Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

    Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress. Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority….

    Read More Android’s New Feature Blocks Fraudsters from Sideloading Apps During CallsContinue

  • Blog

    New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

    Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code execution within the Amazon Web Services (AWS) account. “If executed at scale, this attack could be used to gain access to thousands of accounts,” Datadog…

    Read More New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code ExecutionContinue

  • Blog

    This Security Firm’s ‘Bias’ Is Also Its Superpower

    Credible Security’s founders bring their varied experiences to help growing companies turn trust into a strategic advantage.

    Read More This Security Firm’s ‘Bias’ Is Also Its SuperpowerContinue

  • Blog

    Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

    The North Korean threat actor known as the Lazarus Group has been linked to a previously undocumented JavaScript implant named Marstech1 as part of limited targeted attacks against developers. The active operation has been dubbed Marstech Mayhem by SecurityScorecard, with the malware delivered by means of an open-source repository hosted on GitHub that’s associated with…

    Read More Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer AttacksContinue

  • Blog

    Open Source AI Models: Perfect Storm for Malicious Code, Vulnerabilities

    Companies pursing internal AI development using models from Hugging Face and other open source repositories need to focus on supply chain security and checking for vulnerabilities.

    Read More Open Source AI Models: Perfect Storm for Malicious Code, VulnerabilitiesContinue

  • Blog

    How Banks Can Adapt to the Rising Threat of Financial Crime

    Banking fraud and financial crimes are growing more sophisticated every day. By understanding the threats and building strong collaborations, banks can protect themselves and their clients.

    Read More How Banks Can Adapt to the Rising Threat of Financial CrimeContinue

  • Blog

    Salt Typhoon Exploits Cisco Devices in Telco Infrastructure

    The China-sponsored state espionage group has exploited known, older bugs in Cisco gear for successful cyber intrusions on six continents in the past two months.

    Read More Salt Typhoon Exploits Cisco Devices in Telco InfrastructureContinue

  • Blog

    Warning: Tunnel of Love Leads to Scams

    Romance-baiting losses were up 40% last year, as more and more pig-butchering efforts crop up in the wild.

    Read More Warning: Tunnel of Love Leads to ScamsContinue

  • Blog

    AI-Powered Social Engineering: Ancillary Tools and Techniques

    Social engineering is advancing fast, at the speed of generative AI. This is offering bad actors multiple new tools and techniques for researching, scoping, and exploiting organizations. In a recent communication, the FBI pointed out: ‘As technology continues to evolve, so do cybercriminals’ tactics.’ This article explores some of the impacts of this GenAI-fueled acceleration….

    Read More AI-Powered Social Engineering: Ancillary Tools and TechniquesContinue

  • Blog

    Microsoft: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts

    Microsoft is calling attention to an emerging threat cluster it calls Storm-2372 that has been attributed to a new set of cyber attacks aimed at a variety of sectors since August 2024. The attacks have targeted government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas

    Read More Microsoft: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack AccountsContinue

Page navigation

Previous PagePrevious 1 … 199 200 201 202 203 … 225 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us