Skip to content
November 12, 2025
  • RedTiger Toolkit Repurposed: Stealing Discord Tokens and Wallets
  • PoC Released for WSUS RCE CVE-2025-59287 Patch Now
  • Garden Bitcoin Bridge Breach: Validate Deposits and Harden Keys
  • BreachForums Gets Rebooted as “BreachStars” New Admins, Old Warnings

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • Hackers using fake judicial notification emails to spread malware globally

    Global Malware Campaign Abuses Fake Court Communications

    4 weeks ago4 weeks ago
  • China National Time Service Centre Shaanxi with cyber-attack visual overlay

    China’s National Time Agency Targeted by U.S. Cyber Espionage

    3 weeks ago3 weeks ago
  • Google AI Vulnerability Reward Program banner offering up to $30,000 for critical flaws

    Google Rewards AI Vulnerability Reports With Up to $30K

    1 month ago1 month ago
  • FBI and French law enforcement cyber team seizing a ransomware leak site

    Leak Site Tied to Scattered Spider Seized by FBI and French Police

    2 weeks ago2 weeks ago
  • Ransomware Reality: 47 Victims, $115M Lost to Scattered Spider

    2 months ago2 months ago
  • LANSCOPE Endpoint Manager vulnerability alert screen – CVE-2025-61932

    LANSCOPE Endpoint Manager Zero-Day Added to CISA KEV List

    3 weeks ago3 weeks ago
Hackers exploit zero-day vulnerability in Gladinet CentreStack file-sharing software
  • vulnerability
  • Zeroday

Gladinet File-Sharing Platforms Targeted in Zero-Day Campaign

yohanmanuja1 month ago1 month ago13 mins

A critical zero-day vulnerability in Gladinet’s CentreStack file-sharing software is being actively exploited by attackers, allowing full remote system access and potential data exfiltration. Enterprises are urged to apply temporary mitigations until an official patch becomes available.

Read More
Chrome zero-day exploited to install Memento spyware on enterprise endpoints
  • LATEST
  • Malware
  • vulnerability

Chrome Sandbox Escape Leads to Memento Spyware Implants

yohanmanuja2 weeks ago2 weeks ago04 mins

Attackers abused a Chrome zero-day to install Memento spyware in targeted operations. This analysis explains the chain, highlights reliable signals to hunt, and outlines a focused 72-hour action plan.

Read More
Diagram illustrating DLL side‑loading delivering PlugX and Bookworm malware
  • LATEST
  • Malware
  • National Security

PlugX and Bookworm Deployed via DLL Side‑Loading in Targeted Cyber Espionage Campaign

yohanmanuja2 months ago2 months ago03 mins

A sophisticated cyber campaign used DLL side‑loading to deliver a hybrid PlugX variant and the Bookworm backdoor to telecom and ASEAN networks, revealing renewed tactics by China‑linked threat actors.

Read More
Aardvark GPT-5 security agent validating code exploits and proposing a patch in a CI pipeline
  • AI
  • LATEST
  • vulnerability

GPT-5-Powered Aardvark Automates Vulnerability Fixes

yohanmanuja2 weeks ago2 weeks ago14 mins

Aardvark is OpenAI’s GPT-5–powered security agent that reads repositories like a human, validates exploitability in a sandbox, and proposes precise patches. Consequently, teams can cut detection and remediation time without slowing delivery.

Read More
Windows Recovery Environment screen showing USB keyboard and mouse input failure”
  • LATEST

Microsoft Fixes USB Input Bug in Windows Recovery

yohanmanuja3 weeks ago3 weeks ago15 mins

Microsoft’s emergency out-of-band update (KB5070773) fixes a USB input failure in the Windows Recovery Environment that impacted Windows 11 and Server 2025 devices. This article explains the bug, affected platforms, and recommended actions for IT professionals.

Read More
Malicious MCP server exfiltration concept illustration
  • AI
  • Data Breaches
  • LATEST
  • Malware

Malicious MCP Server Steals Secrets From Applications & Dev Environments

yohanmanuja1 month ago1 month ago13 mins

A malicious MCP server can exfiltrate API keys and sensitive data from applications, exposing how trust in developer frameworks can be abused.

Read More
Rhysida ransomware gang claims Maryland transportation hack
  • Malware
  • National Security
  • Ransomware

Rhysida Hackers Claim Attack on Maryland Department of Transportation

yohanmanuja2 months ago2 months ago03 mins

The Rhysida ransomware gang claims to have breached Maryland’s Department of Transportation, leaking personal data and demanding a $3.3 million ransom. Officials confirmed data loss affecting Maryland Transit Administration systems but said core services remain operational.

Read More
Abstract AI tools and cybersecurity concept illustration
  • AI
  • LATEST
  • Malware

How Attackers Poison AI Tools and Defenses

yohanmanuja1 month ago1 month ago13 mins

Threat actors are increasingly poisoning AI tools and assistants embedding dangerous prompts or corrupting the data they rely on to turn defenses against organizations.

Read More
smartphone screen showing “Unpaid Toll Notice” and red alert icon
  • LATEST
  • Malware

Smishing Triad Toll-Text Scam: What Security Teams Must Know

yohanmanuja3 weeks ago3 weeks ago03 mins

A sophisticated mobile-fraud campaign dubbed the Smishing Triad is spoofing toll-agency alerts and flooding users with fake unpaid-toll texts. Read on for how the scam works and how to defend your devices.

Read More
Jaguar Land Rover cybersecurity investigation showing suspected Russian link
  • LATEST

Russia Implicated in Cyberattack on Jaguar Land Rover Systems

yohanmanuja1 month ago1 month ago04 mins

Investigators suspect Russian-linked cyber actors may be behind the recent attack on Jaguar Land Rover (JLR) that disrupted operations and compromised corporate data. The findings align with a growing pattern of state-aligned cyber interference targeting the automotive sector in Europe.

Read More
  • 1
  • …
  • 16
  • 17
  • 18
  • 19
  • 20
  • …
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)