Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Ivanti Connect Secure Zero-Day Vulnerability

    What are the Vulnerabilities?Ivanti disclosed two vulnerabilities, CVE-2025-0282 and CVE-2025-0283, impacting Ivanti Connect Secure (“ICS”) VPN appliances. CVE-2025-0282 is an unauthenticated stack-based buffer overflow affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. Successful exploitation could result in unauthenticated remote code execution and CVE-2025-0283 is a stack-based buffer overflow in Ivanti Connect Secure before version…

    Read More Ivanti Connect Secure Zero-Day VulnerabilityContinue

  • Blog

    Chinese APT Group Is Ransacking Japan’s Secrets

    Since 2019, MirrorFace has been stealing information from myriad Japanese organizations to gain leverage over Japan in the event of hostilities between the two countries, experts said.

    Read More Chinese APT Group Is Ransacking Japan’s SecretsContinue

  • Blog

    Banshee 2.0 Malware Steals Apple’s Encryption to Hide on Macs

    The most recent iteration of the open source infostealer skates by antivirus programs on Macs, using an encryption mechanism stolen from Apple’s own antivirus product.

    Read More Banshee 2.0 Malware Steals Apple’s Encryption to Hide on MacsContinue

  • Blog

    Hacking Group ‘Silk Typhoon’ Linked to US Treasury Breach

    The attack used a stolen remote support SaaS API key to exfiltrate data from workstations in the Treasury Department’s Office of Foreign Assets Control.

    Read More Hacking Group ‘Silk Typhoon’ Linked to US Treasury BreachContinue

  • Blog

    Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers

    Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data. “Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as…

    Read More Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix ControllersContinue

  • Blog

    New AI Challenges Will Test CISOs & Their Teams in 2025

    CISOs need to recognize the new threats AI can present — while also embracing AI-powered solutions to stay ahead of those threats.

    Read More New AI Challenges Will Test CISOs & Their Teams in 2025Continue

  • Blog

    New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption

    Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer. “Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple’s XProtect,” Check Point Research said in a new analysis shared with The Hacker News. “This development allows it…

    Read More New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired EncryptionContinue

  • Blog

    Product Walkthrough: How Reco Discovers Shadow AI in SaaS

    As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has emerged in the world of AI: shadow AI.  Shadow AI refers to the unauthorized use of AI tools and copilots at organizations. For example, a developer using ChatGPT to assist with writing code, a salesperson…

    Read More Product Walkthrough: How Reco Discovers Shadow AI in SaaSContinue

  • Blog

    Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions

    Ransomware isn’t slowing down—it’s getting smarter. Encryption, designed to keep our online lives secure, is now being weaponized by cybercriminals to hide malware, steal data, and avoid detection.The result? A 10.3% surge in encrypted attacks over the past year and some of the most shocking ransom payouts in history, including a $75 million ransom in…

    Read More Webinar: Learn How to Stop Encrypted Attacks Before They Cost You MillionsContinue

  • Blog

    MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan

    Japan’s National Police Agency (NPA) and National Center of Incident Readiness and Strategy for Cybersecurity (NCSC) accused a China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019. The primary objective of the attack campaign is to steal information related to Japan’s national

    Read More MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on JapanContinue

Page navigation

Previous PagePrevious 1 … 213 214 215 216 217 … 223 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us