Skip to content
November 12, 2025
  • Zoom for Enterprise: close DLL path attacks, move to 6.3.10 today
  • KONNI abuses Google Find Hub for Android remote wipes
  • APT37 exploits Google Find Hub to wipe Android phones
  • Firefox hardens privacy: expanded fingerprint protections

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • Zoom for Windows security update blocks DLL hijacking and privilege escalation (CVE-2025-49457)

    Zoom for Enterprise: close DLL path attacks, move to 6.3.10 today

    13 hours ago13 hours ago
  • Threat actor KONNI misusing Google Find Hub to geolocate targets and trigger remote Android wipes

    KONNI abuses Google Find Hub for Android remote wipes

    13 hours ago13 hours ago
  • APT37 abusing Google Find Hub to remotely wipe an Android phone

    APT37 exploits Google Find Hub to wipe Android phones

    13 hours ago13 hours ago
  • Firefox update reduces browser fingerprinting signals to limit covert tracking

    Firefox hardens privacy: expanded fingerprint protections

    14 hours ago14 hours ago
  • Ludwigshafen city IT offline after suspected cyberattack, incident response in progress

    Ludwigshafen Shuts Down City IT After Cyberattack

    14 hours ago14 hours ago
  • Threat actors exploiting genAI platforms and trusted cloud apps to breach manufacturing networks and exfiltrate intellectual property

    AI-Powered Phishing and Cloud Malware Push Threats

    2 days ago2 days ago
Garden Bitcoin bridge hack ~$11M drained after AML flags
  • Data Breaches
  • LATEST

Garden Bitcoin Bridge Breach: Validate Deposits and Harden Keys

yohanmanuja2 weeks ago2 weeks ago05 mins

Garden, a fast BTC bridge, was drained for roughly $11 million days after AML concerns surfaced about flows tied to prior thefts. Consequently, exchanges, market makers, and bridge integrators should validate exposure, add watchlists for tainted flows, and harden solver, deployer, and validator controls before operations resume.

Read More
Microsoft Exchange hardening steps with modern authentication, Extended Protection, and TLS 1.2+
  • LATEST

CISA/NSA Guidance: Hardening Microsoft Exchange Servers Now

yohanmanuja2 weeks ago2 weeks ago05 mins

CISA and NSA published a focused plan to harden Microsoft Exchange. Enforce modern authentication, cut exposure, enable Extended Protection, and lock down TLS to stop real-world attacks.

Read More
npm install pipeline where a hidden remote dependency pulls malware during preinstall
  • LATEST
  • Malware

Malicious npm Packages Hide Code in Invisible Dependencies

yohanmanuja2 weeks ago2 weeks ago06 mins

Attackers hide malware behind invisible npm dependencies and install-time scripts, which bypass static scanners and drain tokens. Close install-time egress, ban URL dependencies, and add dynamic checks.

Read More
telecom supplier breach identity abuse and long-dwell intrusion
  • LATEST
  • vulnerability

State-Aligned Intrusion at a Telecom Provider: What to Triage First

yohanmanuja2 weeks ago2 weeks ago05 mins

A state-aligned intrusion at a major telecom networking provider underscores the risk of supplier compromise. Because the dwell time likely spanned months, defenders should validate identity access, check for lateral movement, and review customer-adjacent data paths. This analysis prioritizes triage, practical detections, and hardening actions.

Read More
Split web concept showing a normal page for humans and a manipulated page only AI crawlers can see, illustrating AI-targeted cloaking
  • AI
  • LATEST

Cloaking for AI: Detecting Poisoned Pages Before They Spread

yohanmanuja2 weeks ago2 weeks ago15 mins

AI-targeted cloaking feeds AI agents a different web than humans see. Learn the risks, detection tactics, and governance steps to keep answers trustworthy.

Read More
DevSecOps engineer patching Docker Compose to v2.40.2 and reviewing compose artifact provenance
  • LATEST
  • vulnerability

Docker Compose Security Alert: CVE-2025-62725 Requires v2.40.2

yohanmanuja2 weeks ago2 weeks ago05 mins

Docker Compose CVE-2025-62725 enables path traversal that can overwrite host files from malicious compose artifacts. Update to v2.40.2, restrict sources, and audit caches.

Read More
Agentic AI blocks indirect prompt injection during web browsing
  • AI
  • LATEST

Indirect Prompt Injection: How AI Agents Get Hijacked

yohanmanuja2 weeks ago2 weeks ago15 mins

Agentic AI expands your attack surface because agents read and act on untrusted content. Consequently, indirect prompt injection can hijack tool use, leak data, and trigger risky actions. This guide explains how the attack works, how to detect it, and how to deploy guardrails that actually help at enterprise scale.

Read More
Concept diagram of TEE.Fail DDR5 interposer leaking enclave memory from Intel TDX and AMD SEV-SNP
  • LATEST
  • vulnerability

TEE.Fail Targets DDR5 , Exposing Keys from Secure Enclaves

yohanmanuja2 weeks ago2 weeks ago05 mins

TEE.Fail uses a DDR5 interposer to undermine enclave confidentiality on Intel TDX and AMD SEV-SNP. Because memory encryption lacks strong integrity here, defenders should rethink secrets, strengthen attestation, and tighten physical controls.

Read More
Oracle EBS zero-day exploitation widens as attackers add victims to extortion lists
  • LATEST
  • vulnerability
  • Zeroday

Oracle EBS Zero-Day Fallout: More Victims Emerge

yohanmanuja2 weeks ago2 weeks ago24 mins

The Oracle E-Business Suite campaign continues to grow. This analysis explains the expanding victim list, enterprise impact, and the steps teams should take now to patch, hunt, and contain risk.

Read More
Teams client showing “In the office” status after connecting to corporate Wi-Fi, with a subtle building icon indicating building-level presence
  • LATEST

Microsoft Teams Location Updates: What It Means for Privacy

yohanmanuja2 weeks ago2 weeks ago14 mins

Teams will auto-detect work location via corporate Wi-Fi with user consent. Learn what ships, how it works, and how to set policy and privacy guardrails.

Read More
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)