe Commerce session exploit
  • LATEST
  • vulnerability

Adobe Commerce Security Crisis: SessionReaper Exploits Escalate

yohanmanuja3 weeks ago3 weeks ago03 mins

A newly disclosed flaw in Adobe Commerce (formerly Magento) dubbed “SessionReaper” enables attackers to hijack live customer sessions via the REST API. With proof-of-concept exploit code now public and over 250 attacks detected in a single day, administrators must act immediately.

Read More
Firefox browser extensions data-collection disclosure
  • LATEST

Mandatory Data-Disclosure for Firefox Extensions Takes Effect

yohanmanuja3 weeks ago3 weeks ago05 mins

Mozilla’s new policy for Firefox extensions mandates that developers clearly disclose any data collection or transmission, obtain user consent and categorize the data types. This marks a major shift in add-on privacy, placing transparency at the heart of the browser-extension ecosystem.

Read More
TikTok post showing a ‘Wanted: dead or alive’ message targeting Pam Bondi
  • Data Breaches
  • LATEST

Pam Bondi TikTok Threat: Tech Firms Hand Over User Data to FBI

yohanmanuja3 weeks ago3 weeks ago04 mins

When a TikTok video depicting a “wanted: dead or alive” poster of U.S. Attorney General Pam Bondi appeared, major platforms responded. This article unpacks how TikTok, Google and Comcast cooperated with the FBI, the device and IP information they provided, and the broader implications for how threats on social media become federal investigations.

Read More
Enterprise dashboard showing AI agent governance metrics at scale
  • AI
  • LATEST

Governing AI at Scale and Speed: A Practical Security Framework

yohanmanuja3 weeks ago3 weeks ago04 mins

As organisations deploy hundreds of AI agents each year, security teams face unprecedented risk. This article outlines a robust framework to govern AI at scale, align speed with control and embed security from day one.

Read More
  • 1
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • …
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (UK)
English (United States)