Skip to content
February 11, 2026
  • Critical Risk: BADCANDY Re-Infection on Unpatched IOS XE
  • Open-Source Projects Exploited by Chinese State-Backed Hackers
  • New Ollama and NVIDIA Flaws Expose AI Stacks Fix Fast
  • Malicious PyPI Package Masquerades as SOCKS5 Proxy Tool

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • NVIDIA Blackwell accelerator concept with a compliance banner and a crossed-out China map silhouette

    NVIDIA’s China Stance: No Active Talks on Blackwell, What It Is

    3 months ago3 months ago
  • ChaosBot malware exploiting Cisco VPN and Active Directory passwords in global credential harvesting campaign

    New ChaosBot Campaign Hits Active Directory Logins

    4 months ago4 months ago
  • Whisper Leak side-channel showing packet size and timing revealing AI chat topics on encrypted streams

    Side-Channel on Streaming AI: Whisper Leak and the Real Fixes

    3 months ago3 months ago
  • ConnectWise Automate update attack vulnerability diagram

    ConnectWise Automate: Securing Updates Against AiTM Attacks

    4 months ago4 months ago
  • Concept image showing Akira ransomware attacks spreading across global networks through VPN and firewall weaknesses.

    How Akira Ransomware Turned VPN Weaknesses Into a $244M

    3 months ago3 months ago
  • Cyber threat escalation in modern manufacturing environments showing rising OT security risks, ransomware pressure and supply-chain exploitation.

    2025 Manufacturing Under Siege: Cyber Threats Reach Levels

    2 months ago2 months ago
Hackers breach Red Hat and GitHub to steal customer data
  • Data Breaches
  • Github
  • LATEST

Red Hat, GitHub Cyberattack Exposes Customer Information

yohanmanuja4 months ago4 months ago33 mins

Hackers breached Red Hat and GitHub in coordinated attacks and stole customer data, underscoring risks even in widely trusted development platforms.

Read More
Hackers exploit Velociraptor DFIR forensic tool to deploy hidden backdoors
  • Malware
  • vulnerability

Velociraptor DFIR Abused as New Tool for Cyber Espionage

yohanmanuja4 months ago4 months ago24 mins

Cybercriminals have found a way to turn Velociraptor an open-source DFIR and endpoint monitoring tool into a stealthy persistence mechanism, deploying hidden backdoors on compromised systems. Security researchers warn that trusted forensic tools are increasingly being repurposed for post-exploitation control.

Read More
Illustration depicting LastPass data breach fine issued by UK regulators after 2022 security incident
  • Data Breaches
  • LATEST
  • National Security
  • vulnerability

UK issues major LastPass data breach fine following 2022 incident

yohanmanuja2 months ago2 months ago13 mins

UK regulators have fined LastPass for security failures linked to the 2022 breach that exposed vault metadata for 16 million users. The incident revealed significant operational gaps and raised industry-wide questions about password-management safety.

Read More
TruffleNet attack flow from stolen AWS keys to Amazon SES abuse and BEC
  • LATEST
  • vulnerability

TruffleNet: Stolen AWS Keys, SES Abuse, BEC Defense

yohanmanuja3 months ago3 months ago05 mins

TruffleNet validates stolen AWS keys, profiles accounts, and abuses Amazon SES to run high-leverage BEC. Therefore, clamp down on access keys, isolate SES to a low-trust account, and alert on first-seen identity actions. Consequently, you deny validation, break pivots, and stop invoice fraud before it lands.

Read More
Europe encouraging local technology solutions over dominant global tech companies
  • LATEST
  • National Security
  • Privacy

Europe Moves Away From Big Tech Companies Toward Local Tech

yohanmanuja1 month ago1 month ago06 mins

Europe moves away from big tech companies toward regional technology alternatives driven by privacy, compliance, and digital sovereignty priorities.

Read More
Student Hacker Sentenced for PowerSchool Cyberattack on Education Systems
  • Data Breaches
  • LATEST

Four-Year Sentence for Student Behind PowerSchool Data Breach

yohanmanuja4 months ago4 months ago15 mins

A college student has been sentenced to four years in federal prison for orchestrating a PowerSchool cyberattack that compromised sensitive education data. The case highlights growing concerns over insider-driven breaches targeting school information systems.

Read More
Russia 24-hour SIM cooling-off after roaming or 72h inactivity, data and SMS paused
  • LATEST
  • National Security

Russia Adds 24-Hour SIM Cooling-Off After Roaming

yohanmanuja3 months ago3 months ago04 mins

Russia introduced a 24-hour SIM cooling-off period after roaming or 72 hours of inactivity. Consequently, data and SMS pause while operators run anti-abuse checks, verify identity, and restore access in stages.

Read More
Retro-style Snake video game loader spoof used by MuddyWater to deliver malware
  • Bypass
  • LATEST
  • National Security
  • vulnerability

MuddyWater retro game loader: new stealth tactic explained

yohanmanuja2 months ago2 months ago05 mins

The Iran-linked APT MuddyWater has resurfaced with a new, stealthy malware loader disguised as a retro Snake-style game. The loader delivers a memory-only backdoor to Israeli targets. This shift shows how APTs increasingly combine social-engineering and covert execution to bypass defenses.

Read More
Microsoft Edge IE Mode security update interface showing lockdown options
  • LATEST
  • vulnerability

Microsoft Patches IE Mode Bug Exploited in Targeted Attacks

yohanmanuja4 months ago4 months ago54 mins

Microsoft has restricted Internet Explorer (IE) Mode in Edge after discovering it was exploited in targeted attacks. The vulnerability, now patched, allowed threat actors to bypass modern security controls by abusing legacy IE components embedded within enterprise browsers.

Read More
Instagram data leak exposing sensitive information of millions of user accounts
  • Data Breaches
  • LATEST
  • Privacy
  • vulnerability

Instagram Data Leak Exposes Sensitive Information of Millions

yohanmanuja1 month ago1 month ago03 mins

An Instagram data leak affecting roughly 17.5 million accounts highlights how large-scale data aggregation and third-party exposure continue to threaten user privacy.

Read More
  • 1
  • …
  • 27
  • 28
  • 29
  • 30
  • 31
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (United States)
English (UK)