Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

    A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook. “LucidRook is a sophisticated stager that embeds a Lua interpreter and Rust-compiled libraries within a dynamic-link library (DLL) to download and

    Read More UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing CampaignsContinue

  • Blog

    ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

    Thursday. Another week, another batch of things that probably should’ve been caught sooner but weren’t. This one’s got some range — old vulnerabilities getting new life, a few “why was that even possible” moments, attackers leaning on platforms and tools you’d normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more…

    Read More ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More StoriesContinue

  • Blog

    The Hidden Security Risks of Shadow AI in Enterprises

    As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility of security teams, bypassing controls and creating new blind spots in what is known as shadow AI. While similar to…

    Read More The Hidden Security Risks of Shadow AI in EnterprisesContinue

  • Blog

    Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

    Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. The finding, detailed by EXPMON’s Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact (“Invoice540.pdf”) first appeared on the VirusTotal platform on November 28, 2025. A second 

    Read More Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025Continue

  • Blog

    Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

    An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access Now, Lookout, and SMEX. Two of the targets included prominent Egyptian journalists and government critics, Mostafa

    Read More Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA RegionContinue

  • Blog

    Russia’s Forest Blizzard Nabs Rafts of Logins Via SOHO Routers

    Heard of fileless malware? How about malwareless cyber espionage? Russia’s APT28 is spying on global organizations by modifying just one DNS setting in vulnerable routers.

    Read More Russia’s Forest Blizzard Nabs Rafts of Logins Via SOHO RoutersContinue

  • Blog

    Threat Actors Get Crafty With Emojis to Escape Detection

    When 🤖 means “bot available,” 🧰 signifies “toolkit,” or 💰💰💰 translates to “big ransom,” bad actors can evade filters and keep it all on the down-low.

    Read More Threat Actors Get Crafty With Emojis to Escape DetectionContinue

  • Blog

    AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties

    Discovery used to be the bottleneck for open source bugs, but with automated discovery, remediation’s the bottleneck, which bounties don’t fund.

    Read More AI-Led Remediation Crisis Prompts HackerOne to Pause Bug BountiesContinue

  • Blog

    New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

    Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat’scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet’s targeting infrastructure. “Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices,” Darktrace said in a new report.

    Read More New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS ProxyContinue

  • Blog

    Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

    Cybersecurity researchers have lifted the curtain on a stealthy botnet that’s designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since it first surfaced in 2023. It’s capable of targeting a wide range of IoT devices, such as routers and gateways, spanning multiple architectures. “Built for

    Read More Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT DevicesContinue

Page navigation

1 2 3 … 435 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us