Skip to content
December 28, 2025
  • TeamViewer DEX Vulnerabilities Expose Enterprise Endpoint Risks
  • Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk
  • LangChain Core Vulnerability Highlights Risks in AI Frameworks
  • China-Linked Actors Abuse DNS in Advanced Espionage Malware

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • TeamViewer DEX vulnerability exposure affecting enterprise endpoint monitoring systems

    TeamViewer DEX Vulnerabilities Expose Enterprise Endpoint Risks

    21 hours ago21 hours ago
  • Trust Wallet Chrome extension attack flow showing malicious code injection and wallet compromise

    Trust Wallet Chrome Extension Hack Exposes Browser Wallet Risk

    21 hours ago21 hours ago
  • Critical LangChain Core vulnerability represented by a broken chain symbolizing insecure AI application logic

    LangChain Core Vulnerability Highlights Risks in AI Frameworks

    21 hours ago21 hours ago
  • China-linked cyber espionage malware abusing DNS traffic for stealthy command and control

    China-Linked Actors Abuse DNS in Advanced Espionage Malware

    22 hours ago22 hours ago
  • Parrot OS 7.0 security-focused Linux distribution showcasing updated desktop and penetration testing tools

    Parrot OS 7.0 Focuses on Reliable Penetration Testing Workflows

    2 days ago2 days ago
  • Cybersecurity threat landscape showing stealth malware loaders and AI-assisted attack techniques

    Stealth Malware Loaders and AI-Assisted Attacks Reshape

    2 days ago2 days ago
High-risk Signal and WhatsApp user surrounded by mobile spyware threats and CISA warning indicators
  • Data Breaches
  • LATEST
  • Malware
  • vulnerability

How Commercial Spyware Is Hijacking Signal and WhatsApp

yohanmanuja1 month ago1 month ago05 mins

CISA is warning that state-linked threat actors are actively using commercial spyware and remote access trojans to hijack Signal and WhatsApp accounts, weaponize linked devices and deploy zero-click exploits. This article breaks down the campaigns, the tools involved and the specific hardening steps high-value targets should take immediately.

Read More
Malicious Blender model file delivering Stealc infostealer to a 3D artist’s workstation
  • LATEST
  • Malware
  • vulnerability

How Malicious Blender Files Deliver Stealc Malware to 3D Artists

yohanmanuja1 month ago1 month ago17 mins

A Russian-linked threat actor is hiding Stealc V2 infostealer inside Blender project files shared on 3D model marketplaces. By abusing Blender’s Auto Run Python Scripts feature, the campaign turns legitimate-looking character rigs into a delivery vector that steals browser, wallet, VPN and messaging credentials from creative workstations.

Read More
Visualization of the Shai-hulud npm worm spreading through GitHub repositories and npm packages with a destructive second wave
  • LATEST
  • Malware
  • vulnerability

Shai-hulud worm resurfaces in destructive npm supply-chain attack

yohanmanuja1 month ago1 month ago110 mins

The infamous Shai-hulud worm has resurfaced in the npm ecosystem with a new Sha1-hulud variant. By executing during preinstall, hijacking popular packages, stealing GitHub and cloud secrets, and wiping developer home directories when exfiltration fails, this worm turns supply-chain compromise into both an access play and a destructive weapon.

Read More
Illustration of a German flag overlaying a webmail inbox login screen with a highlighted 2FA prompt and mobile approval notification, symbolizing Germany’s push for 2FA by default for webmail providers
  • LATEST
  • Privacy

Germany calls on webmail providers to turn on 2FA by default

yohanmanuja1 month ago1 month ago09 mins

Germany’s cybersecurity agency BSI now urges webmail providers to enable 2FA by default instead of hiding strong authentication behind optional settings. The new guidance ties default two-factor authentication, passkeys, and robust recovery flows to stronger webmail security and greater digital sovereignty in Germany.

Read More
Security analysts at a major U.S. bank reviewing a third-party vendor cyber breach and potential JPMorgan Citi data exposure on large security dashboards
  • Data Breaches
  • LATEST
  • Privacy

JPMorgan and Citi Face Data Exposure Fears After Major Breach

yohanmanuja1 month ago1 month ago08 mins

A cyberattack on real-estate finance vendor SitusAMC has raised the risk that documents tied to major banks, including JPMorgan and Citi, may have been exposed. This analysis explains what we know so far, how attackers leverage third-party providers, and what banks and customers should do next.

Read More
Swiss military satellite constellation undergoing quantum-encryption hardware upgrade in orbit
  • LATEST
  • vulnerability

Inside Switzerland’s Quantum-Ready Satellite Strategy for Defence

yohanmanuja1 month ago1 month ago08 mins

Quantum encryption promises stronger security, yet it also strains satellite hardware, bandwidth and mission design. Switzerland’s Armed Forces now redesign their space architecture to handle quantum-era threats, “harvest-now, decrypt-later” campaigns and the limits of legacy spacecraft.

Read More
ShadowPad malware exploiting WSUS CVE-2025-59287 to gain SYSTEM access on Windows servers
  • LATEST
  • Malware
  • vulnerability

ShadowPad APT Weaponizes WSUS RCE CVE-2025-59287

yohanmanuja1 month ago1 month ago07 mins

ShadowPad operators are exploiting WSUS vulnerability CVE-2025-59287 to gain SYSTEM-level access on Windows servers. By chaining insecure deserialization, PowerCat reverse shells and DLL side-loading, they turn trusted patching infrastructure into a stealth delivery vector for a mature, modular backdoor.

Read More
Pixel 10 using Quick Share to send a photo wirelessly to an iPhone over AirDrop
  • LATEST

Secure Pixel to iPhone file sharing over Quick Share and AirDrop

yohanmanuja1 month ago1 month ago18 mins

Pixel 10 finally delivers real Pixel to iPhone file sharing. By linking Android’s Quick Share with Apple’s AirDrop over a peer-to-peer bridge, Google removes the need for sketchy third-party tools while giving security teams a clearer, audited path to manage cross-platform file transfers.

Read More
Illustration of U.S. telecom towers and network routes overlaid with a Chinese digital flag motif and an FCC seal fading in the background, symbolizing the rollback of ISP cybersecurity rules amid China-linked espionage threats
  • Bypass
  • LATEST

Salt Typhoon fallout: Reverses ISP cybersecurity rules for telecom

yohanmanuja1 month ago1 month ago18 mins

The FCC has rolled back core ISP cybersecurity rules that were introduced after the Salt Typhoon telecom espionage campaign. With China-linked hackers still probing carrier infrastructure, enterprises must treat telecom exposure as a high-risk dependency and reinforce their own defenses instead of assuming federal safeguards will protect them.

Read More
An illustration of a DNS sinkhole where a Raspberry Pi running Pi-hole or AdGuard Home creates a vortex that blocks ads and malware while allowing safe traffic to reach user devices.
  • LATEST
  • TOPICS

DNS Sinkhole 101 with Pi-hole and AdGuard Home

yohanmanuja1 month ago1 month ago09 mins

A DNS sinkhole blocks trackers and risky domains before they reach the browser. This DIY guide shows how to use Pi-hole or AdGuard Home with lean lists, encrypted upstream, and Unbound caching. You’ll keep streaming and banking working while cutting noise, exposure, and data leaks across every device.

Read More
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)