Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

    The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024. The activity, detailed by Japanese cybersecurity company LAC, overlaps with a threat cluster tracked by Trend Micro as Earth Freybug, which has been assessed to…

    Read More Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage CampaignContinue

  • Blog

    Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

    The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024. The activity, detailed by Japanese cybersecurity company LAC, overlaps with a threat cluster tracked by Trend Micro as Earth Freybug, which has been assessed to…

    Read More Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage CampaignContinue

  • Blog

    New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

    Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunction printers (MFPs) that could allow attackers to capture authentication credentials via pass-back attacks via Lightweight Directory Access Protocol (LDAP) and SMB/FTP services. “This pass-back style attack leverages a vulnerability that allows a malicious actor to alter the MFP’s configuration and cause the MFP

    Read More New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory CredentialsContinue

  • Blog

    Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers

    Cybersecurity researchers have flagged a credit card stealing malware campaign that has been observed targeting e-commerce sites running Magento by disguising the malicious content within image tags in HTML code in order to stay under the radar. MageCart is the name given to a malware that’s capable of stealing sensitive payment information from online shopping…

    Read More Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment SkimmersContinue

  • Blog

    Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers

    Cybersecurity researchers have flagged a credit card stealing malware campaign that has been observed targeting e-commerce sites running Magento by disguising the malicious content within image tags in HTML code in order to stay under the radar. MageCart is the name given to a malware that’s capable of stealing sensitive payment information from online shopping…

    Read More Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment SkimmersContinue

  • Blog

    Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics

    Microsoft said it has discovered a new variant of a known Apple macOS malware called XCSSET as part of limited attacks in the wild. “Its first known variant since 2022, this latest XCSSET malware features enhanced obfuscation methods, updated persistence mechanisms, and new infection strategies,” the Microsoft Threat Intelligence team said in a post shared…

    Read More Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation TacticsContinue

  • Blog

    South Korea Suspends DeepSeek AI Downloads Over Privacy Violations

    South Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the country until the service makes changes to its mobile apps to comply with data protection regulations. Downloads have been paused as of February 15, 2025, 6:00 p.m. local time, the Personal Information Protection Commission (PIPC) said in a statement….

    Read More South Korea Suspends DeepSeek AI Downloads Over Privacy ViolationsContinue

  • Blog

    CISO’s Expert Guide To CTEM And Why It Matters

    Cyber threats evolve—has your defense strategy kept up? A new free guide available here explains why Continuous Threat Exposure Management (CTEM) is the smart approach for proactive cybersecurity. This concise report makes a clear business case for why CTEM’s comprehensive approach is the best overall strategy for shoring up a business’s cyber defenses in the…

    Read More CISO’s Expert Guide To CTEM And Why It MattersContinue

  • Blog

    ⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More

    Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything from device code phishing to cloud exploits, breaking down the technical details into simple, easy-to-follow insights. ⚡ Threat of the Week Russian Threat Actors Leverage…

    Read More ⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and MoreContinue

  • Blog

    New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

    Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications. Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin. “The malware is compiled in Golang and once executed it acts like a backdoor,” security researcher Leandro Fróes…

    Read More New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 OperationsContinue

Page navigation

Previous PagePrevious 1 … 198 199 200 201 202 … 225 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us