Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

    Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the abuse of Microsoft Visual Studio Code (VS Code) tunnels for remote access. Zscaler ThreatLabz, which discovered the campaign last month, has attributed it with high confidence to…

    Read More Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2Continue

  • Blog

    LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

    A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active exploitation in the wild less than 13 hours after its public disclosure. The vulnerability, tracked as CVE-2026-33626 (CVSS score: 7.5), relates to a Server-Side Request Forgery (SSRF) vulnerability that could be exploited to access sensitive data….

    Read More LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of DisclosureContinue

  • Blog

    Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets

    The Chinese state-sponsored cyber threat is known for moving fast and trying odd attack vectors; now it’s branching out in tools, victimology, and TTPs.

    Read More Tropic Trooper APT Takes Aim at Home Routers, Japanese TargetsContinue

  • Blog

    Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia

    The threat actor gave itself plenty of options to support command and control, tapping Microsoft Outlook, Slack, Discord, and file.io for online espionage.

    Read More Chinese APT Abuses Multiple Cloud Tools to Spy on MongoliaContinue

  • Blog

    China-Backed Hackers Are Industrializing Botnets

    China’s state-backed groups are now using covert networks of compromised devices to execute attacks in a low-cost, low-risk, and deniable way.

    Read More China-Backed Hackers Are Industrializing BotnetsContinue

  • Blog

    UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

    A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy a custom malware suite on compromised hosts. “As with many other intrusions in recent years, UNC6692 relied heavily on impersonating IT helpdesk employees, convincing their victim to accept a Microsoft Teams chat invitation from…

    Read More UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW MalwareContinue

  • Blog

    Bad Memories Still Haunt AI Agents

    Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandled memory files will continue threaten AI systems.

    Read More Bad Memories Still Haunt AI AgentsContinue

  • Blog

    Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

    Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from Socket. “The affected package version appears to be @bitwarden/cli@2026.4.0, and the malicious code was published in ‘bw1.js,’ a file included in the package contents,” the application security company said. “The attack appears to…

    Read More Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain CampaignContinue

  • Blog

    ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories

    You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small changes. Same bugs. Same mistakes. The supply chain is messy. Packages you did not check are stealing data, adding backdoors, and spreading. Attacking the systems behind apps is easier than…

    Read More ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New StoriesContinue

  • Blog

    [Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed

    Imagine a world where hackers don’t sleep, don’t take breaks, and find weak spots in your systems instantly. Well, that world is already here. Thanks to AI, attackers are now launching automated, large-scale exploits faster than ever before. The time you have to fix a vulnerability before it gets attacked is shrinking to zero. We…

    Read More [Webinar] Mythos Reality Check: Beating Automated Exploitation at AI SpeedContinue

Page navigation

1 2 3 … 448 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us