Skip to content
December 28, 2025
  • Harrods Warns Customers of Data Breach Involving Third-Party Provider
  • Smishing Triad Toll-Text Scam: What Security Teams Must Know
  • China-Linked Actors Abuse DNS in Advanced Espionage Malware
  • Hardening HashiCorp Vault after CVE-2025-13357 LDAP bypass

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • Sudo vulnerability exploit code on terminal showing privilege escalation

    Exploit Published for Sudo CVE-2025-32463 Urgent Patch Needed

    3 months ago3 months ago
  • Drone Sightings Halt Flights in Copenhagen and Oslo, Aviation Security on Alert

    3 months ago3 months ago
  • UK Cyber Security and Resilience Bill strengthens defenses for NHS, water, transport, and energy

    UK Unveils Cyber Resilience Bill, Tougher Rules for NHS, Water

    2 months ago2 months ago
  • DNS-based malware distribution architecture with Detour Dog and Strela Stealer

    How Detour Dog Exploits DNS TXT for Advanced Malware Delivery

    3 months ago3 months ago
  • A diagram showing how LAPS and AD Tiering stop a Pass-the-Hash attack. The attack is blocked both laterally between workstations by LAPS and vertically between tiers by the tiering model

    Your Small AD Blueprint: LAPS, Tiering, and PtH Control

    2 months ago2 months ago
  • Google Mandiant investigates Oracle cyberattack campaign

    Google Mandiant Investigates Oracle-Linked Cyber Threat Activity

    3 months ago3 months ago
TikTok search bar showing explicit suggestion to a child account
  • National Security

Algorithmic Fail: TikTok Sends Minors Explicit Search Suggestions

yohanmanuja3 months ago3 months ago34 mins

Despite enabling safety filters, child accounts on TikTok have received explicit content suggestions via search. This investigation reveals algorithmic failures and urges stronger oversight for youth protection.

Read More
DNS-based malware distribution architecture with Detour Dog and Strela Stealer
  • Data Breaches
  • LATEST
  • Malware

How Detour Dog Exploits DNS TXT for Advanced Malware Delivery

yohanmanuja3 months ago3 months ago24 mins

Detour Dog has transitioned into DNS-powered malware operations. Its latest campaign distributes Strela Stealer through TXT-encoded commands and modular backdoors. This evolution marks a new wave of protocol abuse challenging traditional network defense.

Read More
Malicious Python RAT disguised as a Minecraft mod installer screen for “Nursultan Client”
  • LATEST
  • Malware

Minecraft Mod Exploit: RAT Built in Python Targets Gaming PCs

yohanmanuja2 months ago2 months ago23 mins

A major rat campaign disguised as the Minecraft mod “Nursultan Client” is compromising gamers via a Python-based Trojan using Telegram bot infrastructure. This tool steals browser tokens, captures webcams, and uses a gamified lure to breach systems and security teams need to view gaming endpoints as serious risk zones.

Read More
WordPress admin dashboard warning showing plugin vulnerability alert
  • LATEST
  • vulnerability

WordPress Plugin Vulnerabilities Lead to Mass Site Compromise

yohanmanuja2 months ago2 months ago24 mins

Hackers are conducting mass exploitation campaigns against outdated WordPress plugins, allowing remote code execution and full site compromise. This attack wave highlights the urgent need for timely updates and plugin security hygiene.

Read More
Security analyst reviewing job-offer phishing email targeting drone manufacturer under Lazarus Group campaign
  • LATEST
  • Malware

North Korean Hackers Hit UAV Industry with Job Offer Malware

yohanmanuja2 months ago2 months ago33 mins

The Lazarus Group launched a sophisticated social-engineering campaign targeting European unmanned aerial vehicle (UAV) manufacturers via fake job offers to steal intellectual property and design data. Understanding the “Operation DreamJob” method, infection chain and mitigation is critical for defense supply-chain security.

Read More
Gootloader return showing SEO-poisoned template site, stealth font swap, and ZIP dropping JavaScript
  • LATEST
  • Malware
  • vulnerability

Gootloader Revival Targets Legal-Doc Searches With Fresh Tactics

yohanmanuja2 months ago2 months ago05 mins

Gootloader is active again. Attackers poison search results for legal templates, hide content with glyph-mapped fonts, and ship malformed ZIP files that drop JavaScript. The post-compromise tempo increases, so defenders must harden browsers, restrict scripts, and tune detections now.

Read More
Diagram of ClickFix-style attack using Grok and ChatGPT to deliver malware through user-executed commands
  • AI
  • Data Breaches
  • LATEST
  • Malware
  • vulnerability

ClickFix AI Attack Uses Grok and ChatGPT to Deliver Malware

yohanmanuja2 weeks ago2 weeks ago07 mins

A new ClickFix-style attack abuses Grok and ChatGPT to deliver malware by convincing users to run malicious commands disguised as troubleshooting advice. This article explains how the attack works and how defenders can detect and prevent it.

Read More
ClayRat Android spyware infection targeting users through state-sponsored mobile espionage
  • LATEST
  • Malware

ClayRat Android Spyware Expands Surveillance Reach

yohanmanuja3 months ago3 months ago33 mins

The newly discovered ClayRat Android spyware represents one of 2025’s most sophisticated state-sponsored mobile espionage tools. Designed to collect device data, intercept communications, and monitor app activity, ClayRat’s discovery highlights how Android remains a prime target in global intelligence operations.

Read More
Apple bug bounty zero-click exploit reward reaching $2 million for iOS vulnerabilities
  • Bug Bounty
  • LATEST

Apple Bug Bounty Adds Bonus for Lockdown Bypass Finds

yohanmanuja3 months ago3 months ago25 mins

Apple has expanded its bug bounty program to reward researchers up to $2 million for zero-click exploit chains. Bonuses for Lockdown Mode bypasses and beta findings may push payouts even higher.

Read More
Sprout Rust UEFI bootloader speeding secure device startup with policy-driven config
  • Github
  • LATEST
  • Tools

Sprout Rust UEFI bootloader lands with speed and clean policy

yohanmanuja2 months ago2 months ago04 mins

Sprout is a Rust-based UEFI bootloader that pursues sub-second startup and data-driven policy. It reduces drift, speeds rollbacks, and clarifies failure modes. Secure-boot enablement is underway; teams should pilot now, prepare key management, and align firmware updates for a smooth transition to verified and measured boot.

Read More
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)