Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

    Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis and PostgreSQL exploitation, deploy reverse shells, harvest credentials, and drop a persistent implant. “Every package contains three files (package.json, index.js, postinstall.js), has no description, repository,

    Read More 36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent ImplantsContinue

  • Blog

    Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

    Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the wild. The vulnerability, tracked as CVE-2026-35616 (CVSS score: 9.1), has been described as a pre-authentication API access bypass leading to privilege escalation. “An improper access control vulnerability [CWE-284] in FortiClient EMS may allow an

    Read More Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMSContinue

  • Blog

    Inconsistent Privacy Labels Don’t Tell Users What They Are Getting

    Data privacy labels are a great idea for mobile apps, but the current versions just aren’t good enough.

    Read More Inconsistent Privacy Labels Don’t Tell Users What They Are GettingContinue

  • Blog

    China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

    A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign has been attributed to TA416, a cluster of activity that overlaps with DarkPeony, RedDelta, Red Lich, SmugX, UNC6384, and Vertigo Panda. “This TA416 activity included multiple

    Read More China-Linked TA416 Targets European Governments with PlugX and OAuth-Based PhishingContinue

  • Blog

    Apple Breaks Precedent, Patches DarkSword for iOS 18

    Even organizations with users unwilling or unable to adopt iOS 26 can now protect themselves from a severe mobile OS-cracking tool.

    Read More Apple Breaks Precedent, Patches DarkSword for iOS 18Continue

  • Blog

    Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

    Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research Team. “Instead of exposing command execution through URL parameters or request bodies, these web shells rely on threat actor-supplied cookie values to gate execution,

    Read More Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux ServersContinue

  • Blog

    Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

    As organizations disclose breaches tied to TeamPCP’s supply chain attacks, ShinyHunters and Lapsus$ are getting involved, taking credit, and creating a murky situation for enterprises.

    Read More Blast Radius of TeamPCP Attacks Expands Amid Hacker InfightingContinue

  • Blog

    Picking Up ‘Skull Vibrations’? Could Be XR Headset Authentication

    “Skull vibration harmonics generated by vital signs” can be used to sign in to VR, AR, and MR headsets, according to emerging research.

    Read More Picking Up ‘Skull Vibrations’? Could Be XR Headset AuthenticationContinue

  • Blog

    Source Code Leaks Highlight Lack of Supply Chain Oversight

    Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.

    Read More Source Code Leaks Highlight Lack of Supply Chain OversightContinue

  • Blog

    Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

    The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open-source artifacts across containers, libraries, Actions and skills.

    Read More Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply ChainContinue

Page navigation

1 2 3 … 430 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us