Skip to content
December 27, 2025
  • TeamViewer DEX Vulnerabilities Expose Enterprise Endpoint Risks
  • Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk
  • LangChain Core Vulnerability Highlights Risks in AI Frameworks
  • China-Linked Actors Abuse DNS in Advanced Espionage Malware

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • TeamViewer DEX vulnerability exposure affecting enterprise endpoint monitoring systems

    TeamViewer DEX Vulnerabilities Expose Enterprise Endpoint Risks

    8 hours ago8 hours ago
  • Trust Wallet Chrome extension attack flow showing malicious code injection and wallet compromise

    Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk

    8 hours ago8 hours ago
  • Critical LangChain Core vulnerability represented by a broken chain symbolizing insecure AI application logic

    LangChain Core Vulnerability Highlights Risks in AI Frameworks

    8 hours ago8 hours ago
  • China-linked cyber espionage malware abusing DNS traffic for stealthy command and control

    China-Linked Actors Abuse DNS in Advanced Espionage Malware

    8 hours ago8 hours ago
  • Parrot OS 7.0 security-focused Linux distribution showcasing updated desktop and penetration testing tools

    Parrot OS 7.0 Focuses on Reliable Penetration Testing Workflows

    1 day ago1 day ago
  • Cybersecurity threat landscape showing stealth malware loaders and AI-assisted attack techniques

    Stealth Malware Loaders and AI-Assisted Attacks Reshape

    1 day ago1 day ago
Qilin ransomware BYOVD hybrid attack diagram showing Linux payload and vulnerable driver abuse
  • Bypass
  • LATEST
  • Ransomware
  • vulnerability

How Qilin Uses BYOVD and Linux Payloads to Escape Detection

yohanmanuja2 months ago2 months ago25 mins

Qilin ransomware now combines a Linux payload with a BYOVD (Bring-Your-Own-Vulnerable-Driver) exploit, enabling affiliates to bypass endpoint controls and compromise virtualised and Windows environments. This briefing explains the attack chain, detection challenges, and immediate defensive steps security teams must apply.

Read More
Illustration showing ChatGPT’s Atlas Browser manipulated by hidden prompt injection commands
  • LATEST
  • vulnerability

ChatGPT’s Atlas Browser Vulnerable to Prompt Injection Exploits

yohanmanuja2 months ago2 months ago45 mins

Security researchers revealed that ChatGPT’s Atlas Browser can be manipulated through hidden prompt injections, allowing attackers to hijack AI behavior, leak data, and bypass safeguards. Learn how it works and how to defend against it.

Read More
LockBit 5.0 ransomware cross-platform Windows Linux ESXi attack
  • LATEST
  • Malware
  • Ransomware
  • vulnerability

LockBit 5.0 Ransomware Variant Targets Hypervisors and Servers

yohanmanuja2 months ago2 months ago34 mins

The latest version of the ransomware family known as LockBit has resurfaced with a potent new variant, LockBit 5.0, capable of striking Windows endpoints, Linux servers and VMware ESXi hypervisor platforms in one campaign. Organisations must reassess their ransomware defences and detection posture now.

Read More
Illustration of RedTiger infostealer targeting Discord and gaming credentials
  • LATEST
  • Malware
  • Tools

RedTiger Toolkit Repurposed: Stealing Discord Tokens and Wallets

yohanmanuja2 months ago2 months ago05 mins

A newly weaponized version of the open-source toolkit RedTiger is actively targeting Discord accounts and gaming credentials. This article examines the malware’s mechanics, why gamers and enterprises should care, and outlines a mitigation roadmap.

Read More
Security analyst reviewing job-offer phishing email targeting drone manufacturer under Lazarus Group campaign
  • LATEST
  • Malware

North Korean Hackers Hit UAV Industry with Job Offer Malware

yohanmanuja2 months ago2 months ago33 mins

The Lazarus Group launched a sophisticated social-engineering campaign targeting European unmanned aerial vehicle (UAV) manufacturers via fake job offers to steal intellectual property and design data. Understanding the “Operation DreamJob” method, infection chain and mitigation is critical for defense supply-chain security.

Read More
Microsoft Copilot Studio agent interface illustrating token phishing redirection
  • LATEST
  • Malware

CoPhish Exploit Shows Trusted Microsoft Domains Aren’t Safe

yohanmanuja2 months ago2 months ago04 mins

A new phishing technique called CoPhish abuses Microsoft Copilot Studio agents to steal OAuth tokens via trusted Microsoft domains, bypassing traditional security filters and highlighting the growing threat within low-code platforms.

Read More
Custom graphic depicting a motherboard’s SPI bus with a TPM module and decrypted BitLocker volume icon
  • LATEST
  • vulnerability

BitLocker Encryption Bypassed: TPM SPI Attack on PIN Method

yohanmanuja2 months ago2 months ago85 mins

A breakthrough hardware-based technique intercepts TPM communications over the SPI bus to unlock BitLocker volumes protected by TPM + PIN. This article analyses the method and its implications for enterprise encryption strategies.

Read More
AI ransomware lifecycle automating attack stages using machine learning
  • AI
  • LATEST
  • Malware
  • Ransomware

AI Ransomware Revolution: What Security Teams Must Know

yohanmanuja2 months ago2 months ago44 mins

AI-powered ransomware is revolutionizing cybercrime. Using artificial intelligence, attackers automate targeting, evasion, and encryption enabling self-learning, large-scale attacks that outpace human defenses.

Read More
Malware analyst examining bitmap image used by Caminho loader to conceal .NET payload via LSB steganography
  • LATEST
  • Malware
  • vulnerability

Defending Against Caminho Loader’s Image-based Delivery Chain

yohanmanuja2 months ago2 months ago13 mins

The Brazilian-origin Caminho Loader uses least significant bit (LSB) steganography to hide .NET payloads inside image files, enabling fileless malware delivery across South America, Africa and Eastern Europe. This advanced threat demands immediate action from security teams.

Read More
WordPress admin dashboard warning showing plugin vulnerability alert
  • LATEST
  • vulnerability

WordPress Plugin Vulnerabilities Lead to Mass Site Compromise

yohanmanuja2 months ago2 months ago24 mins

Hackers are conducting mass exploitation campaigns against outdated WordPress plugins, allowing remote code execution and full site compromise. This attack wave highlights the urgent need for timely updates and plugin security hygiene.

Read More
  • 1
  • …
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)