Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

Author: rooter

  • Home
  • rooter
  • Page 3,763
Weekly Update 324

Weekly Update 324

  • Security

Presently sponsored by: Kolide ensures only secure devices can access…

  • rooter
  • February 20, 2023
  • 2 min read
  • 0

Octopus Strike! Three Argo CD API Exploits In Two Weeks

  • Security

Argo CD is a popular Continuous Deployment tool that enables…

  • rooter
  • February 20, 2023
  • 3 min read
  • 0

Yet More ImageMagick Vulnerabilities

  • Security

ImageMagick is a popular open-source image manipulation library used by…

  • rooter
  • February 20, 2023
  • 2 min read
  • 0
Matthew Modine Narrates a New UFO Documentary and We’ve Got the First Trailer

Matthew Modine Narrates a New UFO Documentary and We’ve Got the First Trailer

  • News

A lot was happening in 2020 so there’s a chance…

  • rooter
  • February 20, 2023
  • 1 min read
  • 0
Mirai Variant V3G4 Detection: New Botnet Version Exploiting 13 Vulnerabilities to Target Linux Servers, IoT Devices

Mirai Variant V3G4 Detection: New Botnet Version Exploiting 13 Vulnerabilities to Target Linux Servers, IoT Devices

  • Threats

Threat actors are constantly enriching their offensive toolkits while experimenting…

  • rooter
  • February 20, 2023
  • 4 min read
  • 0
ProxyShellMiner Detection: Novel Crypto-Mining Attacks Abusing CVE-2021-34473 and CVE-2021-34523 ProxyShell Vulnerabilities in Windows Exchange Servers 

ProxyShellMiner Detection: Novel Crypto-Mining Attacks Abusing CVE-2021-34473 and CVE-2021-34523 ProxyShell Vulnerabilities in Windows Exchange Servers 

  • Threats

Stay alert! Threat actors once again set eyes on Microsoft…

  • rooter
  • February 20, 2023
  • 5 min read
  • 0
Driving Business Growth in Turbulent Times from the Perspective of SOC Prime’s CEO: Part I

Driving Business Growth in Turbulent Times from the Perspective of SOC Prime’s CEO: Part I

  • Threats

Agents of S.H.I.E.L.D.: How SOC Prime Helps Ukraine Thwart Aggressor’s…

  • rooter
  • February 20, 2023
  • 7 min read
  • 0
Remote Utilities Exploitation: New Phishing Campaign by the UAC-0096 Group Targeting Ukrainian Organizations 

Remote Utilities Exploitation: New Phishing Campaign by the UAC-0096 Group Targeting Ukrainian Organizations 

  • Threats

Hot on the heels of the massive email distribution in…

  • rooter
  • February 20, 2023
  • 4 min read
  • 0
Driving Business Growth in Turbulent Times from the Perspective of SOC Prime’s Director of People and Culture: Part II

Driving Business Growth in Turbulent Times from the Perspective of SOC Prime’s Director of People and Culture: Part II

  • Threats

Building Team Resilience and Fortitude While Facing the Challenges of…

  • rooter
  • February 20, 2023
  • 5 min read
  • 0
Microsoft and Adobe Critical Patch Advisories: Patch

Microsoft and Adobe Critical Patch Advisories: Patch

  • Cyber Security

Vulnerability Details: Microsoft Critical Patches Released – Patch Now Multiple…

  • rooter
  • February 20, 2023
  • 3 min read
  • 0

Posts pagination

Previous 1 … 3,762 3,763 3,764 … 3,830 Next

Recent Posts

  • Deflecting a Killer Asteroid Is More Complicated Than NASA Thought
  • U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog
  • The Story of Cyberattack: MOVEitTransfer
  • Inside Cloud Security in 2025: Key Findings from SecPod’s Discovery Survey
  • Scaling AI Too Fast: The Cybersecurity Blind Spots No One Talks About

Recent Comments

No comments to show.

Archives

  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.