English SECPULSE – Author
Netcrook Logo
Author image

SECPULSE

SOC Detection Lead

Professional Profile
SecPulse has one of the fastest detection times in the sector. A reference in building and optimizing SOCs.
Key Skills
SOC management; SIEM analytics; Threat detection; SOAR playbooks; Coordinated incident response
Major Achievements
Reduced SOC detection time from 26 minutes to 4.
Operational Style
Articles by SECPULSE

🏴‍☠️ Handala Ransomware Group Targets Israeli Drone Commander in Bold Cyber Attack

08 Apr 2026

Handala ransomware group claims to have targeted Colonel Vered Haimovich, Israel’s top drone commander. The alleged breach highlights the rising threat of cyberattacks against military leaders and the growing intersection of digital warfare and national security.

🏴‍☠️ Handala Hacktivists Leak Israeli Analyst’s Private Chats in Ransomware Escalation

08 Apr 2026

In a bold move, hacktivist group Handala has published the private chats of Israeli security analyst Raz Zimmt, marking a new chapter in politically motivated cyber-espionage. Here’s what happened—and what it means for digital security.

Handala Doxxes IranWire Staff: A New Front in Cyber Warfare Against Journalists

08 Apr 2026

Handala has released the personal data and photos of 20 IranWire journalists, intensifying cyber intimidation tactics against independent media. This calculated doxxing campaign marks a dangerous escalation in the digital targeting of journalists.

🏴‍☠️ Ransomware Heist: Egypt’s WASCO Oil Firm Hit by Massive Data Breach

08 Apr 2026

Egypt’s El Wastani Petroleum Company has fallen victim to a major ransomware attack by the Payload group, resulting in the theft of 50GB of sensitive data and raising urgent questions about cyber-resilience in the oil and gas sector.

Ninja Forms WordPress Plugin Vulnerability: How Hackers Hijacked Thousands of Sites

07 Apr 2026

A catastrophic bug in the Ninja Forms File Upload extension has left tens of thousands of WordPress sites exposed to remote takeover. Here’s how the flaw was exploited, who’s at risk, and why immediate action is critical.

Silent Sabotage: Grafana's AI Bug Nearly Exposed Sensitive Business Data

07 Apr 2026

A newly discovered AI flaw in Grafana could have silently leaked sensitive business data through indirect prompt injection. Investigators reveal how the exploit worked, how it was patched, and why vigilance is critical as AI integrates deeper into business tools.

🏴‍☠️ Patch Panic: Storm-1175’s Lightning-Fast Medusa Ransomware Blitz Exposes Global Security Gaps

07 Apr 2026

Storm-1175 is redefining cybercrime with rapid-fire Medusa ransomware attacks, exploiting vulnerabilities before organizations can patch. Discover how this group outpaces defenders and what steps can help close the gap.

🏴‍☠️ Locked Out: How Ransomware Crippled pacificwestinjury.com

07 Apr 2026

Pacific West Injury Law became the latest victim of a ransomware attack, highlighting how cybercriminals are increasingly targeting small law firms. Learn how the incident unfolded and what it means for the future of cybersecurity in the legal sector.

🏴‍☠️ Smith Dollar Law Firm Hit by Lynx Ransomware Group: Confidentiality at Risk

07 Apr 2026

The Lynx ransomware gang has listed Smith Dollar, a prominent California law firm, as its latest victim—highlighting the escalating threat of cyber extortion in the legal industry.

Silent Data Heist: GrafanaGhost AI Vulnerability Exposes Corporate Secrets

07 Apr 2026

The GrafanaGhost vulnerability allows hackers to exfiltrate sensitive data from Grafana dashboards using AI manipulation, all without user awareness. Learn how this silent exploit works and why it signals a shift in cybersecurity challenges.

1 2 3 4 5 Next
← Back to Authors