Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Malicious Implants Are Coming to AI Components, Applications

    A red teamer is publishing research next month about how weaknesses in modern security products lay the groundwork for stealthy implants in AI-powered applications.

    Read More Malicious Implants Are Coming to AI Components, ApplicationsContinue

  • Blog

    Europol Sting Leaves Russian Cybercrime’s ‘NoName057(16)’ Group Fractured

    National authorities have issued seven arrest warrants in total relating to the cybercrime collective known as NoName057(16), which recruits followers to carry out DDoS attacks on perceived enemies of Russia.

    Read More Europol Sting Leaves Russian Cybercrime’s ‘NoName057(16)’ Group FracturedContinue

  • Blog

    Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents

    Cybersecurity researchers have unearthed new Android spyware artifacts that are likely affiliated with the Iranian Ministry of Intelligence and Security (MOIS) and have been distributed to targets by masquerading as VPN apps and Starlink, a satellite internet connection service offered by SpaceX. Mobile security vendor Lookout said it discovered four samples of a surveillanceware tool…

    Read More Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on DissidentsContinue

  • Blog

    China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure

    The China-linked cyber espionage group tracked as APT41 has been attributed to a new campaign targeting government IT services in the African region. “The attackers used hardcoded names of internal services, IP addresses, and proxy servers embedded within their malware,” Kaspersky researchers Denis Kulik and Daniil Pogorelov said. “One of the C2s [command-and-control servers] was…

    Read More China-Linked Hackers Launch Targeted Espionage Campaign on African IT InfrastructureContinue

  • Blog

    SharePoint ‘ToolShell’ vulnerabilities being exploited in the wild

    Sophos X-Ops sees exploitation across multiple customer estates

    Read More SharePoint ‘ToolShell’ vulnerabilities being exploited in the wildContinue

  • Blog

    Containment as a Core Security Strategy

    We cannot keep reacting to vulnerabilities as they emerge. We must assume the presence of unknown threats and reduce the blast radius that they can affect.

    Read More Containment as a Core Security StrategyContinue

  • Blog

    ⚡ Weekly Recap: SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More

    Even in well-secured environments, attackers are getting in—not with flashy exploits, but by quietly taking advantage of weak settings, outdated encryption, and trusted tools left unprotected. These attacks don’t depend on zero-days. They work by staying unnoticed—slipping through the cracks in what we monitor and what we assume is safe. What once looked suspicious now…

    Read More ⚡ Weekly Recap: SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and MoreContinue

  • Blog

    Assessing the Role of AI in Zero Trust

    By 2025, Zero Trust has evolved from a conceptual framework into an essential pillar of modern security. No longer merely theoretical, it’s now a requirement that organizations must adopt. A robust, defensible architecture built on Zero Trust principles does more than satisfy baseline regulatory mandates. It underpins cyber resilience, secures third-party partnerships, and ensures uninterrupted

    Read More Assessing the Role of AI in Zero TrustContinue

  • Blog

    Microsoft Rushes Emergency Patch for Actively Exploited SharePoint ‘ToolShell’ Bug

    Malicious actors already have already pounced on the zero-day vulnerability, tracked as CVE-2025-53770, to compromise US government agencies and other businesses in ongoing and widespread attacks.

    Read More Microsoft Rushes Emergency Patch for Actively Exploited SharePoint ‘ToolShell’ BugContinue

  • Blog

    PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse

    Cybersecurity researchers have disclosed a novel attack technique that allows threat actors to bypass Fast IDentity Online (FIDO) key protections by deceiving users into approving authentication requests from spoofed company login portals. The activity, observed by Expel as part of a phishing campaign in the wild, has been attributed to a threat actor named PoisonSeed,…

    Read More PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In AbuseContinue

Page navigation

Previous PagePrevious 1 … 33 34 35 36 37 … 225 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us