Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

Category: Threats

Category Added in a WPeMatico Campaign

  • Home
  • Threats
  • Page 2
CVE-2025-8292: Use-After-Free Vulnerability in Google Chrome Leads to RCE and System Compromise

CVE-2025-8292: Use-After-Free Vulnerability in Google Chrome Leads to RCE and System Compromise

  • Threats

After Microsoft’s recent patch for two critical zero-day vulnerabilities in…

  • rooter
  • July 31, 2025
  • 3 min read
  • 0
Koske Malware Detection: New AI-Generated Linux Threat in the Wild

Koske Malware Detection: New AI-Generated Linux Threat in the Wild

  • Threats

Attackers are increasingly leveraging AI to compromise critical business assets,…

  • rooter
  • July 29, 2025
  • 6 min read
  • 0
Epsilon Red Ransomware Detection: New Adversary Campaign Targeting Users Globally via ClickFix

Epsilon Red Ransomware Detection: New Adversary Campaign Targeting Users Globally via ClickFix

  • Threats

Following closely after the Interlock ransomware attacks that used a…

  • rooter
  • July 25, 2025
  • 5 min read
  • 0
Interlock Ransomware Detection: The FBI, CISA, and Partners Issue Joint Alert on Massive Attacks via the ClickFix Social Engineering Technique

Interlock Ransomware Detection: The FBI, CISA, and Partners Issue Joint Alert on Massive Attacks via the ClickFix Social Engineering Technique

  • Threats

In mid-July 2025, researchers spread the news of the reemergence…

  • rooter
  • July 23, 2025
  • 5 min read
  • 0
CVE-2025-53770 Detection: Microsoft SharePoint Zero-Day Vulnerability Is Actively Exploited for RCE Attacks

CVE-2025-53770 Detection: Microsoft SharePoint Zero-Day Vulnerability Is Actively Exploited for RCE Attacks

  • Threats

This summer saw a surge of critical vulnerabilities impacting Microsoft…

  • rooter
  • July 21, 2025
  • 5 min read
  • 0
UAC-0001 (APT28) Attack Detection: The russia-Backed Actor Uses LLM-Powered LAMEHUG Malware to Target Security and Defense Sector 

UAC-0001 (APT28) Attack Detection: The russia-Backed Actor Uses LLM-Powered LAMEHUG Malware to Target Security and Defense Sector 

  • Threats

The notorious russian state-sponsored threat group UAC-0001 (also tracked as…

  • rooter
  • July 18, 2025
  • 5 min read
  • 0
CVE-2025-6558 Vulnerability: Google Chrome Zero-Day Under Active Exploitation

CVE-2025-6558 Vulnerability: Google Chrome Zero-Day Under Active Exploitation

  • Threats

As the summer heat continues to climb, so does the…

  • rooter
  • July 16, 2025
  • 4 min read
  • 0
Interlock Ransomware Detection: Adversaries Deploy a Novel PHP-Based RAT Variant via FileFix

Interlock Ransomware Detection: Adversaries Deploy a Novel PHP-Based RAT Variant via FileFix

  • Threats

Threat actors operating the Interlock ransomware, known for executing high-impact…

  • rooter
  • July 15, 2025
  • 5 min read
  • 0
CVE-2025-25257 Vulnerability: Critical SQL Injection in Fortinet FortiWeb Enables Unauthenticated Remote Code Execution

CVE-2025-25257 Vulnerability: Critical SQL Injection in Fortinet FortiWeb Enables Unauthenticated Remote Code Execution

  • Threats

Following the recent disclosure of CVE-2025-47981, a critical heap-based buffer…

  • rooter
  • July 14, 2025
  • 4 min read
  • 0
CVE-2025-47981: Critical Heap-Based Buffer Overflow Vulnerability in Windows SPNEGO Extended Negotiation Leads to RCE

CVE-2025-47981: Critical Heap-Based Buffer Overflow Vulnerability in Windows SPNEGO Extended Negotiation Leads to RCE

  • Threats

With over 1.4 billion devices running Windows and widespread adoption…

  • rooter
  • July 10, 2025
  • 3 min read
  • 0

Posts pagination

Previous 1 2 3 … 52 Next

Recent Posts

  • Japan, South Korea Take Aim at North Korean IT Worker Scam
  • New AI model turns photos into explorable 3D worlds, with caveats
  • Japan, South Korea Take Aim at North Korean IT Worker Scam
  • 10 Horror Sequels to Watch on Peacock
  • Apple Planning AI-Powered Web Search for Siri Next Year: Report

Recent Comments

No comments to show.

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.