Cybersecurity News & Threat Intelligence

Stay updated with the latest in cybersecurity threats, data privacy, and digital marketing trends. CyberPulse delivers breaking stories, expert analysis, and insights for today’s digital professionals

Over 2,800 Websites Compromised to Distribute AMOS Stealer Malware

Cybersecurity researchers have identified a substantial malware campaign targeting MacOS users through approximately 2,800 compromised websites. This operation, named “MacReaper,” employs sophisticated social engineering and blockchain technology to distribute the Atomic Stealer (AMOS) malware, which can extract passwords, cryptocurrency wallets, and sensitive data from Apple devices.

By Nikita shekhawat 3 min read
Read full article

Critical 0-Click Telnet Vulnerability Exposes Microsoft Windows Credentials

A severe vulnerability affecting Microsoft Telnet Server has been uncovered, allowing remote attackers to bypass authentication and gain administrator access without valid credentials. Detailed in a report by Hacker Fantastic, the flaw involves the **Microsoft Telnet Authentication Protocol (MS-TNAP)** and presents a major security threat to legacy Windows systems, with **no official patch currently available**.

By Diksha Poonia 3 min read
Read full article

Akamai Launches Enterprise-Grade AI Firewall for Enhanced Security

Akamai Technologies has launched the Firewall for AI, a new security solution designed to protect AI applications from emerging cyber threats. This product provides multilayered protection against unauthorized queries, adversarial inputs, and data-scraping attempts.

By Nikita shekhawat 2 min read
Read full article

Ultimate Guide to Effective Vulnerability Management Strategies

Vulnerability management is essential in cybersecurity, as it involves continuously assessing IT environments for security flaws. Organizations must prioritize and address these vulnerabilities to minimize their attack surface. The process is not only about finding flaws but also understanding which ones pose real risks and taking appropriate action.

By Abhimanyu Singh 3 min read
Read full article

Comprehensive Cybersecurity Insights for the InfoSec Community

A 36-year-old Yemeni man, Rami Khaled Ahmed, known as "Black Kingdom," has been indicted in the U.S. for conducting approximately 1,500 cyberattacks targeting Microsoft Exchange servers. This indictment highlights the ongoing challenges of ransomware and its impact on cybersecurity. The case emphasizes the importance of proactive cybersecurity measures, which solutions like GrackerAI can help automate and optimize.

By Deepak Gupta 3 min read
Read full article

Leveraging Threat Intelligence and AI for Proactive Cybersecurity

CISOs must adopt a proactive approach to combat evolving cyber threats and leverage threat intelligence to enhance their security posture. The traditional reactive methods are no longer adequate against the dynamic threat landscape. By utilizing threat intelligence, CISOs can anticipate risks and prioritize resources effectively.

By Diksha Poonia 4 min read
Read full article

Verizon Report: 80% of APAC Data Breaches Caused by Intrusions

Verizon's 2025 Data Breach Investigations Report (DBIR) reveals that system intrusions are responsible for 80% of data breaches in the Asia-Pacific (APAC) region, marking a significant increase from 38% the previous year. The report analyzed over 22,000 security incidents, including 12,195 confirmed data breaches across 139 countries. Malware incidents rose steeply, now appearing in 83% of breaches, with ransomware present in 51%.

By Nikita shekhawat 2 min read
Read full article

Rethinking Security: Navigating Vulnerability Management in AI Era

Organizations have increasingly relied on VPN technology to secure remote connections since the early 2000s. This technology has allowed employees to access critical services while attempting to protect networks. However, the reliance on VPNs has introduced significant security risks. For instance, just last month, a fatal flaw was discovered in Ivanti's VPN services, exposing thousands of users to potential attacks. Attackers continually search for vulnerabilities in VPN products, making the need for more secure solutions pressing.

By Vijay Shekhawat 4 min read
Read full article

Cybercriminals Target Big Four Banks, Stealing Staff Logins and Data

Cybercriminals have compromised nearly 100 staff logins from the Big Four banks in Australia, according to cybersecurity researchers. These logins, stolen via "infostealer" malware designed to extract sensitive data from infected devices, pose a significant risk. The credentials were shared on cybercrime forums and messaging platforms like Telegram.

By Nikita shekhawat 4 min read
Read full article
Prev
13 / 19
Next