Skip to content
February 11, 2026
  • KONNI abuses Google Find Hub for Android remote wipes
  • JSONFormatter Compromise: What 80,000+ Leaked Snippets
  • Researchers Uncover RealBlindingEDR Tool in Active Campaigns
  • Microsoft 365 Services in Australia, Major Outage Impacts Users

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • Chinese APT router hijacking diagram showing EdgeStepper on a router redirecting software updates to a PlushDaemon command server

    Chinese PlushDaemon APT Turns Routers into Software Traps

    3 months ago3 months ago
  • CISA confirms federal agency hacked via critical GeoServer flaw

    CISA Confirms Federal Agency Breached via Critical GeoServer Flaw

    5 months ago5 months ago
  • Illustration showing SoundCloud blocking VPN users with 403 errors across devices

    SoundCloud blocks VPN users with 403 error during ongoing issue

    2 months ago2 months ago
  • Malicious Python RAT disguised as a Minecraft mod installer screen for “Nursultan Client”

    Minecraft Mod Exploit: RAT Built in Python Targets Gaming PCs

    4 months ago4 months ago
  • CastleLoader malware loader architecture diagram — multi-stage infection chain

    CastleLoader Threat Clusters: What Enterprises Must Know Now

    2 months ago2 months ago
  • Android malware “Herodotus” faking human typing with randomized keystrokes

    Herodotus Malware Mimics Human Typing to Evade Detection

    4 months ago4 months ago
U.S. courthouse exterior symbolizing legal ruling against NSO Group’s WhatsApp spyware targeting
  • LATEST
  • Malware

Net-CAPI: The Stealth Backdoor Hidden in Windows CryptoAPI

yohanmanuja4 months ago4 months ago15 mins

A newly discovered backdoor, dubbed Net-CAPI, has infiltrated multiple Russian government networks by hijacking Windows cryptographic services. Analysts believe the tool, developed by a sophisticated threat group, uses advanced evasion and persistence methods to hide within legitimate system operations—making detection nearly impossible.

Read More
RealBlindingEDR tool clearing Windows kernel callbacks to blind endpoint detection.
  • LATEST
  • Tools

Researchers Uncover RealBlindingEDR Tool in Active Campaigns

yohanmanuja4 months ago4 months ago14 mins

A new tool named RealBlindingEDR disables security agents by exploiting Windows process privileges. It allows attackers to blind endpoint detection systems and execute malware without alerts, raising serious concerns among enterprise defenders.

Read More
CabinetRAT backdoor cyberattack warning from Ukraine
  • LATEST
  • Malware

CERT-UA Issues Alert on CabinetRAT Backdoor Cyber Threat

yohanmanuja4 months ago4 months ago33 mins

Ukraine’s CERT-UA has warned that CabinetRAT backdoor malware is being actively deployed in cyber espionage campaigns targeting government and critical networks.

Read More
APT37 abusing Google Find Hub to remotely wipe an Android phone
  • Bypass
  • LATEST
  • vulnerability
  • Zeroday

APT37 exploits Google Find Hub to wipe Android phones

yohanmanuja3 months ago3 months ago05 mins

APT37 used stolen Google credentials to access Find Hub, check Android device locations, and trigger remote factory resets. The tactic lives in the cloud, not on the handset, so identity controls matter most. Enforce phishing-resistant MFA, restrict console actions, and rehearse rapid re-enrollment.

Read More
Cl0p ransomware breach affecting Barts Health NHS Trust with stolen patient, staff, and supplier invoice data exposed on the dark web.
  • Data Breaches
  • LATEST
  • Malware
  • vulnerability

Cl0p Attack Hits Barts Health: Full Invoice Database Leaked

yohanmanuja2 months ago2 months ago15 mins

Cl0p ransomware exploited a zero-day in Oracle E-Business Suite to steal years of invoice data from Barts Health NHS Trust. The leak exposed names, addresses, and payment info of patients, staff, and suppliers, now circulating on the dark web. Learn what was compromised, who’s at risk, and how to protect yourself.

Read More
North Korean hackers targeting software developers via malicious code repositories
  • Github
  • LATEST
  • Malware
  • National Security

Developers Warned: North Korean Hackers Use Malicious Repos

yohanmanuja4 months ago4 months ago54 mins

Cybersecurity researchers uncovered a North Korean operation that targets software developers by hiding malicious code inside public repositories.
The campaign, linked to Lazarus Group, uses fake developer tools and trojanized libraries to infiltrate development environments worldwide.

Read More
tech support scam impersonating Microsoft logo with fake browser lock overlay
  • LATEST

How the Microsoft Logo Is Being Used in Tech Support Scams

yohanmanuja4 months ago4 months ago14 mins

A new campaign runs a clever tech support scam by hijacking Microsoft’s trusted branding. Victims encounter fake emails, CAPTCHA checks, browser-locking overlays, and a bogus phone “helpdesk” all designed to steal credentials or remote access. This article breaks down how the scam works, real indicators, and how you can defend yourself.

Read More
Windows 10 ESU update KB5068781 failing with 0x800f0922 error on corporate devices
  • LATEST
  • Privacy

Windows 10 ESU: KB5068781 fails with 0x800f0922 for some orgs

yohanmanuja3 months ago3 months ago16 mins

Some Windows 10 ESU devices fail to install the KB5068781 update, rolling back with error 0x800f0922. Microsoft now lists this as a known issue that affects subscription-activated ESU systems managed through the Microsoft 365 Admin Center. Track affected devices, verify ESU activation, and plan for a servicing fix.

Read More
Compromised XWiki server targeted by RondoDox using CVE-2025-24893 eval injection flaw
  • LATEST
  • Malware
  • vulnerability

RondoDox Botnet Exploits XWiki CVE-2025-24893 on Servers

yohanmanuja3 months ago3 months ago34 mins

The RondoDox botnet now targets unpatched XWiki servers through CVE-2025-24893, a critical eval injection flaw that lets any guest execute remote code and drop miners, turning forgotten wiki instances into entry points and compute fuel.

Read More
Illustration showing FvncBot Android banking trojan capturing screen activity and keystrokes to hijack financial apps
  • Bypass
  • LATEST
  • Malware
  • vulnerability

Inside FvncBot – New Android Malware Hijacking Banking Apps

yohanmanuja2 months ago2 months ago05 mins

FvncBot is a new Android banking trojan capable of keylogging, screen streaming, overlays, and remote control — letting attackers steal credentials and hollow out bank accounts. This article breaks down how it works, why it matters, and how to defend against it.

Read More
  • 1
  • …
  • 30
  • 31
  • 32
  • 33
  • 34
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (United States)
English (UK)