Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    AI in the SOC: What Could Go Wrong?

    Two cybersecurity leaders tested out AI in their respective SOCs for six months — and here’s what they learned.

    Read More AI in the SOC: What Could Go Wrong?Continue

  • Blog

    Trivy Supply Chain Attack Targets CI/CD Secrets

    A threat actor used the open source security tool to deploy an infostealer into CI/CD workflows and steal cloud credentials, SSH keys, tokens, and other sensitive secrets.

    Read More Trivy Supply Chain Attack Targets CI/CD SecretsContinue

  • Blog

    CISOs Debate Human Role in AI-Powered Security

    The idea of a “human in the loop” in AI deployment was challenged during a security executive panel at the RSAC 2026 Conference this week.

    Read More CISOs Debate Human Role in AI-Powered SecurityContinue

  • Blog

    North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

    The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that’s distributed via malicious Microsoft Visual Studio Code (VS Code) projects. The use of VS Code “tasks.json” to distribute malware is a relatively new tactic adopted by the threat actor since…

    Read More North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle MalwareContinue

  • Blog

    Attackers Hide Infostealer in Copyright Infringement Notices

    A phishing campaign targeting healthcare, government, hospitality, and education sectors in various countries uses several evasion techniques to avoid detection.

    Read More Attackers Hide Infostealer in Copyright Infringement NoticesContinue

  • Blog

    ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More

    Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many still ignore basic advisories. This edition covers a mix of issues: supply chain attacks hitting CI/CD setups, long-abused IoT devices being shut down, and exploits moving quickly from disclosure to real…

    Read More ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & MoreContinue

  • Blog

    We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them

    AWS Bedrock is Amazon’s platform for building AI-powered applications. It gives developers access to foundation models and the tools to connect those models directly to enterprise data and systems. That connectivity is what makes it powerful – but it’s also what makes Bedrock a target. When an AI agent can query your Salesforce instance, trigger…

    Read More We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with ThemContinue

  • Blog

    Secure Your Spot at RSAC 2026 Conference

    Post Content

    Read More Secure Your Spot at RSAC 2026 ConferenceContinue

  • Blog

    Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

    Microsoft has warned of fresh campaigns that are capitalizing on the upcoming tax season in the U.S. to harvest credentials and deliver malware. The email campaigns take advantage of the urgency and time-sensitive nature of emails to send phishing messages masquerading as refund notices, payroll forms, filing reminders, and requests from tax professionals to deceive…

    Read More Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM MalwareContinue

  • Blog

    Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

    Cybersecurity researchers have uncovered malicious artifacts distributed via Docker Hub following the Trivy supply chain attack, highlighting the widening blast radius across developer environments. The last known clean release of Trivy on Docker Hub is 0.69.3. The malicious versions 0.69.4, 0.69.5, and 0.69.6 have since been removed from the container image library. “New image tags…

    Read More Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes WiperContinue

Page navigation

1 2 3 … 418 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us