Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

    The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of renewed activity from an organized criminal group it tracks as UAC-0173 that involves infecting computers with a remote access trojan named DCRat (aka DarkCrystal RAT). The Ukrainian cybersecurity authority said it observed the latest attack wave starting in mid-January 2025. The activity is…

    Read More CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian NotariesContinue

  • Blog

    Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads

    Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI) repository that facilitates unauthorized music downloads from music streaming service Deezer. The package in question is automslc, which has been downloaded over 104,000 times to date. First published in May 2019, it remains available on PyPI as of writing. “Although automslc,…

    Read More Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music DownloadsContinue

  • Blog

    CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two security flaws impacting Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are as follows – CVE-2024-49035 (CVSS score: 8.7) – An improper access control

    Read More CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active ExploitationContinue

  • Blog

    How to Rein in Identity Session Security Risk With CAEP

    Addressing the complexities of session management in multi-IDP environments, CAEP offers a pathway to real-time security, proactive risk mitigation, and enhanced user trust.

    Read More How to Rein in Identity Session Security Risk With CAEPContinue

  • Blog

    AI Tricksters Spin Up Fake DeepSeek Sites to Steal Crypto

    The fake websites trick users into downloading and running malware that searches for personal information, especially anything related to crypto currency.

    Read More AI Tricksters Spin Up Fake DeepSeek Sites to Steal CryptoContinue

  • Blog

    Microsoft 365 Accounts Get Sprayed by Mega-Botnet

    The threat actors are exploiting non-interactive sign-ins, an authentication feature that security teams don’t typically monitor.

    Read More Microsoft 365 Accounts Get Sprayed by Mega-BotnetContinue

  • Blog

    Max Severity RCE Vuln in All Versions of MITRE Caldera

    In the wrong hands, the popular red-teaming tool can be made to access networks, escalate privileges, conduct reconnaissance, and disguise malicious activity as a simulated exercise.

    Read More Max Severity RCE Vuln in All Versions of MITRE CalderaContinue

  • Blog

    LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile

    Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram. LightSpy is the name given to a modular spyware that’s capable of infecting both Windows and Apple systems with an aim to…

    Read More LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and MobileContinue

  • Blog

    Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

    Opposition activists in Belarus as well as Ukrainian military and government organizations are the target of a new campaign that employs malware-laced Microsoft Excel documents as lures to deliver a new variant of PicassoLoader.  The threat cluster has been assessed to be an extension of a long-running campaign mounted by a Belarus-aligned threat actor dubbed…

    Read More Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy MalwareContinue

  • Blog

    Unmanaged Devices: The Overlooked Threat CISOs Must Confront

    No matter the strategy, companies must approach securing unmanaged devices with sensitivity and respect for employee privacy.

    Read More Unmanaged Devices: The Overlooked Threat CISOs Must ConfrontContinue

Page navigation

Previous PagePrevious 1 … 189 190 191 192 193 … 225 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us