Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Inconsistent Privacy Labels Don’t Tell Users What They Are Getting

    Data privacy labels are a great idea for mobile apps, but the current versions just aren’t good enough.

    Read More Inconsistent Privacy Labels Don’t Tell Users What They Are GettingContinue

  • Blog

    China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

    A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign has been attributed to TA416, a cluster of activity that overlaps with DarkPeony, RedDelta, Red Lich, SmugX, UNC6384, and Vertigo Panda. “This TA416 activity included multiple

    Read More China-Linked TA416 Targets European Governments with PlugX and OAuth-Based PhishingContinue

  • Blog

    Apple Breaks Precedent, Patches DarkSword for iOS 18

    Even organizations with users unwilling or unable to adopt iOS 26 can now protect themselves from a severe mobile OS-cracking tool.

    Read More Apple Breaks Precedent, Patches DarkSword for iOS 18Continue

  • Blog

    Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

    Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research Team. “Instead of exposing command execution through URL parameters or request bodies, these web shells rely on threat actor-supplied cookie values to gate execution,

    Read More Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux ServersContinue

  • Blog

    Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

    As organizations disclose breaches tied to TeamPCP’s supply chain attacks, ShinyHunters and Lapsus$ are getting involved, taking credit, and creating a murky situation for enterprises.

    Read More Blast Radius of TeamPCP Attacks Expands Amid Hacker InfightingContinue

  • Blog

    Picking Up ‘Skull Vibrations’? Could Be XR Headset Authentication

    “Skull vibration harmonics generated by vital signs” can be used to sign in to VR, AR, and MR headsets, according to emerging research.

    Read More Picking Up ‘Skull Vibrations’? Could Be XR Headset AuthenticationContinue

  • Blog

    Source Code Leaks Highlight Lack of Supply Chain Oversight

    Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.

    Read More Source Code Leaks Highlight Lack of Supply Chain OversightContinue

  • Blog

    Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

    The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open-source artifacts across containers, libraries, Actions and skills.

    Read More Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply ChainContinue

  • Blog

    CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry

    Once CrowdStrike’s nemesis, Microsoft is now a collaborator. A shared interest in Formula 1 helped thaw the years-long fierce rivalry.

    Read More CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender TelemetryContinue

  • Blog

    UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

    The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean threat actors tracked as UNC1069. Maintainer Jason Saayman said the attackers tailored their social engineering efforts “specifically to me” by first approaching him under the guise of the founder of…

    Read More UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain AttackContinue

Page navigation

1 2 3 … 430 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us