Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

Category: Threats

Category Added in a WPeMatico Campaign

  • Home
  • Threats
  • Page 27
Uncoder AI: A Guide on Contributing Detection Rules to SOC Prime Platform via Threat Bounty Program

Uncoder AI: A Guide on Contributing Detection Rules to SOC Prime Platform via Threat Bounty Program

  • Threats

Efficiency and collaboration are essential in cybersecurity. As part of…

  • rooter
  • October 7, 2024
  • 5 min read
  • 0
Detecting CUPS Exploits: Critical Security Vulnerabilities in Linux and Unix Systems Allow Remote Code Execution

Detecting CUPS Exploits: Critical Security Vulnerabilities in Linux and Unix Systems Allow Remote Code Execution

  • Threats

Another day, another challenge for cyber defenders. Recently, researchers revealed…

  • rooter
  • October 1, 2024
  • 4 min read
  • 0
Uncoder for Flexible Threat Detection: From Cloud to Air-Gapped Networks

Uncoder for Flexible Threat Detection: From Cloud to Air-Gapped Networks

  • Threats

In today’s threat landscape, when the number and sophistication of…

  • rooter
  • October 1, 2024
  • 6 min read
  • 0
Gamaredon Attack Detection: Cyber-Espionage Operations Against Ukraine by the russia-linked APT 

Gamaredon Attack Detection: Cyber-Espionage Operations Against Ukraine by the russia-linked APT 

  • Threats

The nefarious state-sponsored russia-aligned Gamaredon (aka Hive0051, UAC-0010, or Armageddon…

  • rooter
  • September 26, 2024
  • 5 min read
  • 0
SnipBot Detection: A New RomCom Malware Variant Leverages a Custom Code Obfuscation Method and Sophisticated Evasion Techniques

SnipBot Detection: A New RomCom Malware Variant Leverages a Custom Code Obfuscation Method and Sophisticated Evasion Techniques

  • Threats

A novel iteration of the RomCom malware family emerges in…

  • rooter
  • September 25, 2024
  • 4 min read
  • 0
Vendor-Agnostic Cybersecurity: Adapting to the Future of Threat Detection

Vendor-Agnostic Cybersecurity: Adapting to the Future of Threat Detection

  • Threats

In today’s fast-moving technological landscape, organizations face unprecedented challenges in…

  • rooter
  • September 24, 2024
  • 6 min read
  • 0
Earth Baxia Attack Detection: China-Backed Hackers Use Spear-Phishing, Exploit the GeoServer Vulnerability (CVE-2024-36401), and Apply a New EAGLEDOOR Malware to Target APAC

Earth Baxia Attack Detection: China-Backed Hackers Use Spear-Phishing, Exploit the GeoServer Vulnerability (CVE-2024-36401), and Apply a New EAGLEDOOR Malware to Target APAC

  • Threats

In the first quarter of 2024, state-sponsored APT groups from…

  • rooter
  • September 23, 2024
  • 5 min read
  • 0
CVE-2024-6670 and CVE-2024-6671 Detection: RCE Attacks Exploiting Critical SQL Injection Vulnerabilities in WhatsUp Gold 

CVE-2024-6670 and CVE-2024-6671 Detection: RCE Attacks Exploiting Critical SQL Injection Vulnerabilities in WhatsUp Gold 

  • Threats

Hackers are weaponizing PoC exploits for newly identified vulnerabilities in…

  • rooter
  • September 17, 2024
  • 3 min read
  • 0
Celebrating Detection Engineering Excellence

Celebrating Detection Engineering Excellence

  • Threats

SOC Prime Recognizes Top Threat Bounty Researchers Mastering Uncoder AI…

  • rooter
  • September 17, 2024
  • 5 min read
  • 0
RansomHub Ransomware Detection: Attackers Exploits Kaspersky’s TDSSKiller to Disable EDR Systems

RansomHub Ransomware Detection: Attackers Exploits Kaspersky’s TDSSKiller to Disable EDR Systems

  • Threats

Right after the joint advisory by FBI, CISA, and partners…

  • rooter
  • September 13, 2024
  • 3 min read
  • 0

Posts pagination

Previous 1 … 26 27 28 … 52 Next

Recent Posts

  • IBM 2025 Cost of a Data Breach Report: Lessons for API and AI Security
  • 5 Sophisticated Scams Everyone Should Know About – And How to Spot Them
  • What is Barrel Phishing and How to Protect Your Small Business
  • Simple Steps for Attack Surface Reduction
  • Zoom patches critical Windows flaw allowing privilege escalation

Recent Comments

No comments to show.

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.