Skip to content
February 11, 2026
  • Unauthorized Data Access in Salesforce Published Applications
  • Firefox hardens privacy: expanded fingerprint protections
  • North Korean Hackers Hit UAV Industry with Job Offer Malware
  • Block BEC: 9 Microsoft 365 Rules That Actually Work

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • Envoy Air Oracle Data Theft Attack Diagram

    Oracle EBS Data Theft at Envoy Air Clop Campaign Overview

    4 months ago4 months ago
  • GlassWorm malware infection in VS Code extensions showing invisible code and supply-chain compromise.

    GlassWorm Exploit Breakdown Self-Propagating Worm in VS Code

    4 months ago4 months ago
  • Rhadamanthys disruption locking out criminal control panels and servers

    Rhadamanthys disruption derails credential-theft campaigns

    3 months ago3 months ago
  • Security analysts at a major U.S. bank reviewing a third-party vendor cyber breach and potential JPMorgan Citi data exposure on large security dashboards

    JPMorgan and Citi Face Data Exposure Fears After Major Breach

    3 months ago3 months ago
  • An illustration of a DNS sinkhole where a Raspberry Pi running Pi-hole or AdGuard Home creates a vortex that blocks ads and malware while allowing safe traffic to reach user devices.

    DNS Sinkhole 101 with Pi-hole and AdGuard Home

    3 months ago3 months ago
  • Stylised image of an Nvidia GPU card overlaid on a split US–China flag, with circuit traces connecting data centers on both sides.

    Nvidia H200 China Exports: Trade Win for Trump or Risk to US AI?

    3 months ago3 months ago
Visualization of domain network overlays in malware campaigns
  • LATEST
  • vulnerability

ClickFix’s Domain Army: 13,000+ Domains, Massive Attack Surface

yohanmanuja4 months ago4 months ago45 mins

Attackers behind the ClickFix campaign registered over 13,000 unique domains to execute browser-based malware through fake CAPTCHA lures and clipboard tricks. This breakdown reveals their infrastructure, tactics, and defenses every security team must implement.

Read More
Illustration of RedTiger infostealer targeting Discord and gaming credentials
  • LATEST
  • Malware
  • Tools

RedTiger Toolkit Repurposed: Stealing Discord Tokens and Wallets

yohanmanuja4 months ago4 months ago05 mins

A newly weaponized version of the open-source toolkit RedTiger is actively targeting Discord accounts and gaming credentials. This article examines the malware’s mechanics, why gamers and enterprises should care, and outlines a mitigation roadmap.

Read More
Malicious AI agent smuggling instructions through a live session to hijack a trusted peer’s tools
  • AI
  • LATEST
  • vulnerability

Agent Session Smuggling: Hijacking AI-to-AI Workflows

yohanmanuja3 months ago3 months ago35 mins

Agent session smuggling lets a hostile AI agent exploit a live multi-agent conversation, inherit tool authority, and trigger real actions. With scoped credentials, signed steps, and guarded workflows, teams can keep speed without losing control.

Read More
Cybersecurity newsletter graphic with attack and vulnerability icons
  • Data Breaches
  • Malware
  • Zeroday

Cybersecurity Newsletter Weekly, Chrome 0-Day, 22.2 Tbps DDoS Attack & More

yohanmanuja5 months ago5 months ago04 mins

A rapid cascade of cyber events Chrome zero-day, a record DDoS, Cisco IOS exploit, and Kali Linux upgrade highlight how threat activity keeps accelerating.

Read More
DNS-based malware distribution architecture with Detour Dog and Strela Stealer
  • Data Breaches
  • LATEST
  • Malware

How Detour Dog Exploits DNS TXT for Advanced Malware Delivery

yohanmanuja4 months ago4 months ago24 mins

Detour Dog has transitioned into DNS-powered malware operations. Its latest campaign distributes Strela Stealer through TXT-encoded commands and modular backdoors. This evolution marks a new wave of protocol abuse challenging traditional network defense.

Read More
An illustration of Zero Trust for remote teams using micro-segmentation lite, where users are granted access only to the specific application groups they need, blocking access to all others
  • LATEST
  • TOPICS

Zero Trust for Remote Teams: Micro-Segmentation Lite

yohanmanuja3 months ago3 months ago06 mins

Remote work needs more than a VPN. This guide shows small businesses how to apply Zero Trust with “micro-segmentation lite”: verify each request with identity and device checks, publish apps through access proxies, and block lateral movement with simple zones. You’ll protect remote teams fast without heavy tooling.

Read More
Threat landscape shaping cybersecurity in 2025 with evolving attack vectors and defensive challenges
  • Bypass
  • LATEST
  • Malware
  • Ransomware

Key Threats That Shaped the Cybersecurity Landscape in 2025

yohanmanuja1 month ago1 month ago05 mins

The threat landscape that shaped cybersecurity in 2025 reveals how identity abuse, ransomware evolution, and supply chain risks forced organizations to rethink defense strategies.

Read More
Parrot OS 7.0 security-focused Linux distribution showcasing updated desktop and penetration testing tools
  • LATEST

Parrot OS 7.0 Focuses on Reliable Penetration Testing Workflows

yohanmanuja2 months ago2 months ago03 mins

Parrot OS 7.0 delivers a stability-focused update for security professionals, refining penetration testing tools, system performance, and privacy features while maintaining a practical, research-driven Linux environment.

Read More
Diagram of Chrome browser exploitation via ROP chain and WebAssembly memory attack
  • vulnerability

Chrome Remote Code Execution Exposed!! What You Need to Do

yohanmanuja4 months ago4 months ago03 mins

A recently disclosed Chrome RCE exploit uses Wasm and JavaScript to manipulate memory and execute shellcode in the browser. Update to version M137.0.7151.57 immediately to prevent remote compromise.

Read More
MeteoBridge device vulnerability CVE-2025-4008 flagged by CISA
  • Bypass

CISA Warns of MeteoBridge RCE Bug CVE-2025-4008

yohanmanuja4 months ago4 months ago03 mins

CISA has listed CVE-2025-4008, a remote code execution bug in MeteoBridge devices, signaling active exploitation and urging immediate patching.

Read More
  • 1
  • …
  • 32
  • 33
  • 34
  • 35
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (United States)
English (UK)