Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

    Unknown threat actors compromised CPUID (“cpuid[.]com”), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a remote access trojan called STX RAT. The incident lasted from approximately April 9, 15:00 UTC, to about April 10, 10:00 UTC, with

    Read More CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor DownloadsContinue

  • Blog

    Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

    Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful exploitation of the flaw could allow an attacker to run malicious code on affected installations. It has been described…

    Read More Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621Continue

  • Blog

    Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

    Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc. The tool was developed by Israeli company Cobwebs Technologies and is now sold by its successor Penlink after the two firms merged in July 2023

    Read More Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad DataContinue

  • Blog

    Medusa Ransomware Attack

    What is the Attack? Microsoft Threat Intelligence has identified Storm-1175, a financially motivated threat actor conducting high-tempo ransomware operations leveraging the Medusa ransomware variant. The group specializes in rapidly exploiting vulnerable web-facing systems, often weaponizing newly disclosed vulnerabilities (N-days) and even zero-days before public disclosure. Storm-1175 | Medusa ransomware operations | Microsoft Security Blog A…

    Read More Medusa Ransomware AttackContinue

  • Blog

    Hims Breach Exposes the Most Sensitive Kinds of PHI

    Threat actors breached the telehealth brand, and now they may know who’s bald, overweight, and impotent. What could they do with that information?

    Read More Hims Breach Exposes the Most Sensitive Kinds of PHIContinue

  • Blog

    Your Next Breach Will Look Like Business as Usual

    These are the fundamental detection model shifts cybersecurity teams need to make to keep up with the rising number of credential-based attacks.

    Read More Your Next Breach Will Look Like Business as UsualContinue

  • Blog

    FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threats

    Post Content

    Read More FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud ThreatsContinue

  • Blog

    Orange Business Reimagines Enterprise Voice Communications With Trust and AI

    Post Content

    Read More Orange Business Reimagines Enterprise Voice Communications With Trust and AIContinue

  • Blog

    Industrial Controllers Still Vulnerable As Conflicts Move to Cyber

    The US government warns programmable logic controllers are being targeted, and research turns up 179 vulnerable operational technology (OT) devices.

    Read More Industrial Controllers Still Vulnerable As Conflicts Move to CyberContinue

  • Blog

    GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

    Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that’s designed to stealthily infect all integrated development environments (IDEs) on a developer’s machine. The technique has been discovered in an Open VSX extension named “specstudio.code-wakatime-activity-tracker,” which masquerades as WakaTime, a

    Read More GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEsContinue

Page navigation

1 2 3 … 437 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us