Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files

    The threat actor known as Patchwork has been attributed to a new spear-phishing campaign targeting Turkish defense contractors with the goal of gathering strategic intelligence. “The campaign employs a five-stage execution chain delivered via malicious LNK files disguised as conference invitations sent to targets interested in learning more about unmanned vehicle systems,” Arctic Wolf Labs…

    Read More Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK FilesContinue

  • Blog

    Why Security Nudges Took Off

    Nudges can be powerful — but they are not immune to overuse or misapplication.

    Read More Why Security Nudges Took OffContinue

  • Blog

    Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor

    Russian aerospace and defense industries have become the target of a cyber espionage campaign that delivers a backdoor called EAGLET to facilitate data exfiltration. The activity, dubbed Operation CargoTalon, has been assigned to a threat cluster tracked as UNG0901 (short for Unknown Group 901). “The campaign is aimed at targeting employees of Voronezh Aircraft Production…

    Read More Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET BackdoorContinue

  • Blog

    The Young and the Restless: Young Cybercriminals Raise Concerns

    National governments warn that many hacker groups attract young people through a sense of community, fame, or the promise of money and the perception of a lack of risk of prosecution.

    Read More The Young and the Restless: Young Cybercriminals Raise ConcernsContinue

  • Blog

    Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

    Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners. The threat activity clusters have been codenamed Soco404 and Koske by cloud security firms Wiz and Aqua, respectively. Soco404 “targets both Linux and Windows systems, deploying platform-specific malware,” Wiz

    Read More Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining AttacksContinue

  • Blog

    Overcoming Risks from Chinese GenAI Tool Usage

    A recent analysis of enterprise data suggests that generative AI tools developed in China are being used extensively by employees in the US and UK, often without oversight or approval from security teams. The study, conducted by Harmonic Security, also identifies hundreds of instances in which sensitive data was uploaded to platforms hosted in China,…

    Read More Overcoming Risks from Chinese GenAI Tool UsageContinue

  • Blog

    Microsoft SharePoint Zero-day Attack

    FortiGuard Labs has detected and successfully blocked hundreds of exploitation attempts targeting a newly discovered zero-day vulnerability chain in on-premises Microsoft SharePoint servers. This active campaign is being exploited by multiple threat actors and poses a significant risk to a wide range of sectors including government, education, healthcare, and large enterprises.

    Read More Microsoft SharePoint Zero-day AttackContinue

  • Blog

    Proof-of-Concept Code Now Available for an Exploited Windows Local Privilege Escalation Vulnerability

    FortiGuard Labs is aware that a Proof-of-Concept (POC) code for a newly patched Windows vulnerability (CVE-2022-21882) that is reported to have been exploited in the wild was released to a publicly available online repository. CVE-2022-21882 is a local privilege (LPE) escalation vulnerability which allows a local, authenticated attacker to gain elevated local system or administrator…

    Read More Proof-of-Concept Code Now Available for an Exploited Windows Local Privilege Escalation VulnerabilityContinue

  • Blog

    Joint CyberSecurity Advisory Alert on PrintNightmare Vulnerability and Default MFA Protocols Exploited by Russian State-Sponsored Cyber Actors (AA22-074A)

    FortiGuard Labs is aware of a recent report issued by the U.S. Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) that Russian state-sponsored cyber actors have gained network access to a non-governmental organization (NGO) through exploitation of default Multi-Factor Authentication (MFA) protocols and the “PrintNightmare” vulnerability (CVE-2021-34527). The attack resulted in…

    Read More Joint CyberSecurity Advisory Alert on PrintNightmare Vulnerability and Default MFA Protocols Exploited by Russian State-Sponsored Cyber Actors (AA22-074A)Continue

  • Blog

    Can Security Culture Be Taught? AWS Says Yes

    Newly appointed Amazon Web Services CISO Amy Herzog believes security culture goes beyond frameworks and executive structures. Having the right philosophy throughout the organization is key.

    Read More Can Security Culture Be Taught? AWS Says YesContinue

Page navigation

Previous PagePrevious 1 … 25 26 27 28 29 … 225 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us