Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

    The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they’re impersonating, marking a new escalation of the fraudulent scheme. “These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent

    Read More DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate CompaniesContinue

  • Blog

    OT Attacks Get Scary With ‘Living-off-the-Plant’ Techniques

    Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won’t be that way forever.

    Read More OT Attacks Get Scary With ‘Living-off-the-Plant’ TechniquesContinue

  • Blog

    Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

    Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself. BYOVD refers to an adversarial technique that abuses legitimate but flawed driver software to escalate privileges and disable Endpoint Detection

    Read More Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security ToolsContinue

  • Blog

    From Ransomware to Residency: Inside the Rise of the Digital Parasite

    Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around them? According to Picus Labs’ new Red Report 2026, which analyzed over 1.1 million malicious files and mapped 15.5 million adversarial actions observed across 2025,…

    Read More From Ransomware to Residency: Inside the Rise of the Digital ParasiteContinue

  • Blog

    ZAST.AI Raises $6M Pre-A to Scale “Zero False Positive” AI-Powered Code Security

    January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, bringing ZAST.AI’s total funding close to $10 million. This marks a recognition from leading capital markets of a new solution: ending the era of high false positive rates…

    Read More ZAST.AI Raises $6M Pre-A to Scale “Zero False Positive” AI-Powered Code SecurityContinue

  • Blog

    Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

    SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance. The incident took place on January 29, 2026, when a mail server that was not updated to the latest version was compromised, the company’s Chief Commercial Officer, Derek Curtis, said. “Prior to the breach, we…

    Read More Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail ServerContinue

  • Blog

    Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data

    The Netherlands’ Dutch Data Protection Authority (AP) and the Council for the Judiciary confirmed both agencies (Rvdr) have disclosed that their systems were impacted by cyber attacks that exploited the recently disclosed security flaws in Ivanti Endpoint Manager Mobile (EPMM), according to a notice sent to the country’s parliament on Friday. “On January 29, the…

    Read More Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact DataContinue

  • Blog

    Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

    Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0. “An improper neutralization of special elements used in an SQL Command (‘SQL Injection’) vulnerability…

    Read More Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code ExecutionContinue

  • Blog

    From Security Operations to Security Leadership: Sophos CISO Advantage

    Categories: Products & Services, Security Operations

    Read More From Security Operations to Security Leadership: Sophos CISO AdvantageContinue

  • Blog

    Threat Intelligence Executive Report – Volume 2025, Number 6

    This issue of the Counter Threat Unit’s high-level bimonthly report discusses noteworthy updates in the threat landscape during September and October Categories: Threat Research Tags: EDR killer, infostealer, Ransomware

    Read More Threat Intelligence Executive Report – Volume 2025, Number 6Continue

Page navigation

1 2 3 … 382 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us