Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups

    Microsoft has formally tied the exploitation of security flaws in internet-facing SharePoint Server instances to two Chinese hacking groups called Linen Typhoon and Violet Typhoon as early as July 7, 2025, corroborating earlier reports. The tech giant said it also observed a third China-based threat actor, which it tracks as Storm-2603, weaponizing the flaws as…

    Read More Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker GroupsContinue

  • Blog

    Dell Breached by Extortion Group, Says Data Stolen Was ‘Fake’

    The World Leaks group accessed and released data from the company’s Customer Solution Center, which is separated from customer and partner systems and stores primarily “synthetic” datasets used for demos and testing, Dell said.

    Read More Dell Breached by Extortion Group, Says Data Stolen Was ‘Fake’Continue

  • Blog

    Critical Infrastructure Security Is a Critical Concern

    To be truly resilient in the ever-growing threat landscape, organizations need to balance protection with preparation.

    Read More Critical Infrastructure Security Is a Critical ConcernContinue

  • Blog

    Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access

    Cisco on Monday updated its advisory of a set of recently disclosed security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) to acknowledge active exploitation. “In July 2025, the Cisco PSIRT [Product Security Incident Response Team], became aware of attempted exploitation of some of these vulnerabilities in the wild,” the company…

    Read More Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root AccessContinue

  • Blog

    Marine Transportation Final Cyber Rule Goes Into Effect

    The cybersecurity rule has several requirements that must be met and will follow an extended timeline over the next two years.

    Read More Marine Transportation Final Cyber Rule Goes Into EffectContinue

  • Blog

    Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate

    Mexican organizations are still being targeted by threat actors to deliver a modified version of AllaKore RAT and SystemBC as part of a long-running campaign.  The activity has been attributed by Arctic Wolf Labs to a financially motivated hacking group called Greedy Sponge. It’s believed to be active since early 2021, indiscriminately targeting a wide…

    Read More Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader ProliferateContinue

  • Blog

    How to Advance from SOC Manager to CISO?

    Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant career leap. Not only do you need a solid foundation of tech knowledge but also leadership skills and business smarts.  This article will guide you through the practical steps and skills you’ll need to…

    Read More How to Advance from SOC Manager to CISO?Continue

  • Blog

    China-Backed APT41 Cyberattack Surfaces in Africa

    Up to now, the prolific China-sponsored cyber-espionage group has been mostly absent from the region, but a sophisticated and highly targeted attack on an African IT company shows Beijing is branching out.

    Read More China-Backed APT41 Cyberattack Surfaces in AfricaContinue

  • Blog

    Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access

    The recently disclosed critical Microsoft SharePoint vulnerability has been under exploitation as early as July 7, 2025, according to findings from Check Point Research. The cybersecurity company said it observed first exploitation attempts targeting an unnamed major Western government, with the activity intensifying on July 18 and 19, spanning government, telecommunications, and software

    Read More Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent AccessContinue

  • Blog

    Human Digital Twins Could Give Attackers a Dangerous Advantage

    While this emerging technology offers many benefits, digital twins also have several drawbacks, as these convincing impersonations can be used in social engineering attacks.

    Read More Human Digital Twins Could Give Attackers a Dangerous AdvantageContinue

Page navigation

Previous PagePrevious 1 … 32 33 34 35 36 … 225 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us