Skip to content
December 27, 2025
  • Governing AI at Scale and Speed: A Practical Security Framework
  • Widespread SonicWall SSL VPN Compromise Confirmed
  • Exposed Docker Daemons Fuel ShadowV2 Botnet Attacks
  • Zero Trust Architecture: A Practical 2025 Guide

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • X.com login security key re-enrollment replacing twitter.com

    X Drops Twitter.com: Update Keys And Passkeys Fast

    2 months ago2 months ago
  • AI inference vulnerabilities in Meta, Nvidia, Microsoft and vLLM exposed through ShadowMQ, alongside a Cursor IDE compromise via rogue MCP servers

    Serious AI Bugs Expose Meta, Nvidia and Microsoft Inference

    1 month ago1 month ago
  • Apple fined $986 million by Italy over App Tracking Transparency enforcement

    Italy Fines Apple $986 Million Over Controversial ATT Enforcement

    3 days ago3 days ago
  • Custom illustration showing a Microsoft Entra guest invitation overlaid with a warning about TOAD callback phishing attacks

    Hackers Exploit Microsoft Tenant Invitations for TOAD Phishing

    1 month ago1 month ago
  • Iran-aligned phishing campaign targeting US policy experts via prefilled Microsoft 365 portals and RMM persistence

    Iran-Linked Phishing Hits US Policy Experts with M365 and RMM

    2 months ago2 months ago
  • Critical LangChain Core vulnerability represented by a broken chain symbolizing insecure AI application logic

    LangChain Core Vulnerability Highlights Risks in AI Frameworks

    9 hours ago9 hours ago
South Korean repatriated detainees arriving at Incheon Airport escorted by security officers after Cambodia online scam arrests
  • LATEST
  • Scam

Seoul Investigates Returnees Linked to Cambodian Scam Network

yohanmanuja2 months ago2 months ago24 mins

Sixty-four South Koreans were repatriated from Cambodia and are now under investigation for alleged involvement in large-scale online scam networks. Their return follows a scandal involving a student’s death, prompting Seoul to launch a crackdown on illicit recruitment and fraud operations.

Read More
Garden Bitcoin bridge hack ~$11M drained after AML flags
  • Data Breaches
  • LATEST

Garden Bitcoin Bridge Breach: Validate Deposits and Harden Keys

yohanmanuja2 months ago2 months ago05 mins

Garden, a fast BTC bridge, was drained for roughly $11 million days after AML concerns surfaced about flows tied to prior thefts. Consequently, exchanges, market makers, and bridge integrators should validate exposure, add watchlists for tainted flows, and harden solver, deployer, and validator controls before operations resume.

Read More
CastleLoader malware loader architecture diagram — multi-stage infection chain
  • LATEST
  • Malware

CastleLoader Threat Clusters: What Enterprises Must Know Now

yohanmanuja3 weeks ago3 weeks ago16 mins

GrayBravo’s modular loader, CastleLoader, now powers four distinct threat clusters targeting logistics, travel, and enterprise users a clear sign of rapid MaaS expansion and rising risk for global organizations.

Read More
APT37 abusing Google Find Hub to remotely wipe an Android phone
  • Bypass
  • LATEST
  • vulnerability
  • Zeroday

APT37 exploits Google Find Hub to wipe Android phones

yohanmanuja2 months ago2 months ago05 mins

APT37 used stolen Google credentials to access Find Hub, check Android device locations, and trigger remote factory resets. The tactic lives in the cloud, not on the handset, so identity controls matter most. Enforce phishing-resistant MFA, restrict console actions, and rehearse rapid re-enrollment.

Read More
China National Time Service Centre Shaanxi with cyber-attack visual overlay
  • LATEST
  • vulnerability

China’s National Time Agency Targeted by U.S. Cyber Espionage

yohanmanuja2 months ago2 months ago03 mins

China’s Ministry of State Security alleges that the U.S. National Security Agency breached its National Time Service Centre over multiple years. The event signals new exposure for timing infrastructure and escalates global cyber conflict.

Read More
AI-driven phishing vulnerability targeting Vincent.ai legal research platform
  • AI
  • Bypass
  • LATEST
  • vulnerability

Vincent.ai Exploit Shows Rising Cyber Risks in Legal Tech

yohanmanuja3 days ago3 days ago07 mins

A phishing vulnerability in vLex’s Vincent.ai exposed lawyers and law firms to AI-driven cyberattacks. Attackers manipulated the legal research tool to embed malicious links into AI-generated responses, creating a new avenue for targeted phishing in the legal sector.

Read More
Microsoft Exchange hardening steps with modern authentication, Extended Protection, and TLS 1.2+
  • LATEST

CISA/NSA Guidance: Hardening Microsoft Exchange Servers Now

yohanmanuja2 months ago2 months ago05 mins

CISA and NSA published a focused plan to harden Microsoft Exchange. Enforce modern authentication, cut exposure, enable Extended Protection, and lock down TLS to stop real-world attacks.

Read More
Huawei headquarters building with data stream graphics symbolizing cyber breach
  • Data Breaches
  • LATEST

Huawei Data Breach Exposes Partner and Employee Information

yohanmanuja3 months ago3 months ago14 mins

Huawei confirmed a data breach stemming from a compromised vendor system, exposing partner and employee records. Security experts warn of new supply-chain risks.

Read More
MeteoBridge device vulnerability CVE-2025-4008 flagged by CISA
  • Bypass

CISA Warns of MeteoBridge RCE Bug CVE-2025-4008

yohanmanuja3 months ago3 months ago03 mins

CISA has listed CVE-2025-4008, a remote code execution bug in MeteoBridge devices, signaling active exploitation and urging immediate patching.

Read More
Custom graphic depicting a motherboard’s SPI bus with a TPM module and decrypted BitLocker volume icon
  • LATEST
  • vulnerability

BitLocker Encryption Bypassed: TPM SPI Attack on PIN Method

yohanmanuja2 months ago2 months ago85 mins

A breakthrough hardware-based technique intercepts TPM communications over the SPI bus to unlock BitLocker volumes protected by TPM + PIN. This article analyses the method and its implications for enterprise encryption strategies.

Read More
  • 1
  • …
  • 23
  • 24
  • 25
  • 26
  • 27
  • …
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)