Skip to content
February 11, 2026
  • Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk
  • ShadowPad APT Weaponizes WSUS RCE CVE-2025-59287
  • PoC Exploit Tool Targets FortiWeb CVE-2025-64446 Path Traversal
  • TamperedChef Malware Uses Fake Installers in Global Campaign

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • Abstract AI tools and cybersecurity concept illustration

    How Attackers Poison AI Tools and Defenses

    5 months ago5 months ago
  • Custom illustration showing a hacker silhouette controlling cloud-service icons (OneDrive, Yandex Cloud) overlaying an IT supply chain network diagram.

    APT31 Targets Russian IT via Yandex Cloud & OneDrive C2

    3 months ago3 months ago
  • TruffleNet attack flow from stolen AWS keys to Amazon SES abuse and BEC

    TruffleNet: Stolen AWS Keys, SES Abuse, BEC Defense

    3 months ago3 months ago
  • AI ransomware lifecycle automating attack stages using machine learning

    AI Ransomware Revolution: What Security Teams Must Know

    4 months ago4 months ago
  • UK map with incident markers showing four nationally significant cyber attacks weekly

    How CVE-2025-59282 Enables Remote Code Execution in IIS

    4 months ago4 months ago
  • A conceptual image of the Windows 11 interface being hardened, with glowing blue shields representing Group Policy Objects (GPOs) locking over system components to improve security

    Windows 11 Hardening Guide: 20 Must-Have GPO Settings

    3 months ago3 months ago
Russia-aligned hackers abusing the Viber messaging platform as covert malware delivery infrastructure
  • LATEST
  • Malware
  • National Security
  • vulnerability

How Russia-Aligned Hackers Use Viber to Distribute Malware

yohanmanuja1 month ago1 month ago04 mins

Russia-aligned threat actors are abusing the Viber messaging platform as covert attack infrastructure, using trusted communication channels to distribute malware and evade traditional security defenses.

Read More
Android SMS-stealing malware targeting Uzbekistan users through deceptive mobile apps
  • Bypass
  • LATEST
  • Malware
  • vulnerability

Uzbekistan Users Face Wave of Android SMS-Stealing Malware

yohanmanuja2 months ago2 months ago15 mins

A new Android SMS stealer campaign is spreading across Uzbekistan, using deceptive apps to capture messages and authentication codes. The attack highlights fast-evolving mobile threats and the need for stronger device security.

Read More
Ransomware long-tail impact affecting Japanese industries and supply chains
  • LATEST
  • Malware
  • Ransomware
  • vulnerability

Japan’s Long-Term Struggle Against Persistent Ransomware

yohanmanuja2 months ago2 months ago06 mins

Japanese organizations continue facing ransomware incidents that cause months of operational disruption. This investigative analysis explores how long-tail damage unfolds, why attackers target Japan’s supply chain ecosystem, and how companies can strengthen long-term resilience.

Read More
High-risk Signal and WhatsApp user surrounded by mobile spyware threats and CISA warning indicators
  • Data Breaches
  • LATEST
  • Malware
  • vulnerability

How Commercial Spyware Is Hijacking Signal and WhatsApp

yohanmanuja3 months ago3 months ago05 mins

CISA is warning that state-linked threat actors are actively using commercial spyware and remote access trojans to hijack Signal and WhatsApp accounts, weaponize linked devices and deploy zero-click exploits. This article breaks down the campaigns, the tools involved and the specific hardening steps high-value targets should take immediately.

Read More
FBI takedown of ShinyHunters’ Salesforce extortion site in 2025 coordinated with Europol
  • Malware
  • Ransomware

FBI Operation Shuts Down ShinyHunters’ Extortion Site

yohanmanuja4 months ago4 months ago04 mins

Federal authorities dismantled the ShinyHunters group’s Salesforce-branded extortion site, marking a major victory against cybercrime networks that traded in stolen corporate data and customer credentials.

Read More
Harrods store exterior in London, photo by Cedric Weber
  • Data Breaches
  • LATEST

Harrods Warns Customers of Data Breach Involving Third-Party Provider

yohanmanuja5 months ago5 months ago23 mins

Harrods informed loyalty program members of a data breach tied to a third-party provider. The luxury retailer is investigating and urging customer caution.

Read More
PyStoreRAT malware infection chain from fake OSINT GitHub repos
  • Github
  • LATEST
  • Privacy
  • vulnerability

Fake OSINT GitHub Repos Used to Spread PyStoreRAT Malware

yohanmanuja2 months ago2 months ago05 mins

Cybercriminals are abusing fake OSINT GitHub repos to distribute PyStoreRAT, a JavaScript-based RAT that delivers diverse malware modules through deceptive open-source tools.

Read More
Visualization of a WhatsApp API flaw exposing a global map of 3.5 billion phone numbers and profile data
  • LATEST
  • Malware
  • vulnerability

WhatsApp Enumeration Reveals Global User Directory Exposure

yohanmanuja3 months ago3 months ago28 mins

A WhatsApp API flaw allowed researchers to enumerate 3.5 billion accounts by abusing weak rate-limiting in the contact-discovery endpoint, exposing global phone-number mappings and public profile metadata that adversaries could weaponize for large-scale phishing, impersonation and SIM-swap attacks.

Read More
UAT-7290 threat group targeting critical infrastructure systems with cyber attacks
  • Bypass
  • LATEST
  • National Security
  • Privacy

UAT-7290 Hackers Intensify Cyber Attacks on Critical Infrastructure

yohanmanuja1 month ago1 month ago03 mins

UAT-7290 threat actors are escalating cyber attacks against critical infrastructure, exploiting weaknesses in operational technology and industrial environments to disrupt essential services.

Read More
Illustration showing ChatGPT’s Atlas Browser manipulated by hidden prompt injection commands
  • LATEST
  • vulnerability

ChatGPT’s Atlas Browser Vulnerable to Prompt Injection Exploits

yohanmanuja4 months ago4 months ago45 mins

Security researchers revealed that ChatGPT’s Atlas Browser can be manipulated through hidden prompt injections, allowing attackers to hijack AI behavior, leak data, and bypass safeguards. Learn how it works and how to defend against it.

Read More
  • 1
  • …
  • 17
  • 18
  • 19
  • 20
  • 21
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (United States)
English (UK)