Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

    Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc. The tool was developed by Israeli company Cobwebs Technologies and is now sold by its successor Penlink after the two firms merged in July 2023

    Read More Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad DataContinue

  • Blog

    Medusa Ransomware Attack

    What is the Attack? Microsoft Threat Intelligence has identified Storm-1175, a financially motivated threat actor conducting high-tempo ransomware operations leveraging the Medusa ransomware variant. The group specializes in rapidly exploiting vulnerable web-facing systems, often weaponizing newly disclosed vulnerabilities (N-days) and even zero-days before public disclosure. Storm-1175 | Medusa ransomware operations | Microsoft Security Blog A…

    Read More Medusa Ransomware AttackContinue

  • Blog

    Hims Breach Exposes the Most Sensitive Kinds of PHI

    Threat actors breached the telehealth brand, and now they may know who’s bald, overweight, and impotent. What could they do with that information?

    Read More Hims Breach Exposes the Most Sensitive Kinds of PHIContinue

  • Blog

    Your Next Breach Will Look Like Business as Usual

    These are the fundamental detection model shifts cybersecurity teams need to make to keep up with the rising number of credential-based attacks.

    Read More Your Next Breach Will Look Like Business as UsualContinue

  • Blog

    FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threats

    Post Content

    Read More FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud ThreatsContinue

  • Blog

    Orange Business Reimagines Enterprise Voice Communications With Trust and AI

    Post Content

    Read More Orange Business Reimagines Enterprise Voice Communications With Trust and AIContinue

  • Blog

    Industrial Controllers Still Vulnerable As Conflicts Move to Cyber

    The US government warns programmable logic controllers are being targeted, and research turns up 179 vulnerable operational technology (OT) devices.

    Read More Industrial Controllers Still Vulnerable As Conflicts Move to CyberContinue

  • Blog

    GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

    Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that’s designed to stealthily infect all integrated development environments (IDEs) on a developer’s machine. The technique has been discovered in an Open VSX extension named “specstudio.code-wakatime-activity-tracker,” which masquerades as WakaTime, a

    Read More GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEsContinue

  • Blog

    Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?

    Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said.

    Read More Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?Continue

  • Blog

    Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

    While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there’s a wide-open window nobody’s guarding: AI browser extensions.  A new report from LayerX exposes just how deep this blind spot goes, and why AI extensions may be the most dangerous AI threat surface in your network that isn’t on anyone’s 

    Read More Browser Extensions Are the New AI Consumption Channel That No One Is Talking AboutContinue

Page navigation

1 2 3 … 437 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us