Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

    The alleged administrator of the LeakBase cybercrime forum has been arrested by Russian law enforcement authorities, state media reported Thursday. According to TASS and MVD Media, a news website linked to the Russian Interior Ministry, the suspect is a resident of the city of Taganrog. The suspect is said to have been detained for creating…

    Read More LeakBase Admin Arrested in Russia Over Massive Stolen Credential MarketplaceContinue

  • Blog

    Blame Game: Why Public Cyber Attribution Carries Risks

    Publicly accusing an entity of a cyberattack could have negative consequences that organizations should consider before taking the plunge.

    Read More Blame Game: Why Public Cyber Attribution Carries RisksContinue

  • Blog

    Phishers Pose as Palo Alto Networks’ Recruiters for Months in Job Scam

    A series of campaigns that began in August aim to defraud job candidates, using psychological tactics and data scraped from LinkedIn profiles.

    Read More Phishers Pose as Palo Alto Networks’ Recruiters for Months in Job ScamContinue

  • Blog

    SANS: Top 5 Most Dangerous New Attack Techniques to Watch

    For the first time, SANS Institute’s five top attack techniques all have one thing in common – AI.

    Read More SANS: Top 5 Most Dangerous New Attack Techniques to WatchContinue

  • Blog

    GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

    Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that delivers a multi-stage framework capable of comprehensive data theft and installing a remote access trojan (RAT), which deploys an information-stealing Google Chrome extension masquerading as an offline version of Google Docs. “It logs keystrokes, dumps cookies and session tokens, captures screenshots, and

    Read More GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto DataContinue

  • Blog

    Why a ‘Near Miss’ Database Is Key to Improving Information Sharing

    Organizations disclose attack details, though information may be limited, following a breach, but what if they did the same with close calls?

    Read More Why a ‘Near Miss’ Database Is Key to Improving Information SharingContinue

  • Blog

    AI-Native Security Is a Must to Counter AI-Based Attacks

    Attacks by artificial intelligence agents are a reality. Experts at Nvidia’s GTC conference say defenders need to use the same tools to fight them off.

    Read More AI-Native Security Is a Must to Counter AI-Based AttacksContinue

  • Blog

    The Kill Chain Is Obsolete When Your AI Agent Is the Threat

    In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90% of tactical operations on its own, performing reconnaissance, writing exploit code, and attempting lateral movement at machine speed. This incident is worrying, but there’s a…

    Read More The Kill Chain Is Obsolete When Your AI Agent Is the ThreatContinue

  • Blog

    Ex-NSA Directors Discuss ‘Red Line’ for Offensive Cyberattacks

    Four former NSA chiefs representing a near-complete history of US Cyber Command debated and discussed the role of offensive cyber in the government.

    Read More Ex-NSA Directors Discuss ‘Red Line’ for Offensive CyberattacksContinue

  • Blog

    Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

    The U.S. Department of Justice (DoJ) said a Russian national has been sentenced to two years in prison for managing a botnet that was used to launch ransomware attacks against U.S. companies. Ilya Angelov, 40, of Tolyatti, Russia, was also fined $100,000. Angelov, who went by the online aliases “milan” and “okart,” is said to…

    Read More Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware AttacksContinue

Page navigation

1 2 3 … 421 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us