Skip to content
November 12, 2025
  • China Issues Arrest Bounty Over Taiwan Psyops Campaign
  • Huawei Data Breach Exposes Partner and Employee Information
  • GPT-5-Powered Aardvark Automates Vulnerability Fixes
  • Capita Data Breach 2023: ICO Fine Reveals the True Cost of Delay

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • VMware Tools and Aria zero-day exploit granting root access

    VMware Tools & Aria Zero-Day Exploited for Root Access

    1 month ago
  • Cyber-attacker silhouette against web code analyzing Adobe Commerce session exploit

    Adobe Commerce Security Crisis: SessionReaper Exploits Escalate

    3 weeks ago3 weeks ago
  • Custom graphic showing Chrome browser extensions being used to hijack WhatsApp Web interface

    Chrome Extensions Hijack WhatsApp Web: 131 Add-ons Exposed

    3 weeks ago3 weeks ago
  • TruffleNet attack flow from stolen AWS keys to Amazon SES abuse and BEC

    TruffleNet: Stolen AWS Keys, SES Abuse, BEC Defense

    1 week ago1 week ago
  • Sudo vulnerability exploit code on terminal showing privilege escalation

    Exploit Published for Sudo CVE-2025-32463 Urgent Patch Needed

    1 month ago1 month ago
  • TP-Link Omada gateway vulnerability diagram showing remote command injection path

    TP-Link Omada Gateways Hit by Critical Command Injection Flaw

    3 weeks ago3 weeks ago
Critical Oracle E-Business Suite vulnerability enabling privilege escalation across enterprise systems
  • Data Breaches
  • LATEST

New Oracle E-Business Suite Flaw Enables Privilege Escalation

yohanmanuja4 weeks ago4 weeks ago04 mins

Security researchers discovered a critical vulnerability in Oracle E-Business Suite (EBS) that enables privilege escalation across enterprise systems. The flaw, tracked under CVE-2025-31245, could allow attackers to execute administrative actions without proper authorization if left unpatched.

Read More
Diagram of BADCANDY re-infection on Cisco IOS XE from exposed web UI with patch and exposure controls
  • vulnerability

Critical Risk: BADCANDY Re-Infection on Unpatched IOS XE

yohanmanuja2 weeks ago2 weeks ago06 mins

BADCANDY continues to compromise exposed Cisco IOS XE devices via CVE-2023-20198. Close the web UI exposure, patch now, rotate credentials, and verify eradication.

Read More
Visualization of North Korean hackers using EtherHiding malware hidden in blockchain smart contracts on Ethereum and BNB Smart Chain
  • LATEST
  • Malware

How EtherHiding Lets Hackers Hide Malware on BSC & Ethereum

yohanmanuja4 weeks ago4 weeks ago04 mins

North Korea–linked hackers now embed JavaScript malware in blockchain smart contracts via EtherHiding. This stealthy method turns public blockchains into resilient drop zones. The multi-stage campaign includes JADESNOW and InvisibleFerret backdoors, demanding new defense strategies.

Read More
Windows Recovery Environment screen showing USB keyboard and mouse input failure”
  • LATEST

Microsoft Fixes USB Input Bug in Windows Recovery

yohanmanuja3 weeks ago3 weeks ago15 mins

Microsoft’s emergency out-of-band update (KB5070773) fixes a USB input failure in the Windows Recovery Environment that impacted Windows 11 and Server 2025 devices. This article explains the bug, affected platforms, and recommended actions for IT professionals.

Read More
A split-screen comparison showing NGAV as a shield blocking a threat, and EDR as a tool investigating a threat that is already inside a computer system, illustrating the difference for small businesses
  • LATEST
  • TOPICS

EDR vs Antivirus for Small Business: What to Buy in 2025

yohanmanuja7 days ago7 days ago010 mins

NGAV (next-gen antivirus) focuses on stopping malware and exploits with AI and behavior analysis. EDR adds continuous visibility, investigation, and one-click response when prevention misses. For most SMEs, start with a strong NGAV baseline and move to EDR as soon as you can support alerts and response especially if ransomware or hands-on-keyboard attacks worry you.  …

Read More
LandFall spyware chain with WhatsApp DNG image exploit on Samsung Galaxy
  • LATEST
  • Malware
  • vulnerability
  • Zeroday

LandFall Android Spyware Resurfaces With WhatsApp-Delivered Payloads

yohanmanuja5 days ago5 days ago05 mins

LandFall is a commercial-grade Android spyware that weaponized WhatsApp images to exploit a Samsung zero-day in the image pipeline. The payload rode malformed DNG files, then modified SELinux and deployed modules for full-device surveillance. Patch promptly and restrict media auto-download.

Read More
DNS-based malware distribution architecture with Detour Dog and Strela Stealer
  • Data Breaches
  • LATEST
  • Malware

How Detour Dog Exploits DNS TXT for Advanced Malware Delivery

yohanmanuja1 month ago1 month ago14 mins

Detour Dog has transitioned into DNS-powered malware operations. Its latest campaign distributes Strela Stealer through TXT-encoded commands and modular backdoors. This evolution marks a new wave of protocol abuse challenging traditional network defense.

Read More
Graphic showing engineering consultancy data breach affecting homeowners in Ireland’s defective-block scheme
  • LATEST
  • National Security
  • vulnerability

Defective block homeowners’ data at risk following cyberattack

yohanmanuja3 weeks ago3 weeks ago03 mins

An engineering-consultant firm supporting Ireland’s defective-block grant scheme suffered a breach that may have exposed homeowner personal data. This article explains the incident, the risks and the lessons cybersecurity teams must apply.

Read More
TikTok search bar showing explicit suggestion to a child account
  • National Security

Algorithmic Fail: TikTok Sends Minors Explicit Search Suggestions

yohanmanuja1 month ago1 month ago24 mins

Despite enabling safety filters, child accounts on TikTok have received explicit content suggestions via search. This investigation reveals algorithmic failures and urges stronger oversight for youth protection.

Read More
Signed RMM installers let attackers enroll logistics endpoints and hijack dispatch workflows to steal cargo
  • LATEST
  • National Security

Cyber Gangs Use RMM to Hijack Freight Loads

yohanmanuja1 week ago1 week ago04 mins

Criminal crews deploy legitimate RMM tools inside carriers and brokers, then hijack booking and dispatch to steal real freight. This body explains how access lands, which artifacts reveal the intrusion, and what controls stop RMM-driven cargo theft without breaking logistics operations or delaying shipments.

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)