Skip to content
February 11, 2026
  • New ChaosBot Campaign Hits Active Directory Logins
  • December 9, 2025: Microsoft Patches 56 Vulnerabilities
  • Google Mandiant Investigates Oracle-Linked Cyber Threat Activity
  • 2025 Manufacturing Under Siege: Cyber Threats Reach Levels

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • Malicious MCP server exfiltration concept illustration

    Malicious MCP Server Steals Secrets From Applications & Dev Environments

    4 months ago4 months ago
  • China issues bounty on Taiwan psyops unit amid cross-strait cyber tensions

    China Issues Arrest Bounty Over Taiwan Psyops Campaign

    4 months ago4 months ago
  • Microsoft Exchange hardening steps with modern authentication, Extended Protection, and TLS 1.2+

    CISA/NSA Guidance: Hardening Microsoft Exchange Servers Now

    3 months ago3 months ago
  • X.com login security key re-enrollment replacing twitter.com

    X Drops Twitter.com: Update Keys And Passkeys Fast

    4 months ago4 months ago
  • Cyber-attacker silhouette against web code analyzing Adobe Commerce session exploit

    Adobe Commerce Security Crisis: SessionReaper Exploits Escalate

    4 months ago4 months ago
  • Security researchers reviewing Tor Galois onion encryption diagrams that explain how Counter Galois Onion protects relay traffic in the Tor network

    Tor Adopts Counter Galois Onion Encryption to Reinforce Security

    3 months ago3 months ago
Malicious MCP server exfiltration concept illustration
  • AI
  • Data Breaches
  • LATEST
  • Malware

Malicious MCP Server Steals Secrets From Applications & Dev Environments

yohanmanuja4 months ago4 months ago13 mins

A malicious MCP server can exfiltrate API keys and sensitive data from applications, exposing how trust in developer frameworks can be abused.

Read More
Silhouette of a recruiter mask over code binaries
  • LATEST

Vampire Bot! BatShadow’s New Go Malware Targeting Job Hunters

yohanmanuja4 months ago4 months ago04 mins

BatShadow, a Vietnamese-linked threat actor, now uses Go-based malware dubbed “Vampire Bot” to target job seekers through fake recruiter lures. Victims open disguised files that trigger a multi-stage PowerShell chain delivering the payload, enabling system surveillance, exfiltration, and remote execution under attacker control.

Read More
AI-driven phishing vulnerability targeting Vincent.ai legal research platform
  • AI
  • Bypass
  • LATEST
  • vulnerability

Vincent.ai Exploit Shows Rising Cyber Risks in Legal Tech

yohanmanuja2 months ago2 months ago17 mins

A phishing vulnerability in vLex’s Vincent.ai exposed lawyers and law firms to AI-driven cyberattacks. Attackers manipulated the legal research tool to embed malicious links into AI-generated responses, creating a new avenue for targeted phishing in the legal sector.

Read More
Teams client showing “In the office” status after connecting to corporate Wi-Fi, with a subtle building icon indicating building-level presence
  • LATEST

Microsoft Teams Location Updates: What It Means for Privacy

yohanmanuja4 months ago4 months ago34 mins

Teams will auto-detect work location via corporate Wi-Fi with user consent. Learn what ships, how it works, and how to set policy and privacy guardrails.

Read More
Retail store playing AI-generated background music speaker
  • LATEST

AI-Generated Retail Soundtracks Threaten Belgian Music Revenue

yohanmanuja4 months ago4 months ago24 mins

Belgian chains such as Brico and Carrefour are increasingly playing AI-generated, royalty-free music in their stores to cut licensing costs. This shift could slash 25–28 % of public performance income for local artists, warn rights organizations. Here’s how the technology works, the risks it raises, and what defenses stakeholders must consider.

Read More
Asahi Brewery servers targeted by Qilin ransomware data breach
  • Dark Web
  • LATEST
  • Malware
  • Ransomware

Asahi’s Systems Down After Qilin Cyberattack, Recovery Underway

yohanmanuja4 months ago4 months ago23 mins

Japanese brewing giant Asahi has fallen victim to a Qilin ransomware attack that reportedly stole 27 GB of corporate and employee data. Operations remain partially disrupted, with supply chain strain visible across Japan. The attack underscores ransomware’s growing focus on consumer-goods manufacturers and double-extortion tactics.

Read More
Visualization of North Korean hackers using EtherHiding malware hidden in blockchain smart contracts on Ethereum and BNB Smart Chain
  • LATEST
  • Malware

How EtherHiding Lets Hackers Hide Malware on BSC & Ethereum

yohanmanuja4 months ago4 months ago24 mins

North Korea–linked hackers now embed JavaScript malware in blockchain smart contracts via EtherHiding. This stealthy method turns public blockchains into resilient drop zones. The multi-stage campaign includes JADESNOW and InvisibleFerret backdoors, demanding new defense strategies.

Read More
Concept diagram of TEE.Fail DDR5 interposer leaking enclave memory from Intel TDX and AMD SEV-SNP
  • LATEST
  • vulnerability

TEE.Fail Targets DDR5 , Exposing Keys from Secure Enclaves

yohanmanuja4 months ago4 months ago05 mins

TEE.Fail uses a DDR5 interposer to undermine enclave confidentiality on Intel TDX and AMD SEV-SNP. Because memory encryption lacks strong integrity here, defenders should rethink secrets, strengthen attestation, and tighten physical controls.

Read More
Chinese-linked hackers targeting VMware infrastructure through exploited vulnerabilities
  • Bypass
  • LATEST
  • vulnerability
  • Zeroday

Exploited VMware Vulnerabilities Used by Chinese-Linked Hackers

yohanmanuja1 month ago1 month ago03 mins

Chinese-linked threat actors are actively exploiting VMware vulnerabilities to gain persistent access to enterprise networks, underscoring the growing risk facing virtualized infrastructure environments.

Read More
Swiss military satellite constellation undergoing quantum-encryption hardware upgrade in orbit
  • LATEST
  • vulnerability

Inside Switzerland’s Quantum-Ready Satellite Strategy for Defence

yohanmanuja3 months ago3 months ago08 mins

Quantum encryption promises stronger security, yet it also strains satellite hardware, bandwidth and mission design. Switzerland’s Armed Forces now redesign their space architecture to handle quantum-era threats, “harvest-now, decrypt-later” campaigns and the limits of legacy spacecraft.

Read More
  • 1
  • …
  • 25
  • 26
  • 27
  • 28
  • 29
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (United States)
English (UK)