Cybersecurity News & Threat Intelligence

Stay updated with the latest in cybersecurity threats, data privacy, and digital marketing trends. CyberPulse delivers breaking stories, expert analysis, and insights for today’s digital professionals

SK Telecom Launches Free USIM Replacement After Data Breach

More than 200,000 subscribers of SK Telecom received new universal subscriber identity module (USIM) chips on the first day of the company's offering of a free replacement service following a recent network hacking incident. This initiative comes in response to a major data breach that exposed sensitive customer USIM card data. The cyberattack, detected on April 19, raised concerns about potential SIM swapping attacks and broader cybersecurity vulnerabilities.

By Hitesh Suthar 3 min read
Read full article

Low-Tech Tactics in Cybersecurity: Rising Risks and New Threats

USB-based attacks are resurging, where cybercriminals use malicious USB drives to infiltrate company systems. The attackers often employ social engineering tactics to trick employees into connecting these infected devices to their systems. Recently, bad actors have created counterfeit company-branded USB drives and even sent USB-loaded toys as promotional gifts. Notably, the Raspberry Robin worm has emerged as a malware variant exploited through USB attacks. According to CheckPoint, nation-state actors have also utilized USB-loaded infections to target critical infrastructure.

By Ankit Lohar 3 min read
Read full article

Analysis of Google Chrome Zero-Day Vulnerability CVE-2025-2783

Identified in March 2025, CVE-2025-2783 is a high-severity vulnerability in Google Chrome's Mojo inter-process communication (IPC) framework on Windows systems. This vulnerability allows attackers to bypass Chrome's sandbox protections and execute arbitrary code on victim machines. The flaw was exploited in a targeted cyber-espionage campaign named "Operation ForumTroll," which targeted Russian media and government institutions.

By Ankit Agarwal 2 min read
Read full article

AI-Driven Threat Prediction and Human-Machine Teaming in Warfare

The National Geospatial-Intelligence Agency’s Maven program is advancing in artificial intelligence, focusing on new approaches for detecting potential threats. According to Vice Adm. Frank Whitworth, the NGA director, the next chapter of Maven will enhance its AI reasoning capabilities to not only identify objects but also predict potential threats based on behaviors and equipment. This requires creating and training new models, which analysts will use to refine the system’s accuracy and confidence.

By Hitesh Suthar 4 min read
Read full article

EU Vulnerability Database Launches Beta, Complementing CVE Program

The European Commission has initiated the beta phase of the European Vulnerability Database (EUVD), managed by the EU Agency for Cybersecurity (ENISA). This database aims to enhance cybersecurity by providing a centralized resource for information on security vulnerabilities. The EUVD is designed to meet the requirements of the NIS2 Directive, enhancing protections for critical sectors including energy and healthcare.

By Diksha Poonia 3 min read
Read full article

Malicious AI Threats: Ransomware and Cybersecurity Challenges

In the underground cybercrime economy, evolution occurs rapidly. A powerful new entity has emerged from the darknet: **Xanthorox AI**, an autonomous cyberattack platform that aims to eclipse earlier malicious AI tools such as WormGPT and EvilGPT. According to SlashNext, Xanthorox is marketed as the “Killer of WormGPT and all EvilGPT variants,” presenting a significant advancement in the arms race between AI security and AI-driven offense.

By Deepak Gupta 4 min read
Read full article

EU Launches Vulnerability Database Amid US Tracking Challenges

The European Union Agency for Cybersecurity (ENISA) has launched the European Vulnerability Database (EUVD) as part of the NIS2 Directive, aiming to strengthen digital security in the EU. This database serves as a centralized repository that aggregates actionable information on cybersecurity vulnerabilities impacting ICT products and services. The database can be accessed publicly by suppliers, users, competent authorities, and researchers.

By Deepak Gupta 3 min read
Read full article

May 2025 Patch Tuesday: Critical Exploits and Security Updates

Microsoft’s latest Patch Tuesday released 78 patches, but five vulnerabilities are critical due to active exploitation. These flaws, rated "Important" but confirmed in the wild, have significant implications for Windows 10, Windows 11, and Windows Server since 2019. System administrators must prioritize the following:

By Nikita shekhawat 3 min read
Read full article

Marbled Dust Hackers Exploit Output Messenger Zero-Day in Espionage

A Türkiye-backed cyberespionage group, known as Marbled Dust, exploited a zero-day vulnerability in Output Messenger, specifically targeting users linked to the Kurdish military in Iraq. The flaw, identified as CVE-2025-27920, is a directory traversal vulnerability in the LAN messaging application. Microsoft Threat Intelligence analysts reported that this vulnerability could allow authenticated attackers to access sensitive files outside the intended directory or deploy malicious payloads on the server's startup folder.

By Abhimanyu Singh 4 min read
Read full article
Prev
11 / 19
Next