Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    China’s UNC5337 Exploits a Critical Ivanti RCE Bug, Again

    New year, same story. Despite Ivanti’s commitment to secure-by-design principles, Chinese threat actors are exploiting its edge devices for the nth time.

    Read More China’s UNC5337 Exploits a Critical Ivanti RCE Bug, AgainContinue

  • Blog

    Fake CrowdStrike ‘Job Interviews’ Become Latest Hacker Tactic

    Cybercriminals are luring victims into downloading the XMRig cryptomining malware via convincing emails, inviting them to schedule fake interviews using a malicious link.

    Read More Fake CrowdStrike ‘Job Interviews’ Become Latest Hacker TacticContinue

  • Blog

    Russia Carves Out Commercial Surveillance Success Globally

    Growing sales of the System for Operative Investigative Activities (SORM), a Russian wiretapping platform, in Central Asia and Latin American suggests increasing risks for Western businesses.

    Read More Russia Carves Out Commercial Surveillance Success GloballyContinue

  • Blog

    Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices

    Cybersecurity researchers have detailed a now-patched security flaw impacting Monkey’s Audio (APE) decoder on Samsung smartphones that could lead to code execution. The high-severity vulnerability, tracked as CVE-2024-49415 (CVSS score: 8.1), affects Samsung devices running Android versions 12, 13, and 14. “Out-of-bounds write in libsaped.so prior to SMR Dec-2024 Release 1 allows remote

    Read More Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung DevicesContinue

  • Blog

    The Path Toward Championing Diversity in Cybersecurity Education

    To build a truly inclusive and diverse cybersecurity workforce, we need a comprehensive approach beyond recruitment and retention.

    Read More The Path Toward Championing Diversity in Cybersecurity EducationContinue

  • Blog

    Taking the Pain Out of Cybersecurity Reporting: A Practical Guide for MSPs

    Cybersecurity reporting is a critical yet often overlooked opportunity for service providers managing cybersecurity for their clients, and specifically for virtual Chief Information Security Officers (vCISOs). While reporting is seen as a requirement for tracking cybersecurity progress, it often becomes bogged down with technical jargon, complex data, and disconnected spreadsheets that fail to

    Read More Taking the Pain Out of Cybersecurity Reporting: A Practical Guide for MSPsContinue

  • Blog

    AI-Driven Ransomware FunkSec Targets 85 Victims Using Double Extortion Tactics

    Cybersecurity researchers have shed light on a nascent artificial intelligence (AI) assisted ransomware family called FunkSec that sprang forth in late 2024, and has claimed more than 85 victims to date. “The group uses double extortion tactics, combining data theft with encryption to pressure victims into paying ransoms,” Check Point Research said in a new…

    Read More AI-Driven Ransomware FunkSec Targets 85 Victims Using Double Extortion TacticsContinue

  • Blog

    Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity

    Network segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy management, and disruptive network changes. Healthcare and manufacturing sectors face particular challenges as they integrate diverse endpoints – from legacy medical devices to IoT sensors – onto their production networks.

    Read More Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by ElisityContinue

  • Blog

    RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns

    Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia have been targeted by the China-nexus RedDelta threat actor to deliver a customized version of the PlugX backdoor between July 2023 and December 2024. “The group used lure documents themed around the 2024 Taiwanese presidential candidate Terry Gou, the Vietnamese National Holiday, flood protection in Mongolia, and meeting invitations,…

    Read More RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage CampaignsContinue

  • Blog

    CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer

    Cybersecurity company CrowdStrike is alerting of a phishing campaign that exploits its own branding to distribute a cryptocurrency miner that’s disguised as an employee CRM application as part of a supposed recruitment process. “The attack begins with a phishing email impersonating CrowdStrike recruitment, directing recipients to a malicious website,” the company said. “Victims are prompted…

    Read More CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig CryptominerContinue

Page navigation

Previous PagePrevious 1 … 212 213 214 215 216 … 223 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us