Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

    Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. “The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors in its arsenal,” Slovakian cybersecurity company ESET said in a report shared…

    Read More China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go BackdoorsContinue

  • Blog

    Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

    Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal systems. The company said it made the discovery after expanding its investigation to include an extra set of compromise indicators, alongside a review of requests…

    Read More Vercel Finds More Compromised Accounts in Context.ai-Linked BreachContinue

  • Blog

    Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

    Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device. The vulnerability, tracked as CVE-2026-28950 (CVSS score: N/A), has been described as a logging issue that has been addressed with improved data redaction. “Notifications marked for deletion could be…

    Read More Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic CaseContinue

  • Blog

    ‘The Gentlemen’ Rapidly Rises to Ransomware Prominence

    Not nearly as polite as the name suggests, the ransomware gang has impressed researchers with its speed in scaling up operations — and its sophistication.

    Read More ‘The Gentlemen’ Rapidly Rises to Ransomware ProminenceContinue

  • Blog

    Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

    Cybersecurity researchers have warned of malicious images pushed to the official “checkmarx/kics” Docker Hub repository. In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official…

    Read More Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply ChainContinue

  • Blog

    Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens

    Cybersecurity researchers have flagged a fresh set of packages that have been compromised by bad actors to deliver a self-propagating worm that spreads through stolen developer npm tokens. The supply chain worm has been detected by both Socket and StepSecurity, with the companies tracking the activity under the name CanisterSprawl owing to the use of…

    Read More Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer TokensContinue

  • Blog

    Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

    The threat actor known as Harvester has been attributed to a new Linux version of its GoGra backdoor deployed as part of attacks likely targeting entities in South Asia. “The malware uses the legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control (C2) channel, allowing it to bypass traditional perimeter network defenses,” the…

    Read More Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph APIContinue

  • Blog

    DPRK Fake Job Scams Self-Propagate in ‘Contagious Interview’

    A compromised developer’s repository serves as a worm-like infection vector to spread remote access Trojans (RATs) and other malware.

    Read More DPRK Fake Job Scams Self-Propagate in ‘Contagious Interview’Continue

  • Blog

    Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

    Cybersecurity researchers have discovered a previously undocumented data wiper that has been used in attacks targeting Venezuela at the end of last year and the start of 2026. Dubbed Lotus Wiper, the novel file wiper has been used in a destructive campaign targeting the energy and utilities sector in Venezuela, per findings from Kaspersky. “Two…

    Read More Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive AttackContinue

  • Blog

    Toxic Combinations: When Cross-App Permissions Stack into Risk

    On January 31, 2026, researchers disclosed that Moltbook, a social network built for AI agents, had left its database wide open, exposing 35,000 email addresses and 1.5 million agent API tokens across 770,000 active agents. The more worrying part sat inside the private messages. Some of those conversations held plaintext third-party credentials, including OpenAI API…

    Read More Toxic Combinations: When Cross-App Permissions Stack into RiskContinue

Page navigation

1 2 3 … 446 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us