Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

    The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China. While prior versions of the backdoor have primarily targeted Windows users only, the supply chain attack is assessed to…

    Read More ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and WindowsContinue

  • Blog

    Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

    A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild. The vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthenticated remote code execution affecting Weaver E-cology 10.0 versions prior to 20260312. The issue resides in the “/papi/esearch/data/devops/

    Read More Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug APIContinue

  • Blog

    Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries

    Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures and legitimate email services to direct users to attacker-controlled domains and steal authentication tokens. The multi-stage campaign, observed between April 14 and 16, 2026, targeted more than 35,000 users across over 13,000 organizations in 26…

    Read More Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 CountriesContinue

  • Blog

    RMM Tools Fuel Stealthy Phishing Campaign

    Attackers are abusing two remote monitoring and management (RMM) tools to evade detection in a campaign that has impacted over 80 organizations so far.

    Read More RMM Tools Fuel Stealthy Phishing CampaignContinue

  • Blog

    Exploit Cyber-Frenzy Threatens Millions via Critical cPanel Vulnerability

    Shortly after the authentication-bypass flaw was disclosed multiple proof-of-concept exploits appeared, and one researcher claims there’s been zero-day activity for at least a month.

    Read More Exploit Cyber-Frenzy Threatens Millions via Critical cPanel VulnerabilityContinue

  • Blog

    Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

    An active phishing campaign has been observed targeting multiple vectors since at least April 2025, with legitimate Remote Monitoring and Management (RMM) software as a way to establish persistent remote access to compromised hosts. The activity, codenamed VENOMOUS#HELPER, has impacted over 80 organizations, most of which are in the U.S., according to Securonix. It shares…

    Read More Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM ToolsContinue

  • Blog

    Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass

    Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an authentication bypass. MOVEit Automation (formerly Central) is a secure, server-based managed file transfer (MFT) solution used to schedule and automate file movement workflows in enterprise environments without requiring any custom scripts.  The

    Read More Progress Patches Critical MOVEit Automation Bug Enabling Authentication BypassContinue

  • Blog

    ⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More

    This week, the shadows moved faster than the patches. While most teams were still triaging last month’s alerts, attackers had already turned control panels into kill switches, kernels into open doors, and open-source pipelines into silent delivery systems. The game has shifted from breach to occupation. They’re living inside SaaS sessions, pushing code with trusted…

    Read More ⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & MoreContinue

  • Blog

    2026: The Year of AI-Assisted Attacks

    On December 4, 2025, a 17-year-old was arrested in Osaka under Japan’s Unauthorized Access Prohibition Act. The young man had run malicious code to extract the personal data of over 7 million users of Kaikatsu Club, Japan’s largest internet cafe chain. When asked, the young man shared his motivation for the hack: he wanted to…

    Read More 2026: The Year of AI-Assisted AttacksContinue

  • Blog

    Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

    The China-based cybercrime group known as Silver Fox has been linked to a new campaign targeting organizations in Russia and India with a new malware called ABCDoor. The activity involved using phishing emails that mimic correspondence from the Income Tax Department of India in December 2025, followed by a similar campaign aimed at Russian entities….

    Read More Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and RussiaContinue

Page navigation

1 2 3 … 456 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us