Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Telefonica Breach Exposes Jira Tickets, Customer Data

    The Hellcat ransomware group has stolen roughly 5,000 documents, potentially containing confidential information, from the telecom giant’s internal database.

    Read More Telefonica Breach Exposes Jira Tickets, Customer DataContinue

  • Blog

    The Shifting Landscape of Open Source Security

    By focusing on vigilant security practices, responsible AI deployment, and alignment with global regulatory standards, the OSS community can make 2025 a transformative year for security.

    Read More The Shifting Landscape of Open Source SecurityContinue

  • Blog

    Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners

    A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform has come under active exploitation in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm Wiz said it’s currently responding to “multiple incidents” involving the weaponization of CVE-2024-50603 (CVSS score: 10.0), a maximum severity bug that could result in

    Read More Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto MinersContinue

  • Blog

    ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]

    The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad guys. From sneaky software bugs to advanced hacking tricks, the risks are real, but so are the ways to protect yourself. In this recap, we’ll break down what’s happening, why it matters, and what you can do to stay…

    Read More ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]Continue

  • Blog

    Ransomware on ESXi: The mechanization of virtualized attacks

    In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand skyrocketing to $5 million. With approximately 8,000 ESXi hosts exposed directly to the internet (according to Shodan), the operational and business impact of these attacks is profound. Most of the Ransomware strands that are attacking ESXi servers nowadays, are…

    Read More Ransomware on ESXi: The mechanization of virtualized attacksContinue

  • Blog

    WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables

    Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages by inserting malicious JavaScript code into a database table associated with the content management system (CMS). “This credit card skimmer malware targeting WordPress websites silently injects malicious JavaScript into database entries to steal sensitive payment

    Read More WordPress Skimmers Evade Detection by Injecting Themselves into Database TablesContinue

  • Blog

    Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems

    No less than 4,000 unique web backdoors previously deployed by various threat actors have been hijacked by taking control of abandoned and expired infrastructure for as little as $20 per domain. Cybersecurity company watchTowr Labs said it pulled off the operation by registering over 40 domain names that the backdoors had been designed to use…

    Read More Expired Domains Allowed Control Over 4,000 Backdoors on Compromised SystemsContinue

  • Blog

    Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation

    Microsoft has revealed that it’s pursuing legal action against a “foreign-based threat–actor group” for operating a hacking-as-a-service infrastructure to intentionally get around the safety controls of its generative artificial intelligence (AI) services and produce offensive and harmful content. The tech giant’s Digital Crimes Unit (DCU) said it has observed the threat actors “develop

    Read More Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content CreationContinue

  • Blog

    DoJ Indicts Three Russians for Operating Crypto Mixers Used in Cybercrime Laundering

    The U.S. Department of Justice (DoJ) on Friday indicted three Russian nationals for their alleged involvement in operating the cryptocurrency mixing services Blender.io and Sinbad.io. Roman Vitalyevich Ostapenko and Alexander Evgenievich Oleynik were arrested on December 1, 2024, in coordination with the Netherlands’ Financial Intelligence and Investigative Service, Finland’s National Bureau of

    Read More DoJ Indicts Three Russians for Operating Crypto Mixers Used in Cybercrime LaunderingContinue

  • Blog

    Threat Actors Exploit a Critical Ivanti RCE Bug, Again

    New year, same story. Despite Ivanti’s commitment to secure-by-design principles, threat actors — possibly the same ones as before — are exploiting its edge devices for the nth time.

    Read More Threat Actors Exploit a Critical Ivanti RCE Bug, AgainContinue

Page navigation

Previous PagePrevious 1 … 211 212 213 214 215 … 223 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us