Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

    The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering. The confiscated funds were traced to cryptocurrency addresses used for the laundering of criminally derived proceeds stolen from victims of cryptocurrency investment scams, the department added….

    Read More DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto ScamsContinue

  • Blog

    900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

    The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting in December 2025. Of these, 401 instances are located in the U.S., followed by 51 in Brazil, 43 in Canada, 40 in Germany, and 36 in France….

    Read More 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell AttacksContinue

  • Blog

    The Case for Why Better Breach Transparency Matters

    It’s become a standard practice for organizations to disclose the bare minimum about a data breach, or worse — not disclose the incident at all.

    Read More The Case for Why Better Breach Transparency MattersContinue

  • Blog

    Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

    Cybersecurity researchers have disclosed details of a malicious Go module that’s designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe. The Go module, github[.]com/xinfeisoft/crypto, impersonates the legitimate “golang.org/x/crypto” codebase, but injects malicious code that’s responsible for exfiltrating secrets entered via terminal password

    Read More Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe BackdoorContinue

  • Blog

    Claude Code Security Shows Promise, Not Perfection

    Claude Code’s introduction rippled across the stock market, but researchers and analysts say its impact was overstated, as they peel back the layers.

    Read More Claude Code Security Shows Promise, Not PerfectionContinue

  • Blog

    ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

    The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks. The campaign, codenamed Ruby Jumper by Zscaler ThreatLabz, involves…

    Read More ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped NetworksContinue

  • Blog

    Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

    Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). “A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gui.jar,” the Microsoft Threat Intelligence team said in a post on X….

    Read More Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat PlatformsContinue

  • Blog

    Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams

    Meta on Thursday said it’s taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based in Brazil, China, and Vietnam. As part of the effort, the advertisers’ methods of payment have been suspended, related accounts have been disabled, and the website domain names used to pull…

    Read More Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait ScamsContinue

  • Blog

    Marquis v. SonicWall Lawsuit Ups the Breach Blame Game

    When a company gets breached through a third-party security vendor, who should bear responsibility? For one FinTech company, the answer is the firewall provider.

    Read More Marquis v. SonicWall Lawsuit Ups the Breach Blame GameContinue

  • Blog

    Cisco SD-WAN Zero-Day Under Exploitation for 3 Years

    The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.

    Read More Cisco SD-WAN Zero-Day Under Exploitation for 3 YearsContinue

Page navigation

1 2 3 … 397 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us