Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net

Blog

Your blog category

  • Blog

    Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack

    Cybersecurity researchers have alerted to a supply chain attack that has targeted popular npm packages via a phishing campaign designed to steal the project maintainers’ npm tokens. The captured tokens were then used to publish malicious versions of the packages directly to the registry without any source code commits or pull requests on their respective…

    Read More Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing AttackContinue

  • Blog

    Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers

    A newly disclosed critical security flaw in CrushFTP has come under active exploitation in the wild. Assigned the CVE identifier CVE-2025-54309, the vulnerability carries a CVSS score of 9.0. “CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain…

    Read More Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched ServersContinue

  • Blog

    ‘PoisonSeed’ Attacker Skates Around FIDO Keys

    Researchers discovered a novel phishing attack that serves the victim a QR code as part of supposed multifactor authentication (MFA), in order to get around FIDO-based protections.

    Read More ‘PoisonSeed’ Attacker Skates Around FIDO KeysContinue

  • Blog

    Sophos announces UAE data center

    Strengthening cybersecurity, data sovereignty, and regional performance.

    Read More Sophos announces UAE data centerContinue

  • Blog

    China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

    Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that’s used by law enforcement authorities in China to gather information from seized mobile devices. The hacking tool, believed to be a successor of MFSocket, is developed by a Chinese company named SDIC Intelligence Xiamen Information Co., Ltd., which was formerly known as…

    Read More China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated PhonesContinue

  • Blog

    UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns

    Multiple sectors in China, Hong Kong, and Pakistan have become the target of a threat activity cluster tracked as UNG0002 (aka Unknown Group 0002) as part of a broader cyber espionage campaign. “This threat entity demonstrates a strong preference for using shortcut files (LNK), VBScript, and post-exploitation tools such as Cobalt Strike and Metasploit, while…

    Read More UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin CampaignsContinue

  • Blog

    Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

    Cybersecurity researchers have disclosed details of a new malware called MDifyLoader that has been observed in conjunction with cyber attacks exploiting security flaws in Ivanti Connect Secure (ICS) appliances. According to a report published by JPCERT/CC today, the threat actors behind the exploitation of CVE-2025-0282 and CVE-2025-22457 in intrusions observed between December 2024 and July

    Read More Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike AttacksContinue

  • Blog

    Nearly 2,000 MCP Servers Possess No Security Whatsoever

    Authentication in MCP — the backbone of agentic AI — is optional, and nobody’s implementing it. Instead, they’re allowing any passing attackers full control of their servers.

    Read More Nearly 2,000 MCP Servers Possess No Security WhatsoeverContinue

  • Blog

    3 Ways Security Teams Can Minimize Agentic AI Chaos

    Security often lags behind innovation. The path forward requires striking a balance.

    Read More 3 Ways Security Teams Can Minimize Agentic AI ChaosContinue

  • Blog

    Firmware Vulnerabilities Continue to Plague Supply Chain

    Four flaws in the basic software for Gigabyte motherboards could allow persistent implants, underscoring problems in the ways firmware is developed and updated.

    Read More Firmware Vulnerabilities Continue to Plague Supply ChainContinue

Page navigation

Previous PagePrevious 1 … 35 36 37 38 39 … 226 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us