Skip to content
November 12, 2025
  • GootLoader’s comeback: hidden filenames, ZIP-JS payloads
  • npm typosquat targets GitHub Actions to steal tokens and artifacts
  • Rhadamanthys disruption derails credential-theft campaigns
  • Windows admins: prioritize November zero-day and RCE

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • GootLoader returns with web-font obfuscation on WordPress and SEO-poisoned downloads

    GootLoader’s comeback: hidden filenames, ZIP-JS payloads

    1 hour ago1 hour ago
  • npm typosquat “@acitons/artifact” exfiltrating GitHub Actions tokens during postinstall in CI

    npm typosquat targets GitHub Actions to steal tokens and artifacts

    1 hour ago1 hour ago
  • Rhadamanthys disruption locking out criminal control panels and servers

    Rhadamanthys disruption derails credential-theft campaigns

    1 hour ago1 hour ago
  • Windows Patch Tuesday fixes kernel zero-day and GDI+ zero-click RCE

    Windows admins: prioritize November zero-day and RCE

    1 hour ago1 hour ago
  • Russia 24-hour SIM cooling-off after roaming or 72h inactivity, data and SMS paused

    Russia Adds 24-Hour SIM Cooling-Off After Roaming

    2 hours ago2 hours ago
  • Zoom for Windows security update blocks DLL hijacking and privilege escalation (CVE-2025-49457)

    Zoom for Enterprise: close DLL path attacks, move to 6.3.10 today

    15 hours ago15 hours ago
FBI and French law enforcement cyber team seizing a ransomware leak site
  • LATEST

Leak Site Tied to Scattered Spider Seized by FBI and French Police

yohanmanuja2 weeks ago2 weeks ago13 mins

Global law enforcement has seized a dark web leak site allegedly operated by Scattered Spider, halting a notorious pipeline of stolen corporate data. Here’s what cybersecurity experts need to know about the takedown.

Read More
Senior cyber-weapons division executive working late, silhouetted by laptop code overlay
  • Data Breaches
  • LATEST

Russian Buyer, U.S. Cyber Tools, and an Executive on the Run

yohanmanuja2 weeks ago2 weeks ago14 mins

A former general manager at a top-tier cyber-weapons developer faces criminal charges after allegedly stealing eight trade secrets between 2022 and 2025 and selling them to a Russian buyer. The case underscores serious risks to national security, supply-chain oversight, and insider threat policies across the defense-cyber industry.

Read More
Qilin ransomware BYOVD hybrid attack diagram showing Linux payload and vulnerable driver abuse
  • Bypass
  • LATEST
  • Ransomware
  • vulnerability

How Qilin Uses BYOVD and Linux Payloads to Escape Detection

yohanmanuja2 weeks ago2 weeks ago25 mins

Qilin ransomware now combines a Linux payload with a BYOVD (Bring-Your-Own-Vulnerable-Driver) exploit, enabling affiliates to bypass endpoint controls and compromise virtualised and Windows environments. This briefing explains the attack chain, detection challenges, and immediate defensive steps security teams must apply.

Read More
Illustration showing ChatGPT’s Atlas Browser manipulated by hidden prompt injection commands
  • LATEST
  • vulnerability

ChatGPT’s Atlas Browser Vulnerable to Prompt Injection Exploits

yohanmanuja2 weeks ago2 weeks ago45 mins

Security researchers revealed that ChatGPT’s Atlas Browser can be manipulated through hidden prompt injections, allowing attackers to hijack AI behavior, leak data, and bypass safeguards. Learn how it works and how to defend against it.

Read More
LockBit 5.0 ransomware cross-platform Windows Linux ESXi attack
  • LATEST
  • Malware
  • Ransomware
  • vulnerability

LockBit 5.0 Ransomware Variant Targets Hypervisors and Servers

yohanmanuja2 weeks ago2 weeks ago14 mins

The latest version of the ransomware family known as LockBit has resurfaced with a potent new variant, LockBit 5.0, capable of striking Windows endpoints, Linux servers and VMware ESXi hypervisor platforms in one campaign. Organisations must reassess their ransomware defences and detection posture now.

Read More
Illustration of RedTiger infostealer targeting Discord and gaming credentials
  • LATEST
  • Malware
  • Tools

RedTiger Toolkit Repurposed: Stealing Discord Tokens and Wallets

yohanmanuja2 weeks ago2 weeks ago05 mins

A newly weaponized version of the open-source toolkit RedTiger is actively targeting Discord accounts and gaming credentials. This article examines the malware’s mechanics, why gamers and enterprises should care, and outlines a mitigation roadmap.

Read More
Security analyst reviewing job-offer phishing email targeting drone manufacturer under Lazarus Group campaign
  • LATEST
  • Malware

North Korean Hackers Hit UAV Industry with Job Offer Malware

yohanmanuja3 weeks ago3 weeks ago23 mins

The Lazarus Group launched a sophisticated social-engineering campaign targeting European unmanned aerial vehicle (UAV) manufacturers via fake job offers to steal intellectual property and design data. Understanding the “Operation DreamJob” method, infection chain and mitigation is critical for defense supply-chain security.

Read More
Microsoft Copilot Studio agent interface illustrating token phishing redirection
  • LATEST
  • Malware

CoPhish Exploit Shows Trusted Microsoft Domains Aren’t Safe

yohanmanuja3 weeks ago3 weeks ago04 mins

A new phishing technique called CoPhish abuses Microsoft Copilot Studio agents to steal OAuth tokens via trusted Microsoft domains, bypassing traditional security filters and highlighting the growing threat within low-code platforms.

Read More
Custom graphic depicting a motherboard’s SPI bus with a TPM module and decrypted BitLocker volume icon
  • LATEST
  • vulnerability

BitLocker Encryption Bypassed: TPM SPI Attack on PIN Method

yohanmanuja3 weeks ago3 weeks ago25 mins

A breakthrough hardware-based technique intercepts TPM communications over the SPI bus to unlock BitLocker volumes protected by TPM + PIN. This article analyses the method and its implications for enterprise encryption strategies.

Read More
AI ransomware lifecycle automating attack stages using machine learning
  • AI
  • LATEST
  • Malware
  • Ransomware

AI Ransomware Revolution: What Security Teams Must Know

yohanmanuja3 weeks ago3 weeks ago34 mins

AI-powered ransomware is revolutionizing cybercrime. Using artificial intelligence, attackers automate targeting, evasion, and encryption enabling self-learning, large-scale attacks that outpace human defenses.

Read More
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)