Skip to content
November 12, 2025
  • GootLoader’s comeback: hidden filenames, ZIP-JS payloads
  • npm typosquat targets GitHub Actions to steal tokens and artifacts
  • Rhadamanthys disruption derails credential-theft campaigns
  • Windows admins: prioritize November zero-day and RCE

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • GootLoader returns with web-font obfuscation on WordPress and SEO-poisoned downloads

    GootLoader’s comeback: hidden filenames, ZIP-JS payloads

    1 hour ago1 hour ago
  • npm typosquat “@acitons/artifact” exfiltrating GitHub Actions tokens during postinstall in CI

    npm typosquat targets GitHub Actions to steal tokens and artifacts

    1 hour ago1 hour ago
  • Rhadamanthys disruption locking out criminal control panels and servers

    Rhadamanthys disruption derails credential-theft campaigns

    1 hour ago1 hour ago
  • Windows Patch Tuesday fixes kernel zero-day and GDI+ zero-click RCE

    Windows admins: prioritize November zero-day and RCE

    1 hour ago1 hour ago
  • Russia 24-hour SIM cooling-off after roaming or 72h inactivity, data and SMS paused

    Russia Adds 24-Hour SIM Cooling-Off After Roaming

    2 hours ago2 hours ago
  • Zoom for Windows security update blocks DLL hijacking and privilege escalation (CVE-2025-49457)

    Zoom for Enterprise: close DLL path attacks, move to 6.3.10 today

    15 hours ago15 hours ago
Hackers leak Qantas customer data after ransom deadline expires
  • Data Breaches
  • LATEST

Hackers Dump Qantas Data Online After Ransom Deadline Ends

yohanmanuja1 month ago1 month ago14 mins

Hackers have leaked data stolen from Qantas Airways after the airline missed a ransom deadline. The leak includes customer identifiers, flight data, and communication logs. Authorities are working with ACSC and AFP Cybercrime Operations to contain exposure and verify authenticity.

Read More
Spanish police dismantle GXC Team cybercrime syndicate in Europol-backed operation
  • National Security

Massive Cybercrime Group GXC Team Dismantled in Spain

yohanmanuja1 month ago1 month ago03 mins

Spanish authorities have dismantled the notorious GXC Team cybercrime syndicate, arresting its leader and several members in a joint operation with Europol.
The group allegedly ran large-scale credential theft, malware distribution, and financial fraud campaigns targeting victims across Europe and beyond.

Read More
Widespread SonicWall SSL VPN account compromise using valid credentials across customer environments.
  • Data Breaches
  • vulnerability

Widespread SonicWall SSL VPN Compromise Confirmed

yohanmanuja1 month ago1 month ago05 mins

Researchers now track a widespread compromise of SonicWall SSL VPN accounts. Because attackers authenticate with valid credentials, defenders face rapid lateral movement and limited warning windows. Therefore, teams must review access logs, reissue secrets, and re-establish trust at the remote edge.

Read More
Hackers inject malicious code into trusted antivirus software installers.
  • Malware

Hackers Use Antivirus Installers as Trojan Delivery System

yohanmanuja1 month ago1 month ago04 mins

Hackers have corrupted trusted antivirus software installers, injecting malicious code that installs hidden malware instead of legitimate protection.
Security researchers warn that this supply chain compromise could expose enterprises and consumers to large-scale remote control and data theft.

Read More
Hackers exploit Velociraptor DFIR forensic tool to deploy hidden backdoors
  • Malware
  • vulnerability

Velociraptor DFIR Abused as New Tool for Cyber Espionage

yohanmanuja1 month ago1 month ago24 mins

Cybercriminals have found a way to turn Velociraptor an open-source DFIR and endpoint monitoring tool into a stealthy persistence mechanism, deploying hidden backdoors on compromised systems. Security researchers warn that trusted forensic tools are increasingly being repurposed for post-exploitation control.

Read More
Hackers exploit zero-day vulnerability in Gladinet CentreStack file-sharing software
  • vulnerability
  • Zeroday

Gladinet File-Sharing Platforms Targeted in Zero-Day Campaign

yohanmanuja1 month ago1 month ago13 mins

A critical zero-day vulnerability in Gladinet’s CentreStack file-sharing software is being actively exploited by attackers, allowing full remote system access and potential data exfiltration. Enterprises are urged to apply temporary mitigations until an official patch becomes available.

Read More
China issues bounty on Taiwan psyops unit amid cross-strait cyber tensions
  • LATEST
  • National Security

China Issues Arrest Bounty Over Taiwan Psyops Campaign

yohanmanuja1 month ago1 month ago24 mins

China’s Ministry of State Security (MSS) has announced a bounty for information on members of Taiwan’s psychological warfare unit, accusing them of separatist activities and cyber influence campaigns. The move signals an escalation in cross-strait information warfare and a growing overlap between propaganda and cybersecurity operations.

Read More
FBI takedown of ShinyHunters’ Salesforce extortion site in 2025 coordinated with Europol
  • Malware
  • Ransomware

FBI Operation Shuts Down ShinyHunters’ Extortion Site

yohanmanuja1 month ago1 month ago04 mins

Federal authorities dismantled the ShinyHunters group’s Salesforce-branded extortion site, marking a major victory against cybercrime networks that traded in stolen corporate data and customer credentials.

Read More
Apple bug bounty zero-click exploit reward reaching $2 million for iOS vulnerabilities
  • Bug Bounty
  • LATEST

Apple Bug Bounty Adds Bonus for Lockdown Bypass Finds

yohanmanuja1 month ago1 month ago15 mins

Apple has expanded its bug bounty program to reward researchers up to $2 million for zero-click exploit chains. Bonuses for Lockdown Mode bypasses and beta findings may push payouts even higher.

Read More
ChaosBot malware exploiting Cisco VPN and Active Directory passwords in global credential harvesting campaign
  • LATEST
  • Malware

New ChaosBot Campaign Hits Active Directory Logins

yohanmanuja1 month ago1 month ago13 mins

The ChaosBot malware campaign is exploiting Cisco VPN credentials and Active Directory passwords to infiltrate enterprise environments. By combining brute-force attacks with credential reuse, ChaosBot’s operators are building a fast-spreading botnet focused on corporate VPN and identity systems.

Read More
  • 1
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • …
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)