Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

Category: Threats

Category Added in a WPeMatico Campaign

  • Home
  • Threats
  • Page 10
Operation AkaiRyū Attacks Detection: MirrorFace China-Backed APT Group Targets Central European Diplomatic Institute Using ANEL Backdoor

Operation AkaiRyū Attacks Detection: MirrorFace China-Backed APT Group Targets Central European Diplomatic Institute Using ANEL Backdoor

  • Threats

According to ESET APT Activity Report Q2 2024-Q3 2024, China-linked…

  • rooter
  • March 19, 2025
  • 5 min read
  • 0
UAC-0200 Attack Detection: Cyber-Espionage Activity Targeting Defense Industry Sector and the Armed Forces of Ukraine Using DarkCrystal RAT

UAC-0200 Attack Detection: Cyber-Espionage Activity Targeting Defense Industry Sector and the Armed Forces of Ukraine Using DarkCrystal RAT

  • Threats

The UAC-0200 hacking group resurfaces in the cyber threat arena.…

  • rooter
  • March 19, 2025
  • 4 min read
  • 0
Medusa Ransomware Detection: The FBI, CISA & Partners Warn of Increasing Attacks by Ransomware Developers and Affiliates Against Critical Infrastructure

Medusa Ransomware Detection: The FBI, CISA & Partners Warn of Increasing Attacks by Ransomware Developers and Affiliates Against Critical Infrastructure

  • Threats

According to Sophos, ransomware recovery costs soared to $2.73 million…

  • rooter
  • March 13, 2025
  • 5 min read
  • 0
CVE-2025-24201 Exploitation: Apple Fixes the WebKit Zero-Day Vulnerability Used in Sophisticated Attacks

CVE-2025-24201 Exploitation: Apple Fixes the WebKit Zero-Day Vulnerability Used in Sophisticated Attacks

  • Threats

Hot on the heels of the exploitation attempts of the…

  • rooter
  • March 12, 2025
  • 3 min read
  • 0
CVE-2025-27840: Vulnerability Exploitation in Espressif ESP32 Bluetooth Chips Can Lead to Unauthorized Access to Devices

CVE-2025-27840: Vulnerability Exploitation in Espressif ESP32 Bluetooth Chips Can Lead to Unauthorized Access to Devices

  • Threats

Following the disclosure of an authorization bypass vulnerability in the…

  • rooter
  • March 11, 2025
  • 4 min read
  • 0
SOC Prime Announces Referral Program for Individual Cyber Defenders

SOC Prime Announces Referral Program for Individual Cyber Defenders

  • Threats

Invite Your Peers, Get 20% Off SOC Prime Platform Solo…

  • rooter
  • March 11, 2025
  • 3 min read
  • 0
Uncoder: Private Non-Agentic AI for Threat-Informed Detection Engineering

Uncoder: Private Non-Agentic AI for Threat-Informed Detection Engineering

  • Threats

SOC Prime is excited to announce a major upgrade to…

  • rooter
  • March 6, 2025
  • 8 min read
  • 0
Detect Hellсat Ransomware Attacks: New Ransomware-as-a-Service Threat Group Targeting а Variety of High-Profile Organizations Globally

Detect Hellсat Ransomware Attacks: New Ransomware-as-a-Service Threat Group Targeting а Variety of High-Profile Organizations Globally

  • Threats

Ransomware remains a top cybersecurity threat, with attack costs soaring…

  • rooter
  • March 4, 2025
  • 5 min read
  • 0
CVE-2025-25730 Vulnerability: Authorization Bypass in Motorola Mobility Droid Razr HD (Model XT926) 

CVE-2025-25730 Vulnerability: Authorization Bypass in Motorola Mobility Droid Razr HD (Model XT926) 

  • Threats

Hot on the heels of the disclosure of CVE-2025-1001, a…

  • rooter
  • February 28, 2025
  • 3 min read
  • 0
CVE-2025-1001 Vulnerability in Medixant RadiAnt DICOM Viewer Enables Threat Actors to Perform Machine-in-the-Middle Attacks 

CVE-2025-1001 Vulnerability in Medixant RadiAnt DICOM Viewer Enables Threat Actors to Perform Machine-in-the-Middle Attacks 

  • Threats

A new day, a new menace for cyber defenders. A…

  • rooter
  • February 26, 2025
  • 3 min read
  • 0

Posts pagination

Previous 1 … 9 10 11 … 50 Next

Recent Posts

  • Nintendo’s Revitalized GameCube Controller for Switch 2 Is Somehow Better Than the Original
  • Shadow IT in the Cloud: Risks and Mitigation Strategies
  • Five Uncomfortable Truths About LLMs in Production
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign
  • The MSP Cyber Snapshot – Weekly News with Adam Pilton – June 19th 2025

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.