Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems

    Cybersecurity researchers have flagged a new malware called ZionSiphon that appears to be specifically designed to target Israeli water treatment and desalination systems. The malware has been codenamed ZionSiphon by Darktrace, highlighting its ability to set up persistence, tamper with local configuration files, and scan for operational technology (OT)-relevant services on the local subnet.

    Read More Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT SystemsContinue

  • Blog

    Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials

    Web infrastructure provider Vercel has disclosed a security breach that allows bad actors to gain unauthorized access to “certain” internal Vercel systems. The incident stemmed from the compromise of Context.ai, a third-party artificial intelligence (AI) tool, that was used by an employee at the company. “The attacker used that access to take over the employee’s…

    Read More Vercel Breach Tied to Context AI Hack Exposes Limited Customer CredentialsContinue

  • Blog

    $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

    Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it’s suspending operations after it blamed Western intelligence agencies for a $13.74 million hack. The exchange said it fell victim to what it described as a large-scale cyber attack that bore hallmarks of foreign intelligence agency involvement. This attack led…

    Read More $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence ClaimsContinue

  • Blog

    Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

    Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack targeting TBK DVR devices has been found to exploit CVE-2024-3721 (CVSS score: 6.3), a medium-severity command injection vulnerability…

    Read More Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS BotnetContinue

  • Blog

    How NIST’s Cutback of CVE Handling Impacts Cyber Teams

    Industry and ad hoc coalitions appear poised to help fill the gap created by NIST’s decision to cut back on CVE data enrichment.

    Read More How NIST’s Cutback of CVE Handling Impacts Cyber TeamsContinue

  • Blog

    Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing

    In embracing device code phishing, attackers trick victims into handing over account access by using a service’s legitimate new-device login flow.

    Read More Tycoon 2FA Phishers Scatter, Adopt Device Code PhishingContinue

  • Blog

    Every Old Vulnerability Is Now an AI Vulnerability

    AI’s danger isn’t that it’s creating new bugs, it’s that it’s amplifying old ones.

    Read More Every Old Vulnerability Is Now an AI VulnerabilityContinue

  • Blog

    Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

    Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer (requires GitHub sign-in), RedSun, and UnDefend, all of which were released as zero-days by a researcher known as Chaotic Eclipse (

    Read More Three Microsoft Defender Zero-Days Actively Exploited; Two Still UnpatchedContinue

  • Blog

    Coast Guard’s New Cybersecurity Rules Offers Lessons for CISOs

    The Maritime Transportation Security Act (MTSA) requires plans to protect OT systems, audits by independent third parties, and a hybrid OT-security role.

    Read More Coast Guard’s New Cybersecurity Rules Offers Lessons for CISOsContinue

  • Blog

    Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

    Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in 2025. The new policy updates relate to contact and location permissions in Android, allowing third-party apps…

    Read More Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy OverhaulContinue

Page navigation

1 2 3 … 443 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us