Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Extension Poisoning Campaign Highlights Gaps in Browser Security

    Evidence suggests that some of the payloads and extensions may date as far back as April 2023.

    Read More Extension Poisoning Campaign Highlights Gaps in Browser SecurityContinue

  • Blog

    North Korea’s Lazarus APT Evolves Developer-Recruitment Attacks

    “Operation 99” uses job postings to lure freelance software developers into downloading malicious Git repositories. From there, malware infiltrates developer projects to steal source code, secrets, and cryptocurrency.

    Read More North Korea’s Lazarus APT Evolves Developer-Recruitment AttacksContinue

  • Blog

    Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes

    Cybersecurity researchers have alerted to a new malvertising campaign that’s targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google. “The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages,” Jérôme Segura, senior…

    Read More Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA CodesContinue

  • Blog

    Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99

    The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to deliver malware. “The campaign begins with fake recruiters, posing on platforms like LinkedIn, luring developers with project tests and code reviews,” Ryan Sherstobitoff, senior vice president…

    Read More Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99Continue

  • Blog

    OWASP’s New LLM Top 10 Shows Emerging AI Threats

    Ultimately, there is no replacement for an intuitive, security-focused developer working with the critical thinking required to drive down the risk of both AI and human error.

    Read More OWASP’s New LLM Top 10 Shows Emerging AI ThreatsContinue

  • Blog

    North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains

    Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam. The new evidence suggests that Pyongyang-based threamoret groups may have pulled off illicit money-making scams that predate the use of IT workers, SecureWorks Counter Threat Unit (CTU) said in a report shared…

    Read More North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake DomainsContinue

  • Blog

    Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool

    As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client. “Attackers can take control of a malicious server and read/write arbitrary files of any connected client,” the CERT Coordination Center (CERT/CC) said in an…

    Read More Google Cloud Researchers Uncover Flaws in Rsync File Synchronization ToolContinue

  • Blog

    Microsoft Rings in 2025 With Record Security Update

    Company has issued patches for an unprecedented 159 CVEs, including eight zero-days, three of which attackers are already exploiting.

    Read More Microsoft Rings in 2025 With Record Security UpdateContinue

  • Blog

    Apple Bug Allows Root Protections Bypass Without Physical Access

    Emergent macOS vulnerability lets adversaries circumvent Apple’s System Integrity Protection (SIP) by loading third-party kernels.

    Read More Apple Bug Allows Root Protections Bypass Without Physical AccessContinue

  • Blog

    FBI Wraps Up Eradication Effort of Chinese ‘PlugX’ Malware

    Two hacker groups were paid to develop malware targeting victims in the US, Europe, and Asia, as well as various Chinese dissident groups.

    Read More FBI Wraps Up Eradication Effort of Chinese ‘PlugX’ MalwareContinue

Page navigation

Previous PagePrevious 1 … 209 210 211 212 213 … 224 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us