Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    US Soldier Intends to Admit Hacking 15 Telecom Carriers

    The federal government views the defendant as a flight risk and danger to the community due to his ability to access sensitive and private information.

    Read More US Soldier Intends to Admit Hacking 15 Telecom CarriersContinue

  • Blog

    Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone

    A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. “The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite,” the international…

    Read More Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android PhoneContinue

  • Blog

    Third-Party Risk Top Cybersecurity Claims

    Data collected by cyber-insurers show that ransomware accounts for the majority of insurance claims, but that much of the losses stem from third-party breaches affecting policyholders.

    Read More Third-Party Risk Top Cybersecurity ClaimsContinue

  • Blog

    Top 10 Most Probable Ways a Company Can Be Hacked

    How to win the battle with root cause analysis and a data-driven approach.

    Read More Top 10 Most Probable Ways a Company Can Be HackedContinue

  • Blog

    RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable

    Remote Desktop Protocol (RDP) is an amazing technology developed by Microsoft that lets you access and control another computer over a network. It’s like having your office computer with you wherever you go. For businesses, this means IT staff can manage systems remotely, and employees can work from home or anywhere, making RDP a true…

    Read More RDP: a Double-Edged Sword for IT Teams – Essential Yet ExploitableContinue

  • Blog

    5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs

    Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow’s content delivery network (CDN) to deliver the Lumma stealer malware. Netskope Threat Labs said it discovered 260 unique domains hosting 5,000 phishing PDF files that redirect victims to malicious websites. “The attacker uses SEO to…

    Read More 5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAsContinue

  • Blog

    Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme

    Microsoft on Thursday unmasked four of the individuals that it said were behind an Azure Abuse Enterprise scheme that involves leveraging unauthorized access to generative artificial intelligence (GenAI) services in order to produce offensive and harmful content. The campaign, called LLMjacking, has targeted various AI offerings, including Microsoft’s Azure OpenAI Service. The tech giant is

    Read More Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse SchemeContinue

  • Blog

    12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training

    A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication. The findings once again highlight how hard-coded credentials pose a severe security risk to users and organizations alike, not to mention compounding the problem when LLMs end up suggesting insecure coding practices…

    Read More 12,000+ API Keys and Passwords Found in Public Datasets Used for LLM TrainingContinue

  • Blog

    Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus

    The threat actor known as Sticky Werewolf has been linked to targeted attacks primarily in Russia and Belarus with the aim of delivering the Lumma Stealer malware by means of a previously undocumented implant. Cybersecurity company Kaspersky is tracking the activity under the name Angry Likho, which it said bears a “strong resemblance” to Awaken…

    Read More Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and BelarusContinue

  • Blog

    Targeted by Ransomware, Middle East Banks Shore Up Security

    As the UAE financial sector finished up its annual cyberattack exercise, its worries about ransomware compromises and geopolitical attacks are on the rise.

    Read More Targeted by Ransomware, Middle East Banks Shore Up SecurityContinue

Page navigation

Previous PagePrevious 1 … 185 186 187 188 189 … 226 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us