Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

    Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, enabling information operations, and even conducting model extraction…

    Read More Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack SupportContinue

  • Blog

    Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

    Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group. The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It’s assessed to be active…

    Read More Lazarus Campaign Plants Malicious Packages in npm and PyPI EcosystemsContinue

  • Blog

    ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

    Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead of flashy new exploits, many operations are built around quiet misuse of trusted tools, familiar workflows, and overlooked exposures that sit in plain sight. Another shift is how access is gained versus how it’s used. Initial entry…

    Read More ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ StoriesContinue

  • Blog

    The CTEM Divide: Why 84% of Security Programs Are Falling Behind

    A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between organizations – one that has nothing to do with budget size or industry and everything to do with a single framework decision. Organizations implementing Continuous Threat Exposure Management (CTEM) demonstrate 50% better attack surface visibility, 23-point

    Read More The CTEM Divide: Why 84% of Security Programs Are Falling BehindContinue

  • Blog

    Senegalese Data Breaches Expose Lack of ‘Security Maturity’

    Green Blood Group steals personal records and biometric data of the West African nation’s nearly 20 million residents.

    Read More Senegalese Data Breaches Expose Lack of ‘Security Maturity’Continue

  • Blog

    83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

    A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on bulletproof hosting infrastructure offered by PROSPERO. Threat intelligence firm GreyNoise said it recorded 417 exploitation sessions from 8 unique source IP addresses between February 1 and…

    Read More 83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting InfrastructureContinue

  • Blog

    Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

    Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that it said has been exploited in sophisticated cyber attacks. The vulnerability, tracked as CVE-2026-20700 (CVSS score: N/A), has been described as a memory corruption issue in dyld, Apple’s Dynamic Link Editor. Successful exploitation of the vulnerability…

    Read More Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple DevicesContinue

  • Blog

    North Korea’s UNC1069 Hammers Crypto Firms With AI

    In moving away from traditional banks to focus on Web3 companies, the threat actor is leveraging LLMs, deepfakes, legitimate platforms, and ClickFix.

    Read More North Korea’s UNC1069 Hammers Crypto Firms With AIContinue

  • Blog

    How to Stay on Top of Future Threats With a Cutting-Edge SOC

    CISOs should focus on harnessing and securing AI and building new skills among their people. Vision and change management can transform security.

    Read More How to Stay on Top of Future Threats With a Cutting-Edge SOCContinue

  • Blog

    Automaker Secures the Supply Chain With Developer-Friendly Platform

    How a platform engineering team embeds supply chain security into infrastructure without slowing developers.

    Read More Automaker Secures the Supply Chain With Developer-Friendly PlatformContinue

Page navigation

1 2 3 … 384 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us