Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

    Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google’s generative artificial intelligence (AI) chatbot, as part of its execution flow and achieves persistence. The malware has been codenamed PromptSpy by ESET. The malware is equipped to capture lockscreen data, block uninstallation efforts, gather device information, take screenshots,

    Read More PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps PersistenceContinue

  • Blog

    INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

    An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an effort led by law enforcement agencies from 16 African countries. The initiative, codenamed Operation Red Card 2.0, took place between December 8, 2025 and January 30, 2026, according to INTERPOL. It targeted infrastructure…

    Read More INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime CrackdownContinue

  • Blog

    Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

    Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges. Windows Admin Center is a locally deployed, browser-based management tool set that lets users manage their Windows Clients, Servers, and Clusters without the need for connecting to the cloud. The high-severity vulnerability, tracked as CVE-2026-26119,…

    Read More Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin CenterContinue

  • Blog

    ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

    The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up across platforms, tools, and industries — often all at the same time. Some developments are headline-level. Others sit in the background but carry long-term impact. Together, they shape how defenders need to…

    Read More ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ StoriesContinue

  • Blog

    From Exposure to Exploitation: How AI Collapses Your Response Window

    We’ve all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving. An engineer generates a “temporary” API key for testing and forgets to revoke it. In the past, these were minor operational risks, debts you’d eventually pay down during a slower cycle. In…

    Read More From Exposure to Exploitation: How AI Collapses Your Response WindowContinue

  • Blog

    Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

    Cybersecurity researchers have disclosed details of a new Android trojan called Massiv that’s designed to facilitate device takeover (DTO) attacks for financial theft. The malware, according to ThreatFabric, masquerades as seemingly harmless IPTV apps to deceive victims, indicating that the activity is primarily singling out users looking for the online TV applications. “This new threat,…

    Read More Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking UsersContinue

  • Blog

    CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

    Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran’s ongoing protests to conduct information theft and long-term espionage. The Acronis Threat Research Unit (TRU) said it observed the activity after January 9, with the attacks designed to deliver a malicious payload that serves as a remote access trojan…

    Read More CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT MalwareContinue

  • Blog

    More Than 40% of South Africans Were Scammed in 2025

    Survey underscores the reality that scammers follow “scalable opportunities and low friction,” rather than rich targets that tend to be better protected.

    Read More More Than 40% of South Africans Were Scammed in 2025Continue

  • Blog

    Dell RecoverPoint for Virtual Machines Zero Day Attack

    What is the Attack? The attack involves the threat cluster UNC6201 (a suspected China-nexus Advanced Persistent Threat (APT)) actively exploiting a critical zero-day vulnerability in Dell’s RecoverPoint for Virtual Machines platform. The flaw (CVE-2026-22769) stems from hard-coded credentials embedded within the appliance, allowing unauthenticated remote attackers to gain administrative access. Because RecoverPoint is a disaster…

    Read More Dell RecoverPoint for Virtual Machines Zero Day AttackContinue

  • Blog

    Scam Abuses Gemini Chatbots to Convince People to Buy Fake Crypto

    A convincing presale site for phony “Google Coin” features an AI assistant that engages victims with a slick sales pitch, funneling payment to attackers.

    Read More Scam Abuses Gemini Chatbots to Convince People to Buy Fake CryptoContinue

Page navigation

1 2 3 … 390 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us