Skip to content
February 11, 2026
  • TP-Link Archer Routers Affected by Severe Security Vulnerability
  • WhatsApp Rolls Out Lockdown-Style Mode to Protect Users
  • Instagram Data Leak Exposes Sensitive Information of Millions
  • Exploited VMware Vulnerabilities Used by Chinese-Linked Hackers

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • Critical TP-Link Archer router vulnerability exposing home and small office networks to remote attacks

    TP-Link Archer Routers Affected by Severe Security Vulnerability

    2 weeks ago2 weeks ago
  • WhatsApp Lockdown Mode interface showing restricted features and enhanced security protections

    WhatsApp Rolls Out Lockdown-Style Mode to Protect Users

    2 weeks ago2 weeks ago
  • Instagram data leak exposing sensitive information of millions of user accounts

    Instagram Data Leak Exposes Sensitive Information of Millions

    1 month ago1 month ago
  • Chinese-linked hackers targeting VMware infrastructure through exploited vulnerabilities

    Exploited VMware Vulnerabilities Used by Chinese-Linked Hackers

    1 month ago1 month ago
  • UAT-7290 threat group targeting critical infrastructure systems with cyber attacks

    UAT-7290 Hackers Intensify Cyber Attacks on Critical Infrastructure

    1 month ago1 month ago
  • Europe encouraging local technology solutions over dominant global tech companies

    Europe Moves Away From Big Tech Companies Toward Local Tech

    1 month ago1 month ago
Microsoft 365 services down in Australia outage graphic
  • LATEST

Microsoft 365 Services in Australia, Major Outage Impacts Users

yohanmanuja2 months ago2 months ago15 mins

Microsoft 365 suffered a widespread outage across Australia, causing authentication failures, email disruptions and Teams connection issues. Although services gradually recovered, the incident exposed cloud reliability concerns for businesses that rely heavily on Microsoft’s ecosystem.

Read More
Russia-backed cyberattack indictment concept with DOJ emblem and cyber threat overlay
  • LATEST
  • vulnerability

Critical Infrastructure Under Attack: Russia-Backed Cybercrime

yohanmanuja2 months ago2 months ago14 mins

The U.S. Justice Department indicted a Ukrainian national for her role in Russia-backed cyberattacks targeting critical infrastructure — a move highlighting the resurgence of politically motivated malware campaigns against essential services.

Read More
Illustration of EtherRAT smart-contract RAT targeting Web3 developers via React2Shell exploit
  • Bypass
  • LATEST
  • Malware
  • vulnerability

EtherRAT: North Korean targeting developers via React2Shell

yohanmanuja2 months ago2 months ago14 mins

North Korean–linked attackers exploited a critical React2Shell vulnerability (CVE-2025-55182) to deploy a new smart-contract based RAT named EtherRAT. The malware uses Ethereum smart-contracts for C2 resolution, hides payloads through obfuscation, and employs multiple persistence mechanisms — a serious threat to Web3 and developer environments.

Read More
SAP critical vulnerabilities affecting Solution Manager, Commerce Cloud, and jConnect SDK illustrated in an enterprise security diagram
  • LATEST
  • Malware
  • vulnerability

SAP Security Alert: Critical Flaws Enable Remote Code Execution

yohanmanuja2 months ago2 months ago05 mins

SAP has released fixes for three SAP critical vulnerabilities affecting Solution Manager, Commerce Cloud, and the jConnect SDK. These flaws enable remote code execution and unsafe deserialization, posing significant risk to enterprise systems. This article breaks down technical details and offers mitigation guidance.

Read More
Ransomware long-tail impact affecting Japanese industries and supply chains
  • LATEST
  • Malware
  • Ransomware
  • vulnerability

Japan’s Long-Term Struggle Against Persistent Ransomware

yohanmanuja2 months ago2 months ago06 mins

Japanese organizations continue facing ransomware incidents that cause months of operational disruption. This investigative analysis explores how long-tail damage unfolds, why attackers target Japan’s supply chain ecosystem, and how companies can strengthen long-term resilience.

Read More
Microsoft Patch Tuesday security update December 2025
  • Bypass
  • LATEST
  • vulnerability

December 9, 2025: Microsoft Patches 56 Vulnerabilities

yohanmanuja2 months ago2 months ago07 mins

Microsoft’s December 2025 Patch Tuesday delivers critical security updates — 56 vulnerabilities across Windows, Office, Exchange and more including three zero-day flaws. Attackers exploited at least one, making immediate patching vital for enterprise and personal systems alike.

Read More
CastleLoader malware loader architecture diagram — multi-stage infection chain
  • LATEST
  • Malware

CastleLoader Threat Clusters: What Enterprises Must Know Now

yohanmanuja2 months ago2 months ago26 mins

GrayBravo’s modular loader, CastleLoader, now powers four distinct threat clusters targeting logistics, travel, and enterprise users a clear sign of rapid MaaS expansion and rising risk for global organizations.

Read More
Storm-0249 ransomware attack chain showing ClickFix social engineering, fileless PowerShell execution, and DLL sideloading techniques
  • LATEST
  • Ransomware

Storm-0249’s Ransomware : What Security Teams Must Know

yohanmanuja2 months ago2 months ago15 mins

A chilling evolution: Storm-0249 has shifted from selling access to enabling full-blown ransomware campaigns. Their new combination of ClickFix social-engineering, fileless PowerShell and DLL sideloading dramatically increases stealth and persistence across enterprise environments.

Read More
Critical Ivanti Endpoint Manager vulnerability CVE-2025-10573 enabling stored XSS and admin session hijacking
  • Bypass
  • LATEST
  • Malware

Critical Ivanti Endpoint Code Execution Flaw Exposes Admin

yohanmanuja2 months ago2 months ago07 mins

A critical Ivanti Endpoint Manager code execution flaw, tracked as CVE-2025-10573, allows unauthenticated attackers to plant malicious JavaScript in the EPM dashboard and hijack admin sessions. This article explains how the bug works, which versions are affected, and how to patch and harden EPM cores.

Read More
Cloud-AI budget drain vulnerability caused by misconfigured permissions in Cursor and AWS Bedrock
  • LATEST

How Cursor and AWS Bedrock Can Trigger Runaway Cloud Costs

yohanmanuja2 months ago2 months ago06 mins

A misconfiguration in Cursor’s integration with AWS Bedrock allows non-admin users or attackers with minimal access to raise spending caps and drain cloud budgets rapidly. Here’s what happened, why it matters, and how to secure your AI-cloud environment.

Read More
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (United States)
English (UK)