Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

    A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and SSH persistence. The activity has been attributed to the GitHub account “BufferZoneCorp,” which has published a set of repositories that are associated with malicious Ruby gems…

    Read More Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential TheftContinue

  • Blog

    TeamPCP Hits SAP Packages With ‘Mini Shai-Hulud’ Attack

    Several npm packages for SAP’s cloud application development ecosystem have been compromised as TeamPCP’s supply chain attacks broaden.

    Read More TeamPCP Hits SAP Packages With ‘Mini Shai-Hulud’ AttackContinue

  • Blog

    Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug

    The proof-of-concept exploit code runs only 10 lines long, but luckily, a patch is already available.

    Read More Another AI-Assisted Software Scan Yields 9-Year-Old Linux BugContinue

  • Blog

    Anthropic’s Mythos Has Landed: Here’s What Comes Next for Cyber

    In this latest installment of the Reporters’ Notebook video series, we discuss how the new AI model threatens to completely upend cybersecurity, and what industry leaders are telling the press.

    Read More Anthropic’s Mythos Has Landed: Here’s What Comes Next for CyberContinue

  • Blog

    PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

    In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. According to Aikido Security, Socket, and StepSecurity, the two malicious versions are versions 2.6.2 and 2.6.3, both of which were published on April 30, 2026. The campaign is…

    Read More PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal CredentialsContinue

  • Blog

    ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

    The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools that peek into their private files during a simple install. It is definitely a busy time to be online. Security is always a moving target….

    Read More ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More StoriesContinue

  • Blog

    Oracle Red Bull Racing Team Revs Up Automation to Boost Security

    While drivers race to shave off seconds on the track, the team’s IT and engineering staff are speeding up how they deliver security.

    Read More Oracle Red Bull Racing Team Revs Up Automation to Boost SecurityContinue

  • Blog

    New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

    Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive information from compromised hosts. “The intrusion chain begins with execution of a batch script (‘install_obf.bat’) that disables Windows security controls, dynamically extracts an

    Read More New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud CredentialsContinue

  • Blog

    EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

    Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional accounts of enterprise administrators, DevOps engineers, and security analysts by impersonating administrative utilities they rely on for daily operations. By integrating Search Engine Order (SEO)

    Read More EtherRAT Distribution Spoofing Administrative Tools via GitHub FacadesContinue

  • Blog

    New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions

    Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fail by Xint.io and Theori. “An unprivileged local user can write four controlled bytes into the page cache of…

    Read More New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major DistributionsContinue

Page navigation

1 2 3 … 453 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us