Skip to content
November 12, 2025
  • Zoom for Enterprise: close DLL path attacks, move to 6.3.10 today
  • KONNI abuses Google Find Hub for Android remote wipes
  • APT37 exploits Google Find Hub to wipe Android phones
  • Firefox hardens privacy: expanded fingerprint protections

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • Zoom for Windows security update blocks DLL hijacking and privilege escalation (CVE-2025-49457)

    Zoom for Enterprise: close DLL path attacks, move to 6.3.10 today

    9 hours ago9 hours ago
  • Threat actor KONNI misusing Google Find Hub to geolocate targets and trigger remote Android wipes

    KONNI abuses Google Find Hub for Android remote wipes

    9 hours ago9 hours ago
  • APT37 abusing Google Find Hub to remotely wipe an Android phone

    APT37 exploits Google Find Hub to wipe Android phones

    9 hours ago9 hours ago
  • Firefox update reduces browser fingerprinting signals to limit covert tracking

    Firefox hardens privacy: expanded fingerprint protections

    9 hours ago9 hours ago
  • Ludwigshafen city IT offline after suspected cyberattack, incident response in progress

    Ludwigshafen Shuts Down City IT After Cyberattack

    9 hours ago9 hours ago
  • Threat actors exploiting genAI platforms and trusted cloud apps to breach manufacturing networks and exfiltrate intellectual property

    AI-Powered Phishing and Cloud Malware Push Threats

    1 day ago1 day ago
Qualcomm Snapdragon Guardian platform branding
  • Bypass
  • Data Breaches

Qualcomm’s Guardian Could Rival Intel vPro But Always-On Connectivity Raises Risks

yohanmanuja1 month ago04 mins

Qualcomm’s Guardian aims to rival Intel vPro with always-on device control via built-in cellular connectivity, but the tradeoff may threaten privacy and trust.

Read More
Cybersecurity newsletter graphic with attack and vulnerability icons
  • Data Breaches
  • Malware
  • Zeroday

Cybersecurity Newsletter Weekly, Chrome 0-Day, 22.2 Tbps DDoS Attack & More

yohanmanuja1 month ago1 month ago04 mins

A rapid cascade of cyber events Chrome zero-day, a record DDoS, Cisco IOS exploit, and Kali Linux upgrade highlight how threat activity keeps accelerating.

Read More
Lisa Monaco speaking at a public event
  • LATEST

Trump Demands Microsoft Fire Global Affairs Chief Lisa Monaco Over Security Concerns

yohanmanuja1 month ago1 month ago04 mins

Trump urged Microsoft to fire Lisa Monaco, its head of global affairs, raising concerns over her revoked security clearance and history in DOJ investigations.

Read More
Apple logo over digital circuit background
  • Bypass
  • LATEST
  • Zeroday

Apple Devices Vulnerable to ASLR Bypass Through JSON Serialization Trick

yohanmanuja1 month ago1 month ago24 mins

Google’s Project Zero team uncovered a method to bypass ASLR on Apple devices by exploiting NSDictionary’s JSON serialization behavior, potentially weakening memory protections.

Read More
Harrods store exterior in London, photo by Cedric Weber
  • Data Breaches
  • LATEST

Harrods Warns Customers of Data Breach Involving Third-Party Provider

yohanmanuja1 month ago1 month ago03 mins

Harrods informed loyalty program members of a data breach tied to a third-party provider. The luxury retailer is investigating and urging customer caution.

Read More
Diagram illustrating DLL side‑loading delivering PlugX and Bookworm malware
  • LATEST
  • Malware
  • National Security

PlugX and Bookworm Deployed via DLL Side‑Loading in Targeted Cyber Espionage Campaign

yohanmanuja2 months ago2 months ago03 mins

A sophisticated cyber campaign used DLL side‑loading to deliver a hybrid PlugX variant and the Bookworm backdoor to telecom and ASEAN networks, revealing renewed tactics by China‑linked threat actors.

Read More
Fake Microsoft Teams download page (teams‑install.icu) used to deliver Oyster backdoor
  • LATEST
  • Malware

Weaponized “Microsoft Teams” Installer Delivers Oyster Backdoor via Poisoned Search Results

yohanmanuja2 months ago2 months ago04 mins

A targeted malvertising campaign redirected users from Bing to a fake Teams download site, where a signed MSTeamsSetup.exe installed the Oyster backdoor — blocked just in time by Microsoft Defender ASR.

Read More
LAMEHUG malware using AI to generate commands for Windows data theft
  • AI
  • Malware

LAMEHUG Malware Uses AI to Generate Commands and Steal Data

yohanmanuja2 months ago2 months ago03 mins

The new LAMEHUG malware uses AI models from Hugging Face to generate Windows commands dynamically. It spreads through phishing, disguises itself as AI apps, and steals system data, documents, and credentials while adapting to different environments.

Read More
New macOS XCSSET malware variant targets Firefox and cryptocurrency wallets
  • Malware

New XCSSET macOS Malware Variant Targets Firefox with Clipper Module

yohanmanuja2 months ago12 mins

A new XCSSET malware variant for macOS introduces a clipboard hijacker to steal cryptocurrency and expands to Firefox browser data theft. Security researchers warn developers to inspect Xcode projects and apply strong defenses against this evolving threat.

Read More
Australia considers GitHub age restriction for child safety
  • Github
  • LATEST

Australia May Restrict GitHub for Kids Under 16

yohanmanuja2 months ago2 months ago03 mins

Australia’s eSafety Commissioner may classify GitHub as a social network and ban kids under 16 from using it. Officials argue GitHub’s social features resemble TikTok and Discord, but critics say the move could block young coders from learning and accessing open-source tools

Read More
  • 1
  • …
  • 19
  • 20
  • 21
  • 22
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)