Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

    Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a “significant escalation” in how it propagates through the Open VSX registry. “Instead of requiring every malicious listing to embed the loader directly, the threat actor is now abusing extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive

    Read More GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target DevelopersContinue

  • Blog

    Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos

    The excitement around Cisco’s latest SD-WAN bugs has inspired some light fraud, misunderstandings, and overlooked risks.

    Read More Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN ChaosContinue

  • Blog

    The Data Gap: Why Nonprofit Cyber Incidents Go Underreported

    Threat actors target nonprofits due to security gaps and highly coveted information, but a lack of sufficient data makes it difficult to grasp the entire picture.

    Read More The Data Gap: Why Nonprofit Cyber Incidents Go UnderreportedContinue

  • Blog

    Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

    A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020. Palo Alto Networks Unit 42 is tracking the threat activity under the moniker CL-STA-1087, where CL refers to cluster, and STA stands for state-backed motivation. “The activity demonstrated strategic operational…

    Read More Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun MalwareContinue

  • Blog

    Cyberattackers Don’t Care About Good Causes

    Sightline Security’s founder and advisory board discuss how cybersecurity poses significant problems for nonprofits and suggest ways the industry can help.

    Read More Cyberattackers Don’t Care About Good CausesContinue

  • Blog

    Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026

    Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for chats on Instagram after May 8, 2026. “If you have chats that are impacted by this change, you will see instructions on how you can download any media or messages you may want to keep,” the social media giant said in a help…

    Read More Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026Continue

  • Blog

    Will AI Save Consumers From Smartphone-Based Phishing Attacks?

    Sophisticated phishing attacks are bypassing on-device protections with troubling frequency, making it more critical than ever for users to protect themselves from potential threats, new research from Omdia shows.

    Read More Will AI Save Consumers From Smartphone-Based Phishing Attacks?Continue

  • Blog

    INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime

    INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in connection with phishing, malware, and ransomware campaigns, as part of the agency’s ongoing efforts to dismantle criminal networks, disrupt emerging threats, and safeguard victims from scams. The effort is part of an international law enforcement operation that involved 72 countries…

    Read More INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global CybercrimeContinue

  • Blog

    Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

    Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through search engine optimization (SEO) poisoning techniques. “The campaign redirects users searching for legitimate enterprise software to malicious ZIP files on attacker-controlled websites to deploy digitally signed trojans that masquerade as trusted VPN clients

    Read More Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal CredentialsContinue

  • Blog

    Investigating a New Click-Fix Variant

    Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of defense capabilities. It is based on independent research and observations of the current threat landscape available at the time of publication. The content is intended for informational and preparedness purposes only. Read more blogs around…

    Read More Investigating a New Click-Fix VariantContinue

Page navigation

1 2 3 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us