Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

Category: Threats

Category Added in a WPeMatico Campaign

  • Home
  • Threats
UAC-0001 (APT28) Activity Detection: The russian State-Sponsored Group Targets Government Agencies Using BEARDSHELL and COVENANT Malware

UAC-0001 (APT28) Activity Detection: The russian State-Sponsored Group Targets Government Agencies Using BEARDSHELL and COVENANT Malware

  • Threats

The nefarious nation-backed russian hacking collective known as UAC-0001 (aka…

  • rooter
  • June 24, 2025
  • 7 min read
  • 0
CVE-2025-6018 and CVE-2025-6019 Vulnerability Exploitation: Chaining Local Privilege Escalation Flaws Lets Attackers Gain Root Access on Most Linux Distributions

CVE-2025-6018 and CVE-2025-6019 Vulnerability Exploitation: Chaining Local Privilege Escalation Flaws Lets Attackers Gain Root Access on Most Linux Distributions

  • Threats

June has been a challenging month for cybersecurity teams, with…

  • rooter
  • June 19, 2025
  • 4 min read
  • 0
Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique 

Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique 

  • Threats

Mocha Manakin, believed to have ties to Interlock ransomware operations,…

  • rooter
  • June 19, 2025
  • 5 min read
  • 0
AI Threat Intelligence

AI Threat Intelligence

  • Threats

The rapid advancement and widespread adoption of generative AI (GenAI)…

  • rooter
  • June 18, 2025
  • 12 min read
  • 0
GrayAlpha Operation Detection: The Fin7-Affiliated Group Spreads PowerNet Loader, NetSupport RAT, and MaskBat Loader

GrayAlpha Operation Detection: The Fin7-Affiliated Group Spreads PowerNet Loader, NetSupport RAT, and MaskBat Loader

  • Threats

Defenders have identified a highly sophisticated campaign orchestrated by the…

  • rooter
  • June 17, 2025
  • 6 min read
  • 0
CVE-2025-4123 Vulnerability: “The Grafana Ghost” Zero-Day Enables Malicious Account Hijacking

CVE-2025-4123 Vulnerability: “The Grafana Ghost” Zero-Day Enables Malicious Account Hijacking

  • Threats

June has been a turbulent month for cyber defenders, marked…

  • rooter
  • June 16, 2025
  • 5 min read
  • 0
What Are the Predictions of AI in Cybersecurity?

What Are the Predictions of AI in Cybersecurity?

  • Threats

According to Gartner, by 2029, agentic Artificial Intelligence (AI) will…

  • rooter
  • June 16, 2025
  • 10 min read
  • 0
Detect SimpleHelp RMM Vulnerability Exploitation: CISA Warns of Threat Actors Abusing Unpatched Flaws for Persistent Access and Ransomware Deployment

Detect SimpleHelp RMM Vulnerability Exploitation: CISA Warns of Threat Actors Abusing Unpatched Flaws for Persistent Access and Ransomware Deployment

  • Threats

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an…

  • rooter
  • June 13, 2025
  • 5 min read
  • 0
Linux Syscall Threat Detection in Splunk with Uncoder AI

Linux Syscall Threat Detection in Splunk with Uncoder AI

  • Threats

Linux Syscall Threat Detection in Splunk with Uncoder AI How…

  • rooter
  • June 13, 2025
  • 2 min read
  • 0
From Sigma to SentinelOne: Detecting Password Access via Notepad with Uncoder AI

From Sigma to SentinelOne: Detecting Password Access via Notepad with Uncoder AI

  • Threats

How It Works The Sigma rule shown is designed to…

  • rooter
  • June 13, 2025
  • 2 min read
  • 0

Posts pagination

1 2 … 50 Next

Recent Posts

  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • Innovator Spotlight: Qualys
  • Innovator Spotlight: Qualys
  • Under Trump 2.0, Tech Companies Pull Back on Pride
  • RFK Jr. Wants Every American to Be Sporting a Wearable Within Four Years

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.