Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

    A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hack group as possibly affiliated with Russian intelligence services. The threat actor is assessed to have targeted defense, military, government, and energy organizations within the Ukrainian regional and

    Read More Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian OrgsContinue

  • Blog

    Microsoft Under Pressure to Bolster Defenses for BYOVD Attacks

    Threat actors are exploiting security gaps to weaponize Windows drivers and terminate security processes in targeted networks, and there may be no easy fixes in sight.

    Read More Microsoft Under Pressure to Bolster Defenses for BYOVD AttacksContinue

  • Blog

    Nation-State Hackers Put Defense Industrial Base Under Siege

    Espionage groups from China, Russia and other nations burned at least two dozen zero-days in edge devices in attempts to infiltrate defense contractors’ networks.

    Read More Nation-State Hackers Put Defense Industrial Base Under SiegeContinue

  • Blog

    AI Agents ‘Swarm,’ Security Complexity Follows Suit

    As AI deployments scale and start to include packs of agents autonomously working in concert, organizations face a naturally amplified attack surface.

    Read More AI Agents ‘Swarm,’ Security Complexity Follows SuitContinue

  • Blog

    Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

    Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to findings from Google Threat Intelligence Group (GTIG). The tech giant’s threat intelligence division said the adversarial targeting of the sector is centered around four key themes: striking…

    Read More Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber OperationsContinue

  • Blog

    UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

    A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors, according to findings from Cisco Talos. “This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of…

    Read More UAT-9921 Deploys VoidLink Malware to Target Technology and Financial SectorsContinue

  • Blog

    Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

    Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate two-factor authentication (2FA) codes.

    Read More Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing HistoryContinue

  • Blog

    npm’s Update to Harden Their Supply Chain, and Points to Consider

    In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the changes don’t make npm projects immune from supply-chain attacks. npm is still susceptible to malware attacks – here’s what you need to know for a safer…

    Read More npm’s Update to Harden Their Supply Chain, and Points to ConsiderContinue

  • Blog

    Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

    Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products, according to watchTowr. “Overnight we observed first in-the-wild exploitation of BeyondTrust across our global sensors,” Ryan Dewhurst, head of threat intelligence at watchTowr, said in a post on X. “Attackers are abusing

    Read More Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 VulnerabilityContinue

  • Blog

    Ivanti EPMM Zero-Day Bugs Spark Exploit Frenzy — Again

    It’s time to phase out the “patch and pray” approach, eliminate needless public interfaces, and enforce authentication controls, one expert says.

    Read More Ivanti EPMM Zero-Day Bugs Spark Exploit Frenzy — AgainContinue

Page navigation

1 2 3 … 385 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us