Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware

    The Belarus-aligned threat actor known as Ghostwriter (aka UAC-0057 and UNC1151Ukraine’s National Security and Defense Council) has been observed using lures related to Prometheus, a Ukrainian online learning platform, to target government organizations in the country. The activity, per the Computer Emergency Response Team of Ukraine (CERT-UA), involves sending phishing emails to government

    Read More Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing MalwareContinue

  • Blog

    Akamai Joins Growing Chorus of Vendors Betting Big on Secure Enterprise Browsers

    When Akamai announced its LayerX acquisition, the company joined a growing list of vendors adding secure enterprise browsers to their product portfolios.

    Read More Akamai Joins Growing Chorus of Vendors Betting Big on Secure Enterprise BrowsersContinue

  • Blog

    Verizon DBIR: Healthcare Fends Off Increased Social Engineering Attacks

    Ransomware and vendor breaches persist, but the 2026 Data Breach Investigations Report (DBIR) highlights how evolving social engineering tactics make the sector more vulnerable.

    Read More Verizon DBIR: Healthcare Fends Off Increased Social Engineering AttacksContinue

  • Blog

    Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows

    Cybersecurity researchers have disclosed details of a new automated campaign called Megalodon that has pushed 5,718 malicious commits to 5,561 GitHub repositories within a six-hour window. “Using throwaway accounts and forged author identities (build-bot, auto-ci, ci-bot, pipeline-bot), the attacker injected GitHub Actions workflows containing base64-encoded bash payloads that exfiltrate CI

    Read More Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD WorkflowsContinue

  • Blog

    Making Vulnerable Drivers Exploitable Without Hardware – The BYOVD Perspective

    1 Introduction This article provides a technical analysis of how many Windows kernel mode drivers can be interacted with from user mode without the hardware they were developed for. This work was motivated by driver-oriented vulnerability research and the need to evaluate the exploitability of individual findings, which frequently affect code whose reachability is hardware-gated….

    Read More Making Vulnerable Drivers Exploitable Without Hardware – The BYOVD PerspectiveContinue

  • Blog

    Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks

    The U.S. Department of Justice (DoJ) on Thursday announced the arrest of a Canadian man in connection with allegedly operating a distributed denial-of-service (DDoS) botnet known as Kimwolf. In tandem, Jacob Butler (aka Dort), 23, Ottawa, Canada, has been charged with offenses related to the development and operation of the botnet. Kimwolf is assessed to…

    Read More Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire AttacksContinue

  • Blog

    China’s Webworm Uses Discord, Microsoft Graphs to Hack EU Govts.

    The advanced persistent threat group also relied on SOCKS proxies like SoftEther VPN, tunneling tools that act as a middleman between victim and attacker.

    Read More China’s Webworm Uses Discord, Microsoft Graphs to Hack EU Govts.Continue

  • Blog

    CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Langflow and Trend Micro Apex One to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below – CVE-2025-34291 (CVSS score: 9.4) – An origin validation error vulnerability in Langflow that could

    Read More CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEVContinue

  • Blog

    Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access

    Cisco has rolled out updates for a maximum-severity security flaw impacting Secure Workload that could allow an unauthenticated, remote attacker to access sensitive data. Tracked as CVE-2026-20223 (CVSS score: 10.0), the vulnerability arises from insufficient validation and authentication when accessing REST API endpoints. “An attacker could exploit this vulnerability if they are able to send

    Read More Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data AccessContinue

  • Blog

    How CISOs Should Prep for Agentic-Ready AI BOMs

    Finding ways to document both component and execution attributes for AI bill of materials (AI BOM).

    Read More How CISOs Should Prep for Agentic-Ready AI BOMsContinue

Page navigation

1 2 3 … 473 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us