Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    [Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses

    Post Content

    Read More [Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity DefensesContinue

  • Blog

    ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More

    ThreatsDay Bulletin is back on The Hacker News, and this week feels off in a familiar way. Nothing loud, nothing breaking everything at once. Just a lot of small things that shouldn’t work anymore but still do. Some of it looks simple, almost sloppy, until you see how well it lands. Other bits feel a…

    Read More ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & MoreContinue

  • Blog

    New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

    Cybersecurity researchers have disclosed a new Android malware family called Perseus that’s being actively distributed in the wild with an aim to conduct device takeover (DTO) and financial fraud. Perseus is built upon the foundations of Cerberus and Phoenix, at the same time evolving into a “more flexible and capable platform” for compromising Android devices…

    Read More New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive DataContinue

  • Blog

    How Ceros Gives Security Teams Visibility and Control in Claude Code

    Security teams have spent years building identity and access controls for human users and service accounts. But a new category of actor has quietly entered most enterprise environments, and it operates entirely outside those controls. Claude Code, Anthropic’s AI coding agent, is now running across engineering organizations at scale. It reads files, executes shell commands,…

    Read More How Ceros Gives Security Teams Visibility and Control in Claude CodeContinue

  • Blog

    DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover

    A new exploit kit for Apple iOS devices designed to steal sensitive data from is being wielded by multiple threat actors since at least November 2025, according to reports from Google Threat Intelligence Group (GTIG), iVerify, and Lookout. According to GTIG, multiple commercial surveillance vendors and suspected state-sponsored actors have utilized the full-chain exploit kit,…

    Read More DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device TakeoverContinue

  • Blog

    EU Sanctions Companies in China, Iran for Cyberattacks

    Already sanctioned in the US and the UK, these rulings prohibit companies and a couple of principals from entering or doing business in the European Union.

    Read More EU Sanctions Companies in China, Iran for CyberattacksContinue

  • Blog

    CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged government agencies to apply patches for two security flaws impacting Synacor Zimbra Collaboration Suite (ZCS) and Microsoft Office SharePoint, stating they have been actively exploited in the wild. The vulnerabilities in question are as follows – CVE-2025-66376 (CVSS score: 7.2) – A stored cross-site scripting

    Read More CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware AttacksContinue

  • Blog

    DarkSword: iPhone Exploit Kit Serves Spies & Thieves Alike

    A sophisticated iOS exploit chain leverages multiple zero-day vulnerabilities and is targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine.

    Read More DarkSword: iPhone Exploit Kit Serves Spies & Thieves AlikeContinue

  • Blog

    C2 Implant ‘SnappyClient’ Targets Crypto Wallets

    In addition to enabling remote access, the malware supports a wide range of capabilities including data theft and spying.

    Read More C2 Implant ‘SnappyClient’ Targets Crypto WalletsContinue

  • Blog

    OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs

    The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the Democratic People’s Republic of Korea (DPRK) information technology (IT) worker scheme with an aim to defraud U.S. businesses and generate illicit revenue for the regime to fund its weapons of mass…

    Read More OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote JobsContinue

Page navigation

1 2 3 … 414 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us