Skip to content
February 12, 2026
  • Apple Hit With $634M Verdict in Masimo Blood-Oxygen Case
  • Sanctions vs. Transit: Aeza’s Reliance on aurologic Connectivity
  • FBI Operation Shuts Down ShinyHunters’ Extortion Site
  • Passkeys for WordPress Login: A No-Coding Guide (2025)

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • Jaguar Land Rover cybersecurity investigation showing suspected Russian link

    Russia Implicated in Cyberattack on Jaguar Land Rover Systems

    4 months ago4 months ago
  • Cyber-attacker silhouette against web code analyzing Adobe Commerce session exploit

    Adobe Commerce Security Crisis: SessionReaper Exploits Escalate

    4 months ago4 months ago
  • Critical LangChain Core vulnerability represented by a broken chain symbolizing insecure AI application logic

    LangChain Core Vulnerability Highlights Risks in AI Frameworks

    2 months ago2 months ago
  • showing zombie apps, APIs, and identities reappearing and the steps to detect and decommission them

    How Zombie APIs Resurface and Expand Attack Paths

    3 months ago3 months ago
  • Malware analyst examining bitmap image used by Caminho loader to conceal .NET payload via LSB steganography

    Defending Against Caminho Loader’s Image-based Delivery Chain

    4 months ago4 months ago
  • Cl0p ransomware breach affecting Barts Health NHS Trust with stolen patient, staff, and supplier invoice data exposed on the dark web.

    Cl0p Attack Hits Barts Health: Full Invoice Database Leaked

    2 months ago2 months ago
Fake Microsoft Teams download page (teams‑install.icu) used to deliver Oyster backdoor
  • LATEST
  • Malware

Weaponized “Microsoft Teams” Installer Delivers Oyster Backdoor via Poisoned Search Results

yohanmanuja5 months ago5 months ago14 mins

A targeted malvertising campaign redirected users from Bing to a fake Teams download site, where a signed MSTeamsSetup.exe installed the Oyster backdoor — blocked just in time by Microsoft Defender ASR.

Read More
Lanscope Endpoint Manager zero-day exploitation chain with RCE and lateral movement
  • LATEST
  • Zeroday

Lanscope Endpoint Manager Zero-Day Under Attack

yohanmanuja3 months ago3 months ago35 mins

Attackers exploit CVE-2025-61932 in Lanscope Endpoint Manager clients to run code and move laterally. Patch MR/DA endpoints now and reduce internet exposure.

Read More
Volkswagen Group headquarters Wolfsburg with cybersecurity data breach overlay
  • LATEST

Volkswagen Group Under 8Base Cyber Attack Data Exposure

yohanmanuja4 months ago4 months ago14 mins

Volkswagen Group faces a serious cybersecurity challenge after ransomware gang 8Base claimed to have stolen sensitive data from its global operations. The incident exposes growing supply-chain risks and highlights how industrial manufacturers remain prime targets for modern cyber-extortion campaigns.

Read More
Microsoft Outlook blocks inline SVG images to stop phishing attacks
  • LATEST
  • Malware

Microsoft Outlook Disables Inline SVG Support Amid Security Risks

yohanmanuja4 months ago4 months ago24 mins

Microsoft Outlook has disabled inline SVG image rendering after attackers exploited the feature in phishing campaigns, marking another step in tightening email security.

Read More
Jaguar Land Rover cybersecurity investigation showing suspected Russian link
  • LATEST

Russia Implicated in Cyberattack on Jaguar Land Rover Systems

yohanmanuja4 months ago4 months ago04 mins

Investigators suspect Russian-linked cyber actors may be behind the recent attack on Jaguar Land Rover (JLR) that disrupted operations and compromised corporate data. The findings align with a growing pattern of state-aligned cyber interference targeting the automotive sector in Europe.

Read More
Asahi Brewery servers targeted by Qilin ransomware data breach
  • Dark Web
  • LATEST
  • Malware
  • Ransomware

Asahi’s Systems Down After Qilin Cyberattack, Recovery Underway

yohanmanuja4 months ago4 months ago23 mins

Japanese brewing giant Asahi has fallen victim to a Qilin ransomware attack that reportedly stole 27 GB of corporate and employee data. Operations remain partially disrupted, with supply chain strain visible across Japan. The attack underscores ransomware’s growing focus on consumer-goods manufacturers and double-extortion tactics.

Read More
Harrods store exterior in London, photo by Cedric Weber
  • Data Breaches
  • LATEST

Harrods Warns Customers of Data Breach Involving Third-Party Provider

yohanmanuja5 months ago5 months ago23 mins

Harrods informed loyalty program members of a data breach tied to a third-party provider. The luxury retailer is investigating and urging customer caution.

Read More
Browser-based CometJacking attack using WebSockets to hijack bandwidth
  • AI
  • Data Breaches
  • LATEST
  • vulnerability

CometJacking Turns Browser Sessions into Covert Proxy Channels

yohanmanuja4 months ago4 months ago15 mins

CometJacking abuses browser WebSockets to hijack user connections, turning them into proxy nodes with a single click. The exploit marks a new wave of malware-less attacks that rely on web technologies rather than traditional payloads.

Read More
Remote-work laptop farm representing a North Korean IT worker scheme infiltrating US companies
  • LATEST
  • Scam

US Case Unmasks Human Layer Behind Korean IT Worker Fraud

yohanmanuja3 months ago3 months ago06 mins

Five facilitators admitted to helping North Korean remote IT workers infiltrate 136 US companies through stolen identities and “laptop farms,” sending more than $2.2 million back to the regime and exposing hidden risks in everyday hiring pipelines.

Read More
Security engineer reviewing a HashiCorp Vault LDAP auth configuration screen highlighting the deny_null_bind parameter and a warning about an authentication bypass vulnerability CVE-2025-13357
  • Bypass
  • LATEST
  • vulnerability

Hardening HashiCorp Vault after CVE-2025-13357 LDAP bypass

yohanmanuja3 months ago3 months ago07 mins

A misconfigured default in the HashiCorp Vault Terraform Provider created a HashiCorp Vault bypass vulnerability in LDAP-backed environments, allowing attackers to authenticate without valid credentials. This analysis explains CVE-2025-13357, real-world impact, and concrete hardening steps for Vault and Terraform.

Read More
  • 1
  • …
  • 10
  • 11
  • 12
  • 13
  • 14
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (United States)
English (UK)