Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

Category: Threats

Category Added in a WPeMatico Campaign

  • Home
  • Threats
  • Page 2
CVE-2025-32463 and CVE-2025-32462: Sudo Local Privilege Escalation Vulnerabilities Threaten Linux Environments

CVE-2025-32463 and CVE-2025-32462: Sudo Local Privilege Escalation Vulnerabilities Threaten Linux Environments

  • Threats

Following the disclosure of two local privilege escalation (LPE) vulnerabilities,…

  • rooter
  • July 2, 2025
  • 5 min read
  • 0
CVE-2025-20281 and CVE-2025-20282 Vulnerabilities: Critical RCE Flaws in Cisco ISE and ISE-PIC Enable Root Access

CVE-2025-20281 and CVE-2025-20282 Vulnerabilities: Critical RCE Flaws in Cisco ISE and ISE-PIC Enable Root Access

  • Threats

As the summer heat intensifies, so does the wave of…

  • rooter
  • June 27, 2025
  • 5 min read
  • 0
CVE-2025-49144 Vulnerability: Critical Privilege Escalation Flaw in Notepad++ Leads to Full System Takeover

CVE-2025-49144 Vulnerability: Critical Privilege Escalation Flaw in Notepad++ Leads to Full System Takeover

  • Threats

The summer season has proven to be alarmingly hot, not…

  • rooter
  • June 25, 2025
  • 6 min read
  • 0
UAC-0001 (APT28) Activity Detection: The russian State-Sponsored Group Targets Government Agencies Using BEARDSHELL and COVENANT Malware

UAC-0001 (APT28) Activity Detection: The russian State-Sponsored Group Targets Government Agencies Using BEARDSHELL and COVENANT Malware

  • Threats

The nefarious nation-backed russian hacking collective known as UAC-0001 (aka…

  • rooter
  • June 24, 2025
  • 7 min read
  • 0
CVE-2025-6018 and CVE-2025-6019 Vulnerability Exploitation: Chaining Local Privilege Escalation Flaws Lets Attackers Gain Root Access on Most Linux Distributions

CVE-2025-6018 and CVE-2025-6019 Vulnerability Exploitation: Chaining Local Privilege Escalation Flaws Lets Attackers Gain Root Access on Most Linux Distributions

  • Threats

June has been a challenging month for cybersecurity teams, with…

  • rooter
  • June 19, 2025
  • 4 min read
  • 0
Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique 

Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique 

  • Threats

Mocha Manakin, believed to have ties to Interlock ransomware operations,…

  • rooter
  • June 19, 2025
  • 5 min read
  • 0
AI Threat Intelligence

AI Threat Intelligence

  • Threats

The rapid advancement and widespread adoption of generative AI (GenAI)…

  • rooter
  • June 18, 2025
  • 12 min read
  • 0
GrayAlpha Operation Detection: The Fin7-Affiliated Group Spreads PowerNet Loader, NetSupport RAT, and MaskBat Loader

GrayAlpha Operation Detection: The Fin7-Affiliated Group Spreads PowerNet Loader, NetSupport RAT, and MaskBat Loader

  • Threats

Defenders have identified a highly sophisticated campaign orchestrated by the…

  • rooter
  • June 17, 2025
  • 6 min read
  • 0
CVE-2025-4123 Vulnerability: “The Grafana Ghost” Zero-Day Enables Malicious Account Hijacking

CVE-2025-4123 Vulnerability: “The Grafana Ghost” Zero-Day Enables Malicious Account Hijacking

  • Threats

June has been a turbulent month for cyber defenders, marked…

  • rooter
  • June 16, 2025
  • 5 min read
  • 0
What Are the Predictions of AI in Cybersecurity?

What Are the Predictions of AI in Cybersecurity?

  • Threats

According to Gartner, by 2029, agentic Artificial Intelligence (AI) will…

  • rooter
  • June 16, 2025
  • 10 min read
  • 0

Posts pagination

Previous 1 2 3 … 51 Next

Recent Posts

  • ‘Predator: Badlands’ Just Feasted on Its Comic-Con Audience
  • ‘Predator: Killer of Killers’ Gets an Extended Ending Tonight
  • A Creepy Corn Maze Awaits at the ‘Clown in a Cornfield’ Activation
  • The New ‘Long Walk’ Trailer Promises a Grim, Nightmarish Stephen King Survival Tale
  • Vince Gilligan’s New Apple TV+ Sci-Fi Show Is Coming Real Soon

Recent Comments

No comments to show.

Archives

  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.