Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues

    OpenAI on Friday began rolling out Codex Security, an artificial intelligence (AI)-powered security agent that’s designed to find, validate, and propose fixes for vulnerabilities. The feature is available in a research preview to ChatGPT Pro, Enterprise, Business, and Edu customers via the Codex web with free usage for the next month. “It builds deep context…

    Read More OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity IssuesContinue

  • Blog

    Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model

    Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of a security partnership with Mozilla. Of these, 14 have been classified as high, seven have been classified as moderate, and one has been rated low in severity. The issues were addressed in Firefox 148, released late last…

    Read More Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI ModelContinue

  • Blog

    North Korean APTs Use AI to Enhance IT Worker Scams

    DPRK worker scams are old hat, but they’re still working, thanks to AI tools that help with everything from face swapping to daily emails.

    Read More North Korean APTs Use AI to Enhance IT Worker ScamsContinue

  • Blog

    Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

    The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence (AI)-powered coding tools to strike targets with various implants. The activity is designed to produce a “high-volume, mediocre mass of implants” that are developed using lesser-known programming languages like Nim, Zig, and Crystal and rely on trusted…

    Read More Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting IndiaContinue

  • Blog

    EU Auto Rules Shift Gears on Cybersecurity Standards

    The European Union is taking new precautions as climate change and cybersecurity threats rise across the automotive industry.

    Read More EU Auto Rules Shift Gears on Cybersecurity StandardsContinue

  • Blog

    Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

    Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm, AsyncRAT, and Xeno RAT. The stealthy attack chain has been codenamed VOID#GEIST by Securonix Threat Research. At a high level, the obfuscated batch script is…

    Read More Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RATContinue

  • Blog

    Iran’s Cyber-Kinetic War Doctrine Takes Shape

    Iran has been hacking IP cameras to plan missile strikes against its enemies, and mounting other attacks on physical assets, showing how cyber and kinetic warfare are fast becoming one in the same.

    Read More Iran’s Cyber-Kinetic War Doctrine Takes ShapeContinue

  • Blog

    Cyberattack on Mexico’s Gov’t Agencies Highlight AI Threat

    Using Anthropic’s Claude, OpenAI’s ChatGPT, and a detailed playbook prompt, a handful of cyberattackers reportedly gained access to government agencies and its citizens’ data.

    Read More Cyberattack on Mexico’s Gov’t Agencies Highlight AI ThreatContinue

  • Blog

    The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity

    Scaling cybersecurity services as an MSP or MSSP requires technical expertise and a business model that delivers measurable value at scale. Risk-based cybersecurity is the foundation of that model. When done right, it builds client trust, increases upsell opportunities, and drives recurring revenue. But to deliver this consistently and efficiently, you need the right technology…

    Read More The MSP Guide to Using AI-Powered Risk Management to Scale CybersecurityContinue

  • Blog

    Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

    New research from Broadcom’s Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself in several U.S. companies’ networks, including banks, airports, non-profit, and the Israeli arm of a software company. The activity has been attributed to a state-sponsored hacking group called MuddyWater (aka Seedworm). It’s affiliated with…

    Read More Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor BackdoorContinue

Page navigation

1 2 3 … 404 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us