Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Lynx Ransomware Group ‘Industrializes’ Cybercrime With Affiliates

    The ransomware group provides everything an affiliate could want to breach and attack victims, including a quality controlled recruitment system to engage even more criminals.

    Read More Lynx Ransomware Group ‘Industrializes’ Cybercrime With AffiliatesContinue

  • Blog

    OAuth Flaw Exposed Millions of Airline Users to Account Takeovers

    The now-fixed vulnerability involved a major travel services company that’s integrated with dozens of airline websites worldwide.

    Read More OAuth Flaw Exposed Millions of Airline Users to Account TakeoversContinue

  • Blog

    Phishing Campaign Baits Hook With Malicious Amazon PDFs

    In their discovery, researchers found 31 PDF files linking to these phishing websites, none of which have been yet submitted to VirusTotal.

    Read More Phishing Campaign Baits Hook With Malicious Amazon PDFsContinue

  • Blog

    Super Bowl LIX Could Be a Magnet for Cyberattacks

    Concerns include everything from ransomware, malware, and phishing attacks on the game’s infrastructure to those targeting event sponsors and fans.

    Read More Super Bowl LIX Could Be a Magnet for CyberattacksContinue

  • Blog

    PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks

    A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany. The attacks have led to the deployment of various payloads, such as Agent Tesla, Snake Keylogger, and a previously undocumented backdoor dubbed TorNet that’s delivered…

    Read More PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing CyberattacksContinue

  • Blog

    Reporting a Breach or Vuln? Be Sure Your Lawyer’s on Call

    Globally, security researchers and whistleblowers face increasingly hostile laws and judiciaries that are ready to levy fines and prison sentences.

    Read More Reporting a Breach or Vuln? Be Sure Your Lawyer’s on CallContinue

  • Blog

    Cryptographic Agility’s Legislative Possibilities & Business Benefits

    Quantum computing will bring new security risks. Both professionals and legislators need to use this time to prepare.

    Read More Cryptographic Agility’s Legislative Possibilities & Business BenefitsContinue

  • Blog

    OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking

    Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. “By exploiting this flaw, attackers can gain unauthorized access to any user’s account within the system, effectively allowing them to impersonate the victim and perform an array of actions on their behalf –…

    Read More OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account HijackingContinue

  • Blog

    Update: Cybercriminals still not fully on board the AI train (yet)

    A year after our initial research on threat actors’ attitudes to generative AI, we revisit some underground forums and find that many cybercriminals are still skeptical – although there has been a slight shift

    Read More Update: Cybercriminals still not fully on board the AI train (yet)Continue

  • Blog

    Beyond the hype: The business reality of AI for cybersecurity

    Real-world insights from 400 IT leaders, plus practical guidance to enhance business outcomes

    Read More Beyond the hype: The business reality of AI for cybersecurityContinue

Page navigation

Previous PagePrevious 1 … 200 201 202 203 204 … 225 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us