Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

    Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. “Instead of relying on traditional servers or domains for command-and-control, Aeternum stores its instructions on the public Polygon blockchain,” Qrator Labs said in a report shared with The

    Read More Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade TakedownContinue

  • Blog

    UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

    A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025. The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor. “Dohdoor utilizes…

    Read More UAT-10027 Targets U.S. Education and Healthcare with Dohdoor BackdoorContinue

  • Blog

    ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories

    Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update. Behind the scenes, the tactics are sharper. Access happens faster. Control is established sooner. Cleanup becomes harder. Here is a quick look at the signals worth…

    Read More ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ StoriesContinue

  • Blog

    Expert Recommends: Prepare for PQC Right Now

    Introduction: Steal It Today, Break It in a Decade Digital evolution is unstoppable, and though the pace may vary, things tend to fall into place sooner rather than later. That, of course, applies to adversaries as well. The rise of ransomware and cyber extortion generated funding for a complex and highly professional criminal ecosystem. The…

    Read More Expert Recommends: Prepare for PQC Right NowContinue

  • Blog

    Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware

    A “coordinated developer-targeting campaign” is using malicious repositories disguised as legitimate Next.js projects and technical assessments to trick victims into executing them and establish persistent access to compromised machines. “The activity aligns with a broader cluster of threats that use job-themed lures to blend into routine developer workflows and increase the likelihood of code

    Read More Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory MalwareContinue

  • Blog

    Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens

    Cybersecurity researchers have disclosed details of a new malicious package discovered on the NuGet Gallery, impersonating a library from financial services firm Stripe in an attempt to target the financial sector. The package, codenamed StripeApi.Net, attempts to masquerade as Stripe.net, a legitimate library from Stripe that has over 75 million downloads. It was uploaded by…

    Read More Malicious StripeApi NuGet Package Mimicked Official Library and Stole API TokensContinue

  • Blog

    Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

    A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as part of malicious activity that dates back to 2023. The vulnerability, tracked as CVE-2026-20127 (CVSS score: 10.0), allows an unauthenticated remote attacker to bypass authentication and obtain

    Read More Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin AccessContinue

  • Blog

    Chinese Police Use ChatGPT to Smear Japan PM Takaichi

    A Chinese keyboard warrior inadvertently leaked information about politically motivated influence operations through a ChatGPT account.

    Read More Chinese Police Use ChatGPT to Smear Japan PM TakaichiContinue

  • Blog

    Flaws in Claude Code Put Developers’ Machines at Risk

    The vulnerabilities highlight a big drawback to integrating AI into software development workflows and the potential impact on supply chains.

    Read More Flaws in Claude Code Put Developers’ Machines at RiskContinue

  • Blog

    RAMP Forum Seizure Fractures Ransomware Ecosystem

    Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.

    Read More RAMP Forum Seizure Fractures Ransomware EcosystemContinue

Page navigation

1 2 3 … 396 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us