Cybersecurity News & Threat Intelligence

Stay updated with the latest in cybersecurity threats, data privacy, and digital marketing trends. CyberPulse delivers breaking stories, expert analysis, and insights for today’s digital professionals

Commvault RCE Vulnerability Enables Remote Code Execution Attacks

A significant security vulnerability (CVE-2025-34028) has been discovered in Commvault Command Center Innovation Release, allowing unauthenticated attackers to execute arbitrary code remotely. The vulnerability carries a high CVSS score of 9.0 and impacts version 11.38 of the Command Center installation, potentially leading to complete system compromise if exploited.

By Hitesh Suthar 3 min read
Read full article

FBI Reports $16.6B Cybercrime Loss in 2024, Ransomware Threats Rise

The FBI reported that cybercriminals stole a record $16.6 billion in 2024, marking a 33% increase compared to the previous year. This significant rise is detailed in the FBI's Internet Crime Complaint Center (IC3) report, which recorded 859,532 complaints, with 256,256 reflecting actual losses, averaging $19,372 per incident.

By Ankit Agarwal 3 min read
Read full article

The Dark Side of YouTube: AI Threats, Phishing, and Deepfakes

With billions of users, YouTube has become a prime target for cybercriminals who exploit the platform to distribute malicious links and phishing schemes. Cybercriminals often post harmful links in video descriptions and comments that lead to malware-hosting sites. Proofpoint identified several channels in 2024 that were promoting pirated games bundled with keyloggers or remote access tools, further complicating the security landscape.

By Diksha Poonia 3 min read
Read full article

Phishing Emails Drive 84% Surge in Infostealer Attacks

Cybersecurity researchers have documented an alarming surge in infostealer malware distribution through phishing channels, with weekly delivery volume increasing by 84% in 2024 compared to the previous year. This upward trend shows no signs of slowing, with early 2025 figures suggesting an even more dramatic 180% increase in weekly volume compared to 2023 baselines. The evolution of delivery mechanisms has played a crucial role in this proliferation of threats, as traditional malicious attachments have declined significantly.

By Deepak Gupta 4 min read
Read full article

Ukraine Develops Unjammable Drones Amid Intensifying Conflict

Ukrainian companies are significantly ramping up the production of fiber-optic drones to counter Russian electronic warfare. Traditional electronic warfare methods, such as frequency jammers, are ineffective against these drones, making them a formidable asset in combat. The need for these advanced drones has arisen due to the evolving nature of warfare in Ukraine, where both sides are increasingly reliant on drone technology.

By Ankit Lohar 4 min read
Read full article

Phishing Campaign Targets Booking.com with Malware via Fake CAPTCHA

Starting in December 2024, Microsoft Threat Intelligence identified a phishing campaign that impersonates the online travel agency Booking.com. This campaign targets organizations in the hospitality sector, employing a social engineering technique known as ClickFix to deliver credential-stealing malware. As of February 2025, this campaign remains active.

By Deepak Gupta 3 min read
Read full article

Critical CVE-2025-32433: Unauthenticated RCE in Erlang/OTP SSH

A severe remote code execution vulnerability has been identified in the Erlang/OTP SSH implementation, tracked as CVE-2025-32433. This vulnerability scores a maximum CVSS of 10.0, indicating critical severity. It allows unauthenticated attackers to execute arbitrary code on affected devices, which are predominantly used in telecom and IoT environments.

By Ankit Lohar 2 min read
Read full article

Challenges in Vulnerability Remediation with Generative AI in Pentesting

Organizations struggle to fix flaws identified during penetration testing, with generative AI applications complicating the remediation process. According to Cobalt's State of Pentesting Report 2025, only 48% of exploitable vulnerabilities are resolved, dropping to 21% for flagged generative AI app flaws. The resolution rate for critical vulnerabilities is higher at 69%.

By Nicole Wang 3 min read
Read full article

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups, Including Chinese, Russian, and North Korean Hackers

Attackers are utilizing Windows shortcut (.lnk) files to deceive users into executing malicious code on their systems. Researchers from Trend Micro's Zero Day Initiative (ZDI) have reported that at least 11 threat actors globally have been exploiting this vulnerability, designated as ZDI-CAN-25373, to execute harmful payloads on target machines. The vulnerability allows an attacker to manipulate the metadata within a .lnk file to hide malicious code, making it appear harmless to users. Consequently, unsuspecting users may inadvertently infect their systems with malware.

By Diksha Poonia 3 min read
Read full article
Prev
15 / 19
Next