Skip to content
November 12, 2025
  • GootLoader’s comeback: hidden filenames, ZIP-JS payloads
  • North Korean Hackers Hit UAV Industry with Job Offer Malware
  • Researchers Uncover RealBlindingEDR Tool in Active Campaigns
  • CVE-2025-25065: Zimbra RSS SSRF Vulnerability Unpacked

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • Oracle EBS zero-day exploitation widens as attackers add victims to extortion lists

    Oracle EBS Zero-Day Fallout: More Victims Emerge

    2 weeks ago2 weeks ago
  • Microsoft Copilot Studio agent interface illustrating token phishing redirection

    CoPhish Exploit Shows Trusted Microsoft Domains Aren’t Safe

    3 weeks ago3 weeks ago
  • Abstract AI tools and cybersecurity concept illustration

    How Attackers Poison AI Tools and Defenses

    1 month ago1 month ago
  • BGP upstream map highlighting AS30823 (aurologic) feeding multiple high-risk hosting ASNs across Europe

    Sanctions vs. Transit: Aeza’s Reliance on aurologic Connectivity

    4 days ago4 days ago
  • Asahi Brewery servers targeted by Qilin ransomware data breach

    Asahi’s Systems Down After Qilin Cyberattack, Recovery Underway

    1 month ago1 month ago
  • Whisper Leak side-channel showing packet size and timing revealing AI chat topics on encrypted streams

    Side-Channel on Streaming AI: Whisper Leak and the Real Fixes

    3 days ago3 days ago
Threat actor KONNI misusing Google Find Hub to geolocate targets and trigger remote Android wipes
  • LATEST
  • Malware
  • Scam

KONNI abuses Google Find Hub for Android remote wipes

yohanmanuja18 hours ago18 hours ago05 mins

KONNI operators hijack Google accounts, pivot into Find Hub, track target locations, and trigger remote resets on Android blending valid features with malicious intent while evading conventional controls.

Read More
Senior cyber-weapons division executive working late, silhouetted by laptop code overlay
  • Data Breaches
  • LATEST

Russian Buyer, U.S. Cyber Tools, and an Executive on the Run

yohanmanuja2 weeks ago2 weeks ago14 mins

A former general manager at a top-tier cyber-weapons developer faces criminal charges after allegedly stealing eight trade secrets between 2022 and 2025 and selling them to a Russian buyer. The case underscores serious risks to national security, supply-chain oversight, and insider threat policies across the defense-cyber industry.

Read More
Diagram illustrating DLL side‑loading delivering PlugX and Bookworm malware
  • LATEST
  • Malware
  • National Security

PlugX and Bookworm Deployed via DLL Side‑Loading in Targeted Cyber Espionage Campaign

yohanmanuja2 months ago2 months ago03 mins

A sophisticated cyber campaign used DLL side‑loading to deliver a hybrid PlugX variant and the Bookworm backdoor to telecom and ASEAN networks, revealing renewed tactics by China‑linked threat actors.

Read More
UK investigation into Yutong electric buses highlighting remote shutdown risk and OTA connectivity
  • LATEST
  • National Security

UK Scrutinizes Chinese E-Buses After Norway Kill-Switch Tests

yohanmanuja2 days ago2 days ago04 mins

The UK is investigating whether Yutong electric buses can be remotely deactivated. Norway’s Faraday-cage tests and Denmark’s review raised alarms about SIM-enabled diagnostics and OTA updates. Operators should lock down telematics, broker OTA, and drill outage response now.

Read More
AI ransomware lifecycle automating attack stages using machine learning
  • AI
  • LATEST
  • Malware
  • Ransomware

AI Ransomware Revolution: What Security Teams Must Know

yohanmanuja3 weeks ago3 weeks ago34 mins

AI-powered ransomware is revolutionizing cybercrime. Using artificial intelligence, attackers automate targeting, evasion, and encryption enabling self-learning, large-scale attacks that outpace human defenses.

Read More
CabinetRAT backdoor cyberattack warning from Ukraine
  • LATEST
  • Malware

CERT-UA Issues Alert on CabinetRAT Backdoor Cyber Threat

yohanmanuja1 month ago1 month ago23 mins

Ukraine’s CERT-UA has warned that CabinetRAT backdoor malware is being actively deployed in cyber espionage campaigns targeting government and critical networks.

Read More
Confucius hackers launch WooperStealer and Anondoor campaign in Pakistan
  • Malware

Confucius APT Unleashes WooperStealer, Anondoor in Pakistan

yohanmanuja1 month ago1 month ago03 mins

Confucius hackers launched a phishing campaign in Pakistan deploying WooperStealer and Anondoor malware using PPSX and LNK files to compromise sensitive systems.

Read More
Smishing text claiming a lost iPhone was found, with fake iCloud link
  • LATEST
  • Malware
  • Scam

Lost iPhone Smishing: Don’t Tap “We Found Your Phone” Links

yohanmanuja2 days ago2 days ago04 mins

Smishing texts now target lost iPhone owners with fake “found” alerts and cloned iCloud pages. Verify only in Find My, keep Activation Lock tied to your Apple ID, and avoid links in messages. Set a SIM PIN, rotate your Apple ID password, and review trusted devices to prevent account takeover.

Read More
Asahi Brewery servers targeted by Qilin ransomware data breach
  • Dark Web
  • LATEST
  • Malware
  • Ransomware

Asahi’s Systems Down After Qilin Cyberattack, Recovery Underway

yohanmanuja1 month ago1 month ago23 mins

Japanese brewing giant Asahi has fallen victim to a Qilin ransomware attack that reportedly stole 27 GB of corporate and employee data. Operations remain partially disrupted, with supply chain strain visible across Japan. The attack underscores ransomware’s growing focus on consumer-goods manufacturers and double-extortion tactics.

Read More
LAMEHUG malware using AI to generate commands for Windows data theft
  • AI
  • Malware

LAMEHUG Malware Uses AI to Generate Commands and Steal Data

yohanmanuja2 months ago2 months ago03 mins

The new LAMEHUG malware uses AI models from Hugging Face to generate Windows commands dynamically. It spreads through phishing, disguises itself as AI apps, and steals system data, documents, and credentials while adapting to different environments.

Read More
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 23
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)