Skip to content
February 12, 2026
  • Cisco Firewall Vulnerability CVE-20333 Allows RCE — Update Now
  • PM Apologizes to Trump after Reagan Anti-Tariff Spot
  • Sanctions vs. Transit: Aeza’s Reliance on aurologic Connectivity
  • Germany calls on webmail providers to turn on 2FA by default

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
Headlines
  • Envoy Air Oracle Data Theft Attack Diagram

    Oracle EBS Data Theft at Envoy Air Clop Campaign Overview

    4 months ago4 months ago
  • NVIDIA Blackwell accelerator concept with a compliance banner and a crossed-out China map silhouette

    NVIDIA’s China Stance: No Active Talks on Blackwell, What It Is

    3 months ago3 months ago
  • Illustration of a German flag overlaying a webmail inbox login screen with a highlighted 2FA prompt and mobile approval notification, symbolizing Germany’s push for 2FA by default for webmail providers

    Germany calls on webmail providers to turn on 2FA by default

    3 months ago3 months ago
  • Widespread SonicWall SSL VPN account compromise using valid credentials across customer environments.

    Widespread SonicWall SSL VPN Compromise Confirmed

    4 months ago4 months ago
  • Map showing global distribution of exposed F5 BIG-IP devices tracked by Shadowserver

    F5 BIG-IP Exposure: 266,000 Devices Still Open to Remote Attacks

    4 months ago4 months ago
  • GootLoader returns with web-font obfuscation on WordPress and SEO-poisoned downloads

    GootLoader’s comeback: hidden filenames, ZIP-JS payloads

    3 months ago3 months ago
RealBlindingEDR tool clearing Windows kernel callbacks to blind endpoint detection.
  • LATEST
  • Tools

Researchers Uncover RealBlindingEDR Tool in Active Campaigns

yohanmanuja4 months ago4 months ago14 mins

A new tool named RealBlindingEDR disables security agents by exploiting Windows process privileges. It allows attackers to blind endpoint detection systems and execute malware without alerts, raising serious concerns among enterprise defenders.

Read More
LandFall spyware chain with WhatsApp DNG image exploit on Samsung Galaxy
  • LATEST
  • Malware
  • vulnerability
  • Zeroday

LandFall Android Spyware Resurfaces With WhatsApp-Delivered Payloads

yohanmanuja3 months ago3 months ago15 mins

LandFall is a commercial-grade Android spyware that weaponized WhatsApp images to exploit a Samsung zero-day in the image pipeline. The payload rode malformed DNG files, then modified SELinux and deployed modules for full-device surveillance. Patch promptly and restrict media auto-download.

Read More
EvilAI malware as AI tool disguise
  • AI
  • LATEST

EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations

yohanmanuja5 months ago5 months ago33 mins

EvilAI operators are hiding malware in legitimate-looking AI tools that appear functional and signed, enabling reconnaissance, browser data exfiltration, and encrypted C2 communication across global targets.

Read More
Parrot OS 7.0 security-focused Linux distribution showcasing updated desktop and penetration testing tools
  • LATEST

Parrot OS 7.0 Focuses on Reliable Penetration Testing Workflows

yohanmanuja2 months ago2 months ago03 mins

Parrot OS 7.0 delivers a stability-focused update for security professionals, refining penetration testing tools, system performance, and privacy features while maintaining a practical, research-driven Linux environment.

Read More
Battering RAM hardware attack on confidential computing
  • LATEST
  • Zeroday

Confidential Computing Fails: Battering RAM Attack Succeeds

yohanmanuja4 months ago4 months ago03 mins

Researchers developed a $50 memory interposer, dubbed “Battering RAM,” that can bypass Intel SGX and AMD SEV-SNP confidential computing protections by manipulating memory paths.

Read More
Cyber threat escalation in modern manufacturing environments showing rising OT security risks, ransomware pressure and supply-chain exploitation.
  • Bypass
  • LATEST
  • vulnerability

2025 Manufacturing Under Siege: Cyber Threats Reach Levels

yohanmanuja2 months ago2 months ago05 mins

Manufacturers face the most dangerous cyber landscape in their industry’s history. Attackers now target OT systems, supply chains and intellectual property with unprecedented sophistication, creating widespread operational and financial impact.

Read More
npm typosquat “@acitons/artifact” exfiltrating GitHub Actions tokens during postinstall in CI
  • Github
  • LATEST
  • Malware

npm typosquat targets GitHub Actions to steal tokens and artifacts

yohanmanuja3 months ago3 months ago34 mins

A malicious npm package named “@acitons/artifact” impersonates @actions/artifact, hijacks GitHub Actions tokens via postinstall scripts, and attempts to publish artifacts as GitHub showcasing a precise software supply chain attack.

Read More
SIM farm racks with dozens of active SIM boxes overlayed with a warning about SMS OTP risk and carrier detection gaps
  • LATEST
  • vulnerability

Monitor for OTP burst patterns and SIM rotation fingerprints in logs

yohanmanuja3 months ago3 months ago14 mins

SIM farms expose how weak KYC and SMS OTP let fraud scale. Raids seized SIM boxes and tens of thousands of cards. Here’s how carriers and brands can actually fix it.

Read More
Signal threatens to exit EU over chat control regulation
  • LATEST
  • National Security

Signal Warns It’ll Withdraw From EU Under Chat Control

yohanmanuja4 months ago4 months ago03 mins

Signal has stated it may quit the European market if the EU forces apps to scan private messages under Chat Control, citing encryption and privacy concerns.

Read More
Security researcher analysing Malet macOS malware dataset with Katalina static analysis tool on a MacBook
  • LATEST
  • Malware
  • vulnerability

Public macOS malware dataset Malet supports better EDR

yohanmanuja3 months ago3 months ago07 mins

macOS now attracts serious attention from nation-state and criminal actors, especially credential stealers. A new public dataset, Malet, and a static analysis tool, Katalina, give defenders large-scale visibility into Mach-O malware traits. Teams can use them to tune EDR, test vendor claims, and finally treat Mac fleets as first-class citizens.

Read More
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 36
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
  • Malicious Chrome Extensions Undermine Browser Security
English (United States)
English (UK)