Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign

    Telecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969 to facilitate remote control over compromised networks. Palo Alto Networks Unit 42 said it observed multiple incidents in the region, including one aimed at critical telecommunications infrastructure between February and November 2024. The attacks are characterized by the

    Read More CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage CampaignContinue

  • Blog

    New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft

    Cybersecurity researchers have flagged a previously undocumented Linux backdoor dubbed Plague that has managed to evade detection for a year. “The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system authentication and gain persistent SSH access,” Nextron Systems researcher Pierre-Henri Pezier said. Pluggable Authentication Modules

    Read More New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential TheftContinue

  • Blog

    Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices

    SonicWall SSL VPN devices have become the target of Akira ransomware attacks as part of a newfound surge in activity observed in late July 2025. “In the intrusions reviewed, multiple pre-ransomware intrusions were observed within a short period of time, each involving VPN access through SonicWall SSL VPNs,” Arctic Wolf Labs researcher Julian Tuin said…

    Read More Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched DevicesContinue

  • Blog

    What is the Role of Provable Randomness in Cybersecurity?

    Random numbers are the cornerstone of cryptographic security — cryptography depends on generating random keys. As organizations adopt quantum-resistant algorithms, it’s equally important to examine the randomness underpinning them

    Read More What is the Role of Provable Randomness in Cybersecurity?Continue

  • Blog

    Dark Reading News Desk Turns 10, Back at Black Hat USA for 2025

    Dark Reading’s 2025 News Desk marks a decade of Black Hat USA memories. We’re making our return with a slate of interviews that help you stay up on the latest research from Black Hat — no trip to Las Vegas required.

    Read More Dark Reading News Desk Turns 10, Back at Black Hat USA for 2025Continue

  • Blog

    Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection

    Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could result in remote code execution. The vulnerability, tracked as CVE-2025-54135 (CVSS score: 8.6), has been addressed in version 1.3 released on July 29, 2025. It has been codenamed CurXecute by Aim Labs, which previously disclosed EchoLeak.

    Read More Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt InjectionContinue

  • Blog

    LLMs’ AI-Generated Code Remains Wildly Insecure

    Security debt ahoy: Only about half of the code that the latest large language models (LLMs) create is cybersecure, and more and more of it is being created all the time.

    Read More LLMs’ AI-Generated Code Remains Wildly InsecureContinue

  • Blog

    Building the Perfect Post-Security Incident Review Playbook

    By creating a safe environment for open discussion, prioritizing human context alongside technical data, and involving diverse stakeholders, organizations can turn security incidents into accelerators of resilience.

    Read More Building the Perfect Post-Security Incident Review PlaybookContinue

  • Blog

    Male-Dominated Cyber Industry Still Holds Space for Women With Resilience

    When trying to crack your way into a cyber career, true passion and a bold love of the industry is a must, if you want to set yourself apart from hundreds of other job applicants, according to Weave CISO Jessica Sica.

    Read More Male-Dominated Cyber Industry Still Holds Space for Women With ResilienceContinue

  • Blog

    Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

    Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake Microsoft OAuth applications to facilitate credential harvesting as part of account takeover attacks. “The fake Microsoft 365 applications impersonate various companies, including RingCentral, SharePoint, Adobe, and Docusign,” Proofpoint said in a Thursday report. The

    Read More Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 AccountsContinue

Page navigation

Previous PagePrevious 1 … 16 17 18 19 20 … 224 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us