Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages

    Google has announced the launch of a new initiative called OSS Rebuild to bolster the security of the open-source package ecosystems and prevent software supply chain attacks. “As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers,” Matthew Suozzo, Google Open…

    Read More Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source PackagesContinue

  • Blog

    CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security flaws impacting SysAid IT support software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are listed below – CVE-2025-2775 (CVSS score: 9.3) – An improper restriction of XML external entity (XXE) reference vulnerability in the

    Read More CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRFContinue

  • Blog

    CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on July 22, 2025, added two Microsoft SharePoint flaws, CVE-2025-49704 and CVE-2025-49706, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. To that end, Federal Civilian Executive Branch (FCEB) agencies are required to remediate identified vulnerabilities by July 23, 2025. “CISA is

    Read More CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live AttacksContinue

  • Blog

    Proof of Concept for Microsoft Word RTF Font Table Heap Corruption (CVE-2023-21716) Released

    Update 3/14 – Coverage section updated with available IPS signature.FortiGuard Labs is aware of a new proof of concept released over the weekend for CVE-2023-21716 (Microsoft Word Remote Code Execution Vulnerability).Patched in the February Microsoft Monthly Security Release, CVE-2023-21716 is a vulnerability within Microsoft Office’s wwlib which allows attackers to achieve remote code execution on…

    Read More Proof of Concept for Microsoft Word RTF Font Table Heap Corruption (CVE-2023-21716) ReleasedContinue

  • Blog

    China Introduces National Cyber ID Amid Privacy Concerns

    China officially rolled out a voluntary Internet identity system to protect citizens’ online identities and personal information, but critics worry about privacy and surveillance.

    Read More China Introduces National Cyber ID Amid Privacy ConcernsContinue

  • Blog

    Microsoft Integrates Data Lake With Sentinel SIEM

    Microsoft Sentinel Data Lake aims to provide inexpensive storage for large volumes of telemetry, while threat intelligence will be included with Defender XDR at no extra cost.

    Read More Microsoft Integrates Data Lake With Sentinel SIEMContinue

  • Blog

    Darktrace Acquires Mira Security for Network Visibility

    The acquisition gives the British cybersecurity solutions provider more insights into encrypted network traffic and additional decryption capabilities.

    Read More Darktrace Acquires Mira Security for Network VisibilityContinue

  • Blog

    3 China Nation-State Actors Target SharePoint Bugs

    Hackers and cybercrime groups are part of a virtual feeding frenzy, after Microsoft’s recent disclosure of new vulnerabilities in on-premises editions of SharePoint Server.

    Read More 3 China Nation-State Actors Target SharePoint BugsContinue

  • Blog

    Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups

    Microsoft has formally tied the exploitation of security flaws in internet-facing SharePoint Server instances to two Chinese hacking groups called Linen Typhoon and Violet Typhoon as early as July 7, 2025, corroborating earlier reports. The tech giant said it also observed a third China-based threat actor, which it tracks as Storm-2603, weaponizing the flaws as…

    Read More Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker GroupsContinue

  • Blog

    Dell Breached by Extortion Group, Says Data Stolen Was ‘Fake’

    The World Leaks group accessed and released data from the company’s Customer Solution Center, which is separated from customer and partner systems and stores primarily “synthetic” datasets used for demos and testing, Dell said.

    Read More Dell Breached by Extortion Group, Says Data Stolen Was ‘Fake’Continue

Page navigation

Previous PagePrevious 1 … 31 32 33 34 35 … 225 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us