Skip to content
November 12, 2025
  • GootLoader’s comeback: hidden filenames, ZIP-JS payloads
  • npm typosquat targets GitHub Actions to steal tokens and artifacts
  • Rhadamanthys disruption derails credential-theft campaigns
  • Windows admins: prioritize November zero-day and RCE

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • GootLoader returns with web-font obfuscation on WordPress and SEO-poisoned downloads

    GootLoader’s comeback: hidden filenames, ZIP-JS payloads

    6 hours ago6 hours ago
  • npm typosquat “@acitons/artifact” exfiltrating GitHub Actions tokens during postinstall in CI

    npm typosquat targets GitHub Actions to steal tokens and artifacts

    6 hours ago6 hours ago
  • Rhadamanthys disruption locking out criminal control panels and servers

    Rhadamanthys disruption derails credential-theft campaigns

    6 hours ago6 hours ago
  • Windows Patch Tuesday fixes kernel zero-day and GDI+ zero-click RCE

    Windows admins: prioritize November zero-day and RCE

    6 hours ago6 hours ago
  • Russia 24-hour SIM cooling-off after roaming or 72h inactivity, data and SMS paused

    Russia Adds 24-Hour SIM Cooling-Off After Roaming

    6 hours ago6 hours ago
  • Zoom for Windows security update blocks DLL hijacking and privilege escalation (CVE-2025-49457)

    Zoom for Enterprise: close DLL path attacks, move to 6.3.10 today

    19 hours ago19 hours ago
Student Hacker Sentenced for PowerSchool Cyberattack on Education Systems
  • Data Breaches
  • LATEST

Four-Year Sentence for Student Behind PowerSchool Data Breach

yohanmanuja3 weeks ago3 weeks ago15 mins

A college student has been sentenced to four years in federal prison for orchestrating a PowerSchool cyberattack that compromised sensitive education data. The case highlights growing concerns over insider-driven breaches targeting school information systems.

Read More
U.S. courthouse exterior symbolizing legal ruling against NSO Group’s WhatsApp spyware targeting
  • LATEST
  • Malware

Net-CAPI: The Stealth Backdoor Hidden in Windows CryptoAPI

yohanmanuja4 weeks ago4 weeks ago15 mins

A newly discovered backdoor, dubbed Net-CAPI, has infiltrated multiple Russian government networks by hijacking Windows cryptographic services. Analysts believe the tool, developed by a sophisticated threat group, uses advanced evasion and persistence methods to hide within legitimate system operations—making detection nearly impossible.

Read More
U.S. courthouse exterior symbolizing legal ruling against NSO Group’s WhatsApp spyware targeting
  • LATEST
  • Malware
  • National Security

NSO Group Loses U.S. Court Case on WhatsApp Hacking Claims

yohanmanuja4 weeks ago4 weeks ago15 mins

A U.S. court ordered Israeli spyware maker NSO Group to halt operations targeting WhatsApp and reduced damages in Meta’s lawsuit. The decision reinforces accountability for private surveillance firms accused of breaching digital privacy.

Read More
Global visualization showing Silver Fox Winos 4.0 expansion into Japan and Malaysia
  • LATEST
  • Malware

Silver Fox Winos 4.0 Malware Now Strikes in Japan and Malaysia

yohanmanuja4 weeks ago4 weeks ago24 mins

The Silver Fox group, long known for precision-targeted malware operations, has extended its Winos 4.0 campaign into Japan and Malaysia. Security experts now observe the deployment of HoldingHands RAT through malicious PDF attachments and deceptive software installers.

Read More
Zimbra SSRF vulnerability in RSS parser internal request
  • LATEST

CVE-2025-25065: Zimbra RSS SSRF Vulnerability Unpacked

yohanmanuja4 weeks ago4 weeks ago04 mins

Zimbra Collaboration’s RSS feed parser has a newly disclosed SSRF vulnerability (CVE-2025-25065). Attackers can abuse it to access internal endpoints and internal services that should remain isolated. This article explains how the flaw works, its potential impact, and how you can defend your environment.

Read More
South Korean repatriated detainees arriving at Incheon Airport escorted by security officers after Cambodia online scam arrests
  • LATEST
  • Scam

Seoul Investigates Returnees Linked to Cambodian Scam Network

yohanmanuja4 weeks ago4 weeks ago04 mins

Sixty-four South Koreans were repatriated from Cambodia and are now under investigation for alleged involvement in large-scale online scam networks. Their return follows a scandal involving a student’s death, prompting Seoul to launch a crackdown on illicit recruitment and fraud operations.

Read More
ConnectWise Automate update attack vulnerability diagram
  • LATEST

ConnectWise Automate: Securing Updates Against AiTM Attacks

yohanmanuja4 weeks ago4 weeks ago03 mins

ConnectWise has patched two critical vulnerabilities (CVE-2025-11492 & CVE-2025-11493) in its Automate platform that allowed adversary-in-the-middle attacks on software updates. MSPs and on-prem deployments must upgrade immediately to prevent malicious update injection and integrity bypass.

Read More
Retail store playing AI-generated background music speaker
  • LATEST

AI-Generated Retail Soundtracks Threaten Belgian Music Revenue

yohanmanuja4 weeks ago4 weeks ago14 mins

Belgian chains such as Brico and Carrefour are increasingly playing AI-generated, royalty-free music in their stores to cut licensing costs. This shift could slash 25–28 % of public performance income for local artists, warn rights organizations. Here’s how the technology works, the risks it raises, and what defenses stakeholders must consider.

Read More
Envoy Air Oracle Data Theft Attack Diagram
  • Data Breaches
  • LATEST
  • National Security

Oracle EBS Data Theft at Envoy Air Clop Campaign Overview

yohanmanuja4 weeks ago4 weeks ago24 mins

Envoy Air confirmed it was targeted in a Clop-linked campaign exploiting vulnerabilities in Oracle E-Business Suite. While the airline asserts no passenger data was affected, business records may have been stolen. This write-up breaks down the tactics, likely exploited CVEs, impacts, and what organizations must do next.

Read More
Map showing global distribution of exposed F5 BIG-IP devices tracked by Shadowserver
  • LATEST
  • vulnerability

F5 BIG-IP Exposure: 266,000 Devices Still Open to Remote Attacks

yohanmanuja4 weeks ago4 weeks ago33 mins

Shadowserver has identified over 266,000 F5 BIG-IP devices exposed to remote attack after a breach revealed undisclosed vulnerabilities. Organizations must act now to mitigate potential exploitation.

Read More
  • 1
  • …
  • 10
  • 11
  • 12
  • 13
  • 14
  • …
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)