Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Attackers Can Use Browser Extensions to Inject AI Prompts

    A proof-of-concept attack shows how threat actors can use a poisoned browser extension to inject malicious prompts into a generative AI tool.

    Read More Attackers Can Use Browser Extensions to Inject AI PromptsContinue

  • Blog

    Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools

    Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified as behind over a dozen technology patents, shedding light on the shadowy cyber contracting ecosystem and its offensive capabilities. The patents cover forensics and intrusion tools that enable encrypted endpoint data collection, Apple device forensics, and remote access…

    Read More Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage ToolsContinue

  • Blog

    Product Walkthrough: A Look Inside Pillar’s AI Security Platform

    In this article, we will provide a brief overview of Pillar Security’s platform to better understand how they are tackling AI security challenges. Pillar Security is building a platform to cover the entire software development and deployment lifecycle with the goal of providing trust in AI systems. Using its holistic approach, the platform introduces new…

    Read More Product Walkthrough: A Look Inside Pillar’s AI Security PlatformContinue

  • Blog

    Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome

    Apple on Tuesday released security updates for its entire software portfolio, including a fix for a vulnerability that Google said was exploited as a zero-day in the Chrome web browser earlier this month. The vulnerability, tracked as CVE-2025-6558 (CVSS score: 8.8), is an incorrect validation of untrusted input in the browser’s ANGLE and GPU components…

    Read More Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google ChromeContinue

  • Blog

    Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero

    Google has announced that it’s making a security feature called Device Bound Session Credentials (DBSC) in open beta to ensure that users are safeguarded against session cookie theft attacks. DBSC, first introduced as a prototype in April 2024, is designed to bind authentication sessions to a device so as to prevent threat actors from using…

    Read More Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project ZeroContinue

  • Blog

    African Orgs Fall to Mass Microsoft SharePoint Exploits

    The National Treasury of South Africa is among the half-dozen known victims in South Africa — along with other nations — of the mass compromise of on-premises Microsoft SharePoint servers.

    Read More African Orgs Fall to Mass Microsoft SharePoint ExploitsContinue

  • Blog

    Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware

    Threat actors have been observed exploiting a now-patched critical SAP NetWeaver flaw to deliver the Auto-Color backdoor in an attack targeting a U.S.-based chemicals company in April 2025. “Over the course of three days, a threat actor gained access to the customer’s network, attempted to download several suspicious files and communicated with malicious infrastructure linked…

    Read More Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color MalwareContinue

  • Blog

    Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure

    Google Cloud’s Mandiant Consulting has revealed that it has witnessed a drop in activity from the notorious Scattered Spider group, but emphasized the need for organizations to take advantage of the lull to shore up their defenses. “Since the recent arrests tied to the alleged Scattered Spider (UNC3944) members in the U.K., Mandiant Consulting hasn’t…

    Read More Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security PressureContinue

  • Blog

    Nimble ‘Gunra’ Ransomware Evolves With Linux Variant

    The emerging cybercriminal gang, which initially targeted Microsoft Windows systems, is looking to go cross-platform using sophisticated, multithread encryption.

    Read More Nimble ‘Gunra’ Ransomware Evolves With Linux VariantContinue

  • Blog

    GOLD BLADE Remote DLL Sideloading Attack Deploys RedLoader

    Attacks surged in July 2025 after the threat group updated its process to combine malicious LNK files and a recycled WebDAV technique

    Read More GOLD BLADE Remote DLL Sideloading Attack Deploys RedLoaderContinue

Page navigation

Previous PagePrevious 1 … 21 22 23 24 25 … 225 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us