Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

Category: Threats

Category Added in a WPeMatico Campaign

  • Home
  • Threats
  • Page 11
UAC-0173 Activity Detection: Hackers Launch Phishing Attacks Against Ukrainian Notaries Using the DARKCRYSTALRAT Malware

UAC-0173 Activity Detection: Hackers Launch Phishing Attacks Against Ukrainian Notaries Using the DARKCRYSTALRAT Malware

  • Threats

Following the investigation into UAC-0212’s increasing activity against multiple organizations…

  • rooter
  • February 26, 2025
  • 5 min read
  • 0
CVE-2025–27364 in MITRE Caldera: Exploitation of a New Max-Severity RCE Vulnerability via Linker Flag Manipulation Can Lead to Full System Compromise 

CVE-2025–27364 in MITRE Caldera: Exploitation of a New Max-Severity RCE Vulnerability via Linker Flag Manipulation Can Lead to Full System Compromise 

  • Threats

A novel max-severity RCE vulnerability (CVE-2025-27364) in MITRE Caldera poses…

  • rooter
  • February 25, 2025
  • 4 min read
  • 0
UAC-0212 Attack Detection: Hackers Linked to UAC-0002 aka Sandworm APT Subcluster Launch Targeted Attacks Against the Ukrainian Critical Infrastructure 

UAC-0212 Attack Detection: Hackers Linked to UAC-0002 aka Sandworm APT Subcluster Launch Targeted Attacks Against the Ukrainian Critical Infrastructure 

  • Threats

In Q1 2024, defenders uncovered destructive cyberattacks against the information…

  • rooter
  • February 24, 2025
  • 6 min read
  • 0
CVE-2025-20059: Relative Path Traversal Vulnerability in Ping Identity PingAM Java Policy Agent

CVE-2025-20059: Relative Path Traversal Vulnerability in Ping Identity PingAM Java Policy Agent

  • Threats

Hard on the heels of the recent disclosure of CVE-2025-0108…

  • rooter
  • February 21, 2025
  • 3 min read
  • 0
CVE-2025-0108 Detection: Active Exploitation of an Authentication Bypass Palo Alto Networks PAN-OS Software

CVE-2025-0108 Detection: Active Exploitation of an Authentication Bypass Palo Alto Networks PAN-OS Software

  • Threats

A recently patched firewall flaw in Palo Alto Networks PAN-OS,…

  • rooter
  • February 20, 2025
  • 3 min read
  • 0
Ghost (Cring) Ransomware Detection: The FBI, CISA, and Partners Warn of Increasing China-Backed Group’s Attacks for Financial Gain

Ghost (Cring) Ransomware Detection: The FBI, CISA, and Partners Warn of Increasing China-Backed Group’s Attacks for Financial Gain

  • Threats

Increasing ransomware volumes, expanding hacker collectives, and record-breaking damage costs…

  • rooter
  • February 20, 2025
  • 5 min read
  • 0
CVE-2025-26465 & CVE-2025-26466 Vulnerabilities Expose Systems to Man-in-the-Middle and DoS Attacks

CVE-2025-26465 & CVE-2025-26466 Vulnerabilities Expose Systems to Man-in-the-Middle and DoS Attacks

  • Threats

Two newly uncovered security flaws in the open-source OpenSSH suite…

  • rooter
  • February 19, 2025
  • 3 min read
  • 0
CVE-2025-1094 Exploitation, a Critical SQL Injection Vulnerability in PostgreSQL That Can Lead to Arbitrary Code Execution 

CVE-2025-1094 Exploitation, a Critical SQL Injection Vulnerability in PostgreSQL That Can Lead to Arbitrary Code Execution 

  • Threats

A novel PostgreSQL flaw, CVE-2025-1094, has hit the headlines. Defenders…

  • rooter
  • February 18, 2025
  • 2 min read
  • 0
RedCurl/EarthKapre APT Attack Detection: A Sophisticated Cyber-Espionage Group Uses a Legitimate Adobe Executable to Deploy a Loader

RedCurl/EarthKapre APT Attack Detection: A Sophisticated Cyber-Espionage Group Uses a Legitimate Adobe Executable to Deploy a Loader

  • Threats

The nefarious cyber-espionage hacking collective tracked as EarthKapre or RedCurl…

  • rooter
  • February 17, 2025
  • 5 min read
  • 0
Sandworm APT Attacks Detection: russian State-Sponsored Hackers Deploy Malicious Windows KMS Activators to Target Ukraine

Sandworm APT Attacks Detection: russian State-Sponsored Hackers Deploy Malicious Windows KMS Activators to Target Ukraine

  • Threats

For over a decade, russia-backed Sandworm APT group (also tracked…

  • rooter
  • February 12, 2025
  • 5 min read
  • 0

Posts pagination

Previous 1 … 10 11 12 … 50 Next

Recent Posts

  • Why Some AI Models Spew 50 Times More Greenhouse Gas to Answer the Same Question
  • New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions
  • Francis Ford Coppola’s ‘Megalopolis’ Is Returning to Theaters, in a Truly Mega Way
  • Blockbusters Take Over Theme Parks for a Mega Movie Summer
  • Healthcare services company Episource data breach impacts 5.4 Million people

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.