Skip to content
December 28, 2025
  • Banking Trojan Adds Hidden VNC Full Remote Control for Attackers
  • Russia Implicated in Cyberattack on Jaguar Land Rover Systems
  • Service Finder Plugin Flaw (CVE-2025-5947) Abused in Attacks
  • CoPhish Exploit Shows Trusted Microsoft Domains Aren’t Safe

Security Pulse

SecurityPulse delivers the latest cybersecurity news, threat updates, expert analysis, and digital security tips to help you stay ahead of cyber risks.

newsubscription
Random News
  • Cyber Topics
    • Privacy
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
    • Privacy Policy
  • Security Tools
Headlines
  • Australia considers GitHub age restriction for child safety

    Australia May Restrict GitHub for Kids Under 16

    3 months ago3 months ago
  • ClayRat Android spyware infection targeting users through state-sponsored mobile espionage

    ClayRat Android Spyware Expands Surveillance Reach

    3 months ago3 months ago
  • Cl0p ransomware breach affecting Barts Health NHS Trust with stolen patient, staff, and supplier invoice data exposed on the dark web.

    Cl0p Attack Hits Barts Health: Full Invoice Database Leaked

    3 weeks ago3 weeks ago
  • Malicious Blender model file delivering Stealc infostealer to a 3D artist’s workstation

    How Malicious Blender Files Deliver Stealc Malware to 3D Artists

    1 month ago1 month ago
  • Washington Post data breach tied to Oracle E-Business Suite zero-day, nearly 10,000 staff notified

    Washington Post Breach: Nearly 10K Staff Affected by Oracle

    1 month ago1 month ago
  • WireTap attack with DDR4 bus interposer extracting Intel SGX attestation key

    Beyond Speculation: Physical DDR4 Tap Undercuts SGX Security

    3 months ago3 months ago
Swiss military satellite constellation undergoing quantum-encryption hardware upgrade in orbit
  • LATEST
  • vulnerability

Inside Switzerland’s Quantum-Ready Satellite Strategy for Defence

yohanmanuja1 month ago1 month ago08 mins

Quantum encryption promises stronger security, yet it also strains satellite hardware, bandwidth and mission design. Switzerland’s Armed Forces now redesign their space architecture to handle quantum-era threats, “harvest-now, decrypt-later” campaigns and the limits of legacy spacecraft.

Read More
VTEX logo over cloud storage bucket leaking binary data
  • Data Breaches
  • LATEST

VTEX Cloud Misconfig Exposes E-commerce Customer Data

yohanmanuja3 months ago3 months ago45 mins

A misconfigured VTEX cloud bucket exposed personal data of over 6 million shoppers, revealing major gaps in vendor cloud security and breach response.

Read More
Compromised XWiki server targeted by RondoDox using CVE-2025-24893 eval injection flaw
  • LATEST
  • Malware
  • vulnerability

RondoDox Botnet Exploits XWiki CVE-2025-24893 on Servers

yohanmanuja1 month ago1 month ago34 mins

The RondoDox botnet now targets unpatched XWiki servers through CVE-2025-24893, a critical eval injection flaw that lets any guest execute remote code and drop miners, turning forgotten wiki instances into entry points and compute fuel.

Read More
CastleLoader malware loader architecture diagram — multi-stage infection chain
  • LATEST
  • Malware

CastleLoader Threat Clusters: What Enterprises Must Know Now

yohanmanuja3 weeks ago3 weeks ago16 mins

GrayBravo’s modular loader, CastleLoader, now powers four distinct threat clusters targeting logistics, travel, and enterprise users a clear sign of rapid MaaS expansion and rising risk for global organizations.

Read More
Australia considers GitHub age restriction for child safety
  • Github
  • LATEST

Australia May Restrict GitHub for Kids Under 16

yohanmanuja3 months ago3 months ago13 mins

Australia’s eSafety Commissioner may classify GitHub as a social network and ban kids under 16 from using it. Officials argue GitHub’s social features resemble TikTok and Discord, but critics say the move could block young coders from learning and accessing open-source tools

Read More
Custom graphic showing Chrome browser extensions being used to hijack WhatsApp Web interface
  • LATEST
  • Malware
  • vulnerability

Chrome Extensions Hijack WhatsApp Web: 131 Add-ons Exposed

yohanmanuja2 months ago2 months ago24 mins

A widespread campaign exploited the Chrome Web Store to distribute 131 rebranded extensions that hijack WhatsApp Web for automated bulk messaging. These add-ons pose a significant risk to organizations and users alike, demanding immediate review of extension governance and messaging platform protections.

Read More
A conceptual visualization of network cognitive dissonance, where a compromised node sends conflicting trust and deny signals, causing some nodes to incorrectly trust it while others correctly identify the threat.
  • LATEST
  • Privacy
  • TOPICS

Google Workspace Email: Exact DKIM, SPF, and DMARC Settings

yohanmanuja1 month ago1 month ago17 mins

Set up Google Workspace the right way: one SPF with include:_spf.google.com, a 2048-bit DKIM key at google._domainkey, and a strict, report-ready DMARC policy with alignment. Start at p=none to discover stray senders, then ramp to quarantine and reject. Verification steps and copy-paste examples included.

Read More
Visualization of a WhatsApp API flaw exposing a global map of 3.5 billion phone numbers and profile data
  • LATEST
  • Malware
  • vulnerability

WhatsApp Enumeration Reveals Global User Directory Exposure

yohanmanuja1 month ago1 month ago28 mins

A WhatsApp API flaw allowed researchers to enumerate 3.5 billion accounts by abusing weak rate-limiting in the contact-discovery endpoint, exposing global phone-number mappings and public profile metadata that adversaries could weaponize for large-scale phishing, impersonation and SIM-swap attacks.

Read More
U.S. courthouse exterior symbolizing legal ruling against NSO Group’s WhatsApp spyware targeting
  • LATEST
  • Malware

Net-CAPI: The Stealth Backdoor Hidden in Windows CryptoAPI

yohanmanuja2 months ago2 months ago15 mins

A newly discovered backdoor, dubbed Net-CAPI, has infiltrated multiple Russian government networks by hijacking Windows cryptographic services. Analysts believe the tool, developed by a sophisticated threat group, uses advanced evasion and persistence methods to hide within legitimate system operations—making detection nearly impossible.

Read More
CabinetRAT backdoor cyberattack warning from Ukraine
  • LATEST
  • Malware

CERT-UA Issues Alert on CabinetRAT Backdoor Cyber Threat

yohanmanuja3 months ago3 months ago33 mins

Ukraine’s CERT-UA has warned that CabinetRAT backdoor malware is being actively deployed in cyber espionage campaigns targeting government and critical networks.

Read More
  • 1
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • …
  • 35
Newsmatic - News WordPress Theme 2025. Powered By BlazeThemes.
  • Cyber Topics
  • Cyber Attacks
  • Vulnerabilities
  • Zero Days
  • Malware
  • IOT Security
  • Mobile Security
  • Web Security
  • AI
  • Bug Hunting
  • Security Tools
English (United States)
English (UK)