Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    ‘BlackSanta’ EDR Killer Targets HR Workflows

    A campaign by Russian-speaking cyberattackers hijacks workflows to deliver security-busting malware, allowing attackers to steal data without detection.

    Read More ‘BlackSanta’ EDR Killer Targets HR WorkflowsContinue

  • Blog

    New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

    Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run arbitrary SQL queries on victims’ databases and exfiltrate sensitive data within organizations’ Google Cloud environments. The shortcomings have been collectively named LeakyLooker by Tenable. There is no evidence that the vulnerabilities were exploited in

    Read More New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL QueriesContinue

  • Blog

    How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

    Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does things for us. These are called AI Agents. They can send emails, move data, and even manage software on their own. But there is a problem. While these agents make work faster, they also open a new…

    Read More How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic WorkflowsContinue

  • Blog

    The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

    You can’t control when the next critical vulnerability drops. You can control how much of your environment is exposed when it does. The problem is that most teams have more internet-facing exposure than they realise. Intruder’s Head of Security digs into why this happens and how teams can manage it deliberately. Time-to-exploit is shrinking The…

    Read More The Zero-Day Scramble is Avoidable: A Guide to Attack Surface ReductionContinue

  • Blog

    APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

    The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to facilitate long‑term surveillance of Ukrainian military personnel. The two malware families have been put to use since April 2024, ESET said in a new report shared with The Hacker News. APT28, also tracked as…

    Read More APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian MilitaryContinue

  • Blog

    Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

    Salesforce has warned of an increase in threat actor activity that’s aimed at exploiting misconfigurations in publicly accessible Experience Cloud sites by making use of a customized version of an open-source tool called AuraInspector. The activity, per the company, involves the exploitation of customers’ overly permissive Experience Cloud guest user configurations to obtain access to…

    Read More Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector ToolContinue

  • Blog

    CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability list is as follows – CVE-2021-22054 (CVSS score: 7.5) – A server-side request forgery (SSRF) vulnerability in Omnissa Workspace One UEM (formerly VMware Workspace One UEM)…

    Read More CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively ExploitedContinue

  • Blog

    White House Cyber Strategy Prioritizes Offense

    In a seven-page strategy document, the Trump administration signaled a shift to preemption and deterrence to handling cyber threats.

    Read More White House Cyber Strategy Prioritizes OffenseContinue

  • Blog

    ‘InstallFix’ Attacks Spread Fake Claude Code Sites

    A fresh cyberattack campaign blends malvertising with a ClickFix-style technique that highlights risky behavior with AI coding assistants and command-line interfaces.

    Read More ‘InstallFix’ Attacks Spread Fake Claude Code SitesContinue

  • Blog

    Are We Ready for Auto Remediation With Agentic AI?

    With the rapid innovations in AI, we are entering an exciting era of automated risk remediation. Learn about security team readiness to leverage agentic AI for threat and exposure management.

    Read More Are We Ready for Auto Remediation With Agentic AI?Continue

Page navigation

1 2 3 … 406 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us