Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

    A China-based threat actor known for deploying Medusa ransomware has been linked to the weaponization of a combination of zero-day and N-day vulnerabilities to orchestrate “high-velocity” attacks and break into susceptible internet-facing systems. “The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent

    Read More China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa RansomwareContinue

  • Blog

    Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

    Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The vulnerability in question is CVE-2025-59528 (CVSS score: 10.0), a code injection vulnerability that could result in remote code execution. “The CustomMCP node allows users to input configuration settings for connecting

    Read More Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances ExposedContinue

  • Blog

    AI-Assisted Supply Chain Attack Targets GitHub

    PRT-scan is the second in recent months where a threat actor appears to have leveraged AI for automated targeting of a widespread GitHub misconfiguration.

    Read More AI-Assisted Supply Chain Attack Targets GitHubContinue

  • Blog

    Axios Attack Shows Social Complex Engineering Is Industrialized

    The attack on the popular NPM package Axios is just one of many targeting maintainers and has shone a light on how threat actors can scale sophisticated social engineering campaigns.

    Read More Axios Attack Shows Social Complex Engineering Is IndustrializedContinue

  • Blog

    Fortinet Issues Emergency Patch for FortiClient Zero-Day

    The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a series of Fortinet vulnerabilities that have been exploited in the wild.

    Read More Fortinet Issues Emergency Patch for FortiClient Zero-DayContinue

  • Blog

    Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations

    An Iran-nexus threat actor is suspected to be behind a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E. amid ongoing conflict in the Middle East. The activity, assessed to be ongoing, was carried out in three distinct attack waves that took place on March 3, March 13, and March 23, 2026, per Check Point. “The campaign is…

    Read More Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 OrganizationsContinue

  • Blog

    DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

    Threat actors likely associated with the Democratic People’s Republic of Korea (DPRK) have been observed using GitHub as command-and-control (C2) infrastructure in multi-stage attacks targeting organizations in South Korea. The attack chain, per Fortinet FortiGuard Labs, involves obfuscated Windows shortcut (LNK) files acting as the starting point to drop a decoy PDF

    Read More DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South KoreaContinue

  • Blog

    Automated Credential Harvesting Campaign Exploits React2Shell Flaw

    An emerging threat cluster tracked as UAT-10608 is exploiting vulnerable Web-exposed Next.js apps and using an automated tool to exfiltrate credentials, secrets, and other system data.

    Read More Automated Credential Harvesting Campaign Exploits React2Shell FlawContinue

  • Blog

    Shadow AI in Healthcare is Here to Stay

    Medical professionals are not going to stop using AI tools to manage growing workloads. Organizations should prioritize bolstering security protocols to limit their blast radius.

    Read More Shadow AI in Healthcare is Here to StayContinue

  • Blog

    OWASP GenAI Security Project Gets Update, New Tools Matrix

    In recognition of 21 generative AI risks, the standards groups recommends that companies take separate but linked approaches to defending GenAI and agentic AI systems.

    Read More OWASP GenAI Security Project Gets Update, New Tools MatrixContinue

Page navigation

1 2 3 … 432 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us