Skip to content
December 28, 2025
  • MonoLock Ransomware: What Security Teams Must Know Today
  • Hardening HashiCorp Vault after CVE-2025-13357 LDAP bypass
  • NSO Group Loses U.S. Court Case on WhatsApp Hacking Claims
  • EDR vs Antivirus for Small Business: What to Buy in 2025

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • A conceptual image of a Microsoft 365 firewall blocking a malicious red email representing a BEC attack, while allowing safe emails to pass through, symbolizing effective security rules

    Block BEC: 9 Microsoft 365 Rules That Actually Work

    2 months ago2 months ago
  • Iran-aligned phishing campaign targeting US policy experts via prefilled Microsoft 365 portals and RMM persistence

    Iran-Linked Phishing Hits US Policy Experts with M365 and RMM

    2 months ago2 months ago
  • Confucius hackers launch WooperStealer and Anondoor campaign in Pakistan

    Confucius APT Unleashes WooperStealer, Anondoor in Pakistan

    3 months ago3 months ago
  • ConnectWise Automate update attack vulnerability diagram

    ConnectWise Automate: Securing Updates Against AiTM Attacks

    2 months ago2 months ago
  • AI-generated deepfake masks over digital profiles representing modern fraud

    AI-Powered Fraud Is Exploding: Why Cybercriminals Are Winning

    1 month ago1 month ago
  • Android photo frame downloads malware at boot and executes payloads on restart

    Android Photo Frames Download Malware, Granting Control

    1 month ago1 month ago
Diagram of BADCANDY re-infection on Cisco IOS XE from exposed web UI with patch and exposure controls
  • vulnerability

Critical Risk: BADCANDY Re-Infection on Unpatched IOS XE

yohanmanuja2 months ago2 months ago06 mins

BADCANDY continues to compromise exposed Cisco IOS XE devices via CVE-2023-20198. Close the web UI exposure, patch now, rotate credentials, and verify eradication.

Read More
Salesforce user dashboard with a red alert icon representing unauthorized access via connected applications.
  • Data Breaches
  • LATEST
  • vulnerability

Unauthorized Data Access in Salesforce Published Applications

yohanmanuja1 month ago1 month ago19 mins

Salesforce has flagged a significant incident where applications published by Gainsight enabled unauthorized access to customer data via OAuth tokens. This article breaks down what happened, why third-party integrations are the new attack surface, and how defenders can respond immediately.

Read More
Cloud-AI budget drain vulnerability caused by misconfigured permissions in Cursor and AWS Bedrock
  • LATEST

How Cursor and AWS Bedrock Can Trigger Runaway Cloud Costs

yohanmanuja3 weeks ago3 weeks ago06 mins

A misconfiguration in Cursor’s integration with AWS Bedrock allows non-admin users or attackers with minimal access to raise spending caps and drain cloud budgets rapidly. Here’s what happened, why it matters, and how to secure your AI-cloud environment.

Read More
Hacktivists target critical infrastructure through a decoy water plant used for studying cyberattacks
  • Bypass

Hackers Claim Water Plant Attack But It Was a Honeypot All Along

yohanmanuja3 months ago3 months ago05 mins

A new cyberattack demonstrates how hacktivists target critical infrastructure with increasing precision. In this case, attackers believed they breached a real water treatment facility, yet the environment was a sophisticated decoy — a honeypot designed to study intrusions into industrial control systems (ICS).

Read More
Illustration showing YouTube logo with malware download links emerging from
  • LATEST
  • Malware
  • vulnerability

YouTube Malware Campaign Uses 3,000+ Compromised Videos

yohanmanuja2 months ago2 months ago14 mins

Threat actors behind a coordinated network on YouTube have uploaded over 3,000 videos that masquerade as software tutorials and cheat walkthroughs, yet lead to credential‐stealer malware downloads. The operation uses compromised channels, fake engagement and download links to evade detection posing a new category of platform-based threat for security teams.

Read More
Cisco ASA firewall zero-day exploit campaign illustration
  • LATEST

Cisco ASA Zero-Day Alerts Ignored, Thousands of Devices at Risk

yohanmanuja3 months ago3 months ago33 mins

Despite Cisco and global agencies issuing urgent zero-day alerts, nearly 48,000 Cisco ASA firewalls remain vulnerable and exposed to ongoing exploit campaigns.

Read More
Android photo frame downloads malware at boot and executes payloads on restart
  • LATEST
  • Malware
  • vulnerability

Android Photo Frames Download Malware, Granting Control

yohanmanuja1 month ago1 month ago34 mins

Researchers identified Android-based photo frames that auto-download malware at boot, then execute payloads after each restart. Consequently, attackers gain control on rooted devices with disabled SELinux and weak signing.

Read More
FBI takedown of ShinyHunters’ Salesforce extortion site in 2025 coordinated with Europol
  • Malware
  • Ransomware

FBI Operation Shuts Down ShinyHunters’ Extortion Site

yohanmanuja3 months ago3 months ago04 mins

Federal authorities dismantled the ShinyHunters group’s Salesforce-branded extortion site, marking a major victory against cybercrime networks that traded in stolen corporate data and customer credentials.

Read More
Signed RMM installers let attackers enroll logistics endpoints and hijack dispatch workflows to steal cargo
  • LATEST
  • National Security

Cyber Gangs Use RMM to Hijack Freight Loads

yohanmanuja2 months ago2 months ago04 mins

Criminal crews deploy legitimate RMM tools inside carriers and brokers, then hijack booking and dispatch to steal real freight. This body explains how access lands, which artifacts reveal the intrusion, and what controls stop RMM-driven cargo theft without breaking logistics operations or delaying shipments.

Read More
AI psychosis concept - glowing brain illustration representing risks of prolonged chatbot use
  • AI
  • LATEST

Google Warns of ‘AI Psychosis’ in New Safety Report

yohanmanuja3 months ago3 months ago03 mins

Google has warned of “AI psychosis” a hidden risk where prolonged chatbot interactions could distort user beliefs and behaviors. Its latest safety report calls for industry standards and oversight, highlighting risks to children, social well-being, and democratic discourse.

Read More
  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)