Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

Category: Threats

Category Added in a WPeMatico Campaign

  • Home
  • Threats
CVE-2025-5777 Detection: A New Critical Vulnerability Dubbed “CitrixBleed 2” in NetScaler ADC Faces Exploitation Risk

CVE-2025-5777 Detection: A New Critical Vulnerability Dubbed “CitrixBleed 2” in NetScaler ADC Faces Exploitation Risk

  • Threats

Shortly after the disclosure of two Sudo-related local privilege escalation…

  • rooter
  • July 4, 2025
  • 5 min read
  • 0
CVE-2025-32463 and CVE-2025-32462: Sudo Local Privilege Escalation Vulnerabilities Threaten Linux Environments

CVE-2025-32463 and CVE-2025-32462: Sudo Local Privilege Escalation Vulnerabilities Threaten Linux Environments

  • Threats

Following the disclosure of two local privilege escalation (LPE) vulnerabilities,…

  • rooter
  • July 2, 2025
  • 5 min read
  • 0
CVE-2025-20281 and CVE-2025-20282 Vulnerabilities: Critical RCE Flaws in Cisco ISE and ISE-PIC Enable Root Access

CVE-2025-20281 and CVE-2025-20282 Vulnerabilities: Critical RCE Flaws in Cisco ISE and ISE-PIC Enable Root Access

  • Threats

As the summer heat intensifies, so does the wave of…

  • rooter
  • June 27, 2025
  • 5 min read
  • 0
CVE-2025-49144 Vulnerability: Critical Privilege Escalation Flaw in Notepad++ Leads to Full System Takeover

CVE-2025-49144 Vulnerability: Critical Privilege Escalation Flaw in Notepad++ Leads to Full System Takeover

  • Threats

The summer season has proven to be alarmingly hot, not…

  • rooter
  • June 25, 2025
  • 6 min read
  • 0
UAC-0001 (APT28) Activity Detection: The russian State-Sponsored Group Targets Government Agencies Using BEARDSHELL and COVENANT Malware

UAC-0001 (APT28) Activity Detection: The russian State-Sponsored Group Targets Government Agencies Using BEARDSHELL and COVENANT Malware

  • Threats

The nefarious nation-backed russian hacking collective known as UAC-0001 (aka…

  • rooter
  • June 24, 2025
  • 7 min read
  • 0
CVE-2025-6018 and CVE-2025-6019 Vulnerability Exploitation: Chaining Local Privilege Escalation Flaws Lets Attackers Gain Root Access on Most Linux Distributions

CVE-2025-6018 and CVE-2025-6019 Vulnerability Exploitation: Chaining Local Privilege Escalation Flaws Lets Attackers Gain Root Access on Most Linux Distributions

  • Threats

June has been a challenging month for cybersecurity teams, with…

  • rooter
  • June 19, 2025
  • 4 min read
  • 0
Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique 

Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique 

  • Threats

Mocha Manakin, believed to have ties to Interlock ransomware operations,…

  • rooter
  • June 19, 2025
  • 5 min read
  • 0
AI Threat Intelligence

AI Threat Intelligence

  • Threats

The rapid advancement and widespread adoption of generative AI (GenAI)…

  • rooter
  • June 18, 2025
  • 12 min read
  • 0
GrayAlpha Operation Detection: The Fin7-Affiliated Group Spreads PowerNet Loader, NetSupport RAT, and MaskBat Loader

GrayAlpha Operation Detection: The Fin7-Affiliated Group Spreads PowerNet Loader, NetSupport RAT, and MaskBat Loader

  • Threats

Defenders have identified a highly sophisticated campaign orchestrated by the…

  • rooter
  • June 17, 2025
  • 6 min read
  • 0
CVE-2025-4123 Vulnerability: “The Grafana Ghost” Zero-Day Enables Malicious Account Hijacking

CVE-2025-4123 Vulnerability: “The Grafana Ghost” Zero-Day Enables Malicious Account Hijacking

  • Threats

June has been a turbulent month for cyber defenders, marked…

  • rooter
  • June 16, 2025
  • 5 min read
  • 0

Posts pagination

1 2 … 50 Next

Recent Posts

  • Robinhood Wants to Redo Wall Street on the Blockchain
  • ‘X-Files’ Composer Mark Snow Dies at Age 78
  • Joe Rogan’s Latest Episode Will Make You Question Everything About AI
  • Latest Sales Data Reveal Clear Winners And Losers in a Messy EV Market
  • Hell Yeah, ‘Cyberpunk: Edgerunners II’ is Happening

Recent Comments

No comments to show.

Archives

  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.