Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    How Attackers Bypass Synced Passkeys

    TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys. Synced passkeys inherit the risk of the cloud accounts and recovery processes that protect them, which creates material enterprise exposure. Adversary-in-the-middle (AiTM) kits can force authentication fallbacks that circumvent strong

    Read More How Attackers Bypass Synced PasskeysContinue

  • Blog

    Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped

    Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come under active exploitation in the wild, as the tech giant officially ended support for its Windows 10 operating system unless the PCs are enrolled in the Extended Security Updates (ESU) program. Of the 183 vulnerabilities,…

    Read More Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever ShippedContinue

  • Blog

    Inspiring Futures: Empowering the Next Generation of Girls in Tech

    At Sophos, we’re proud to champion the next generation of women in tech by creating early opportunities, fostering confidence, and supporting inclusive initiatives that empower girls to explore and thrive in technology.

    Read More Inspiring Futures: Empowering the Next Generation of Girls in TechContinue

  • Blog

    Africa Remains Top Global Target, Even as Attacks Decline

    Organizations across the continent saw 10% fewer attacks in September, but Africa remains the most attacked region in the world, leading the Global South.

    Read More Africa Remains Top Global Target, Even as Attacks DeclineContinue

  • Blog

    Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control

    Cybersecurity researchers have disclosed two critical security flaws impacting Red Lion Sixnet remote terminal unit (RTU) products that, if successfully exploited, could result in code execution with the highest privileges. The shortcomings, tracked as CVE-2023-40151 and CVE-2023-42770, are both rated 10.0 on the CVSS scoring system. “The vulnerabilities affect Red Lion SixTRAK and VersaTRAK

    Read More Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial ControlContinue

  • Blog

    Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access

    Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2025-2611 (CVSS score: 9.3), relates to improper input validation that can result in unauthenticated remote code execution due to the fact that the call…

    Read More Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell AccessContinue

  • Blog

    New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login

    SAP has rolled out security fixes for 13 new security issues, including additional hardening for a maximum-severity bug in SAP NetWeaver AS Java that could result in arbitrary command execution. The vulnerability, tracked as CVE-2025-42944, carries a CVSS score of 10.0. It has been described as a case of insecure deserialization. “Due to a deserialization…

    Read More New SAP NetWeaver Bug Lets Attackers Take Over Servers Without LoginContinue

  • Blog

    Microsoft Drops Terrifyingly Large October Patch Update

    October 2025’s enormous Patch Tuesday offers plenty of nightmares for admins, including actively exploited zero-days and insidious high-severity privilege-escalation bugs — and it spells curtains for Windows 10 updates.

    Read More Microsoft Drops Terrifyingly Large October Patch UpdateContinue

  • Blog

    China’s Flax Typhoon Turns Geo-Mapping Server into a Backdoor

    Chinese APT threat actors compromised an organization’s ArcGIS server, modifying the widely used geospatial mapping software for stealth access.

    Read More China’s Flax Typhoon Turns Geo-Mapping Server into a BackdoorContinue

  • Blog

    Pixnapping Attack Lets Attackers Steal 2FA on Android

    The proof-of-concept exploit allows an attacker to steal sensitive data from Gmail, Google Accounts, Google Authenticator, Google Maps, Signal, and Venmo.

    Read More Pixnapping Attack Lets Attackers Steal 2FA on AndroidContinue

Page navigation

1 2 3 … 281 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us