Skip to content
November 12, 2025
  • TA585’s MonsterV2 Malware Hits Finance and Enterprise Networks
  • Apple Devices Vulnerable to ASLR Bypass Through JSON Serialization Trick
  • Google Issues Warning on Expanding Oracle-Linked Threat Activity
  • Microsoft Outlook Disables Inline SVG Support Amid Security Risks

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • South Korea cyber defense center monitoring national networks after major breaches

    South Korea’s Cybersecurity Under Fire After Another Major Breach

    1 month ago1 month ago
  • Windows Recovery Environment screen showing USB keyboard and mouse input failure”

    Microsoft Fixes USB Input Bug in Windows Recovery

    3 weeks ago3 weeks ago
  • Ransomware Reality: 47 Victims, $115M Lost to Scattered Spider

    2 months ago2 months ago
  • UK investigation into Yutong electric buses highlighting remote shutdown risk and OTA connectivity

    UK Scrutinizes Chinese E-Buses After Norway Kill-Switch Tests

    2 days ago2 days ago
  • Illustration showing ChatGPT’s Atlas Browser manipulated by hidden prompt injection commands

    ChatGPT’s Atlas Browser Vulnerable to Prompt Injection Exploits

    2 weeks ago2 weeks ago
  • Threat actor KONNI misusing Google Find Hub to geolocate targets and trigger remote Android wipes

    KONNI abuses Google Find Hub for Android remote wipes

    18 hours ago18 hours ago
TA585’s MonsterV2 malware attacking enterprise networks through phishing and supply chain compromise
  • LATEST
  • Malware

TA585’s MonsterV2 Malware Hits Finance and Enterprise Networks

yohanmanuja4 weeks ago4 weeks ago33 mins

Researchers have uncovered a new global campaign linked to the TA585 threat group, deploying a malware strain called MonsterV2. The campaign targets enterprise, finance, and industrial sectors, leveraging advanced persistence and evasion techniques to steal data and compromise corporate networks

Read More
Cisco firewall under attack, illustrative exploit boundary overflow
  • LATEST
  • vulnerability
  • Zeroday

Cisco Firewall Vulnerability CVE-20333 Allows RCE — Update Now

yohanmanuja1 month ago1 month ago23 mins

A 0-day buffer overflow vulnerability in Cisco ASA and FTD devices, exploitable via WebVPN, allows unauthenticated remote code execution. Cisco has released patches and issued guidance for mitigation.

Read More
SIM farm racks with dozens of active SIM boxes overlayed with a warning about SMS OTP risk and carrier detection gaps
  • LATEST
  • vulnerability

Monitor for OTP burst patterns and SIM rotation fingerprints in logs

yohanmanuja1 week ago1 week ago14 mins

SIM farms expose how weak KYC and SMS OTP let fraud scale. Raids seized SIM boxes and tens of thousands of cards. Here’s how carriers and brands can actually fix it.

Read More
Hackers exploit zero-day vulnerability in Gladinet CentreStack file-sharing software
  • vulnerability
  • Zeroday

Gladinet File-Sharing Platforms Targeted in Zero-Day Campaign

yohanmanuja1 month ago1 month ago13 mins

A critical zero-day vulnerability in Gladinet’s CentreStack file-sharing software is being actively exploited by attackers, allowing full remote system access and potential data exfiltration. Enterprises are urged to apply temporary mitigations until an official patch becomes available.

Read More
LANSCOPE Endpoint Manager vulnerability alert screen – CVE-2025-61932
  • LATEST
  • vulnerability
  • Zeroday

LANSCOPE Endpoint Manager Zero-Day Added to CISA KEV List

yohanmanuja3 weeks ago3 weeks ago04 mins

The recently disclosed flaw in LANSCOPE Endpoint Manager (CVE-2025-61932) enables unauthenticated attackers to send malicious packets, execute arbitrary code and compromise systems. Organisations must patch affected versions, apply network controls and monitor for unusual traffic to avoid full network takeover.

Read More
showing zombie apps, APIs, and identities reappearing and the steps to detect and decommission them
  • LATEST
  • Malware

How Zombie APIs Resurface and Expand Attack Paths

yohanmanuja2 weeks ago2 weeks ago25 mins

Abandoned apps, APIs, and identities keep resurfacing. Hunt them continuously, retire them completely, and verify they stay dead—before attackers exploit them.

Read More
Signal app with German flag and encryption shield graphic
  • LATEST
  • National Security

Signal Urges Germany Not to “Capitulate” to Client-Side Scanning

yohanmanuja1 month ago1 month ago04 mins

Signal has called on Germany to reject the EU’s chat control proposal, warning that client-side scanning would break encryption, facilitate surveillance, and undermine trust in private communication.

Read More
Cisco ASA firewall zero-day exploit campaign illustration
  • LATEST

Cisco ASA Zero-Day Alerts Ignored, Thousands of Devices at Risk

yohanmanuja1 month ago1 month ago33 mins

Despite Cisco and global agencies issuing urgent zero-day alerts, nearly 48,000 Cisco ASA firewalls remain vulnerable and exposed to ongoing exploit campaigns.

Read More
Network map of 1,330 suspicious domains impersonating luxury brands ahead of holiday season
  • LATEST
  • Scam

Luxury Brand Impersonation Wave: 1,330 Domains

yohanmanuja2 weeks ago2 weeks ago05 mins

Researchers tracked 1,330 suspicious domains impersonating 23 luxury brands ahead of peak shopping. Prepare for activation waves with monitoring, takedowns, and buyer guidance.

Read More
SOC analyst reviewing CISA Known Exploited Vulnerabilities catalog alert highlighting five actively exploited CVEs on screen
  • LATEST
  • vulnerability

CISA Adds Five Exploited Vulnerabilities Immediate Patch Steps

yohanmanuja3 weeks ago3 weeks ago46 mins

CISA added five actively exploited vulnerabilities to its Known Exploited Vulnerabilities catalog. This article provides a CVE-by-CVE technical breakdown, enterprise impact assessment, detection and mitigation actions, and prioritized remediation guidance for security operations teams. Includes an AEO-optimized FAQ and verified external sources.

Read More
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)