Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Securing the Win: What Cybersecurity Can Learn From the Paddock

    A Formula 1 pit crew demonstrates the basic principles of how modern security teams should work.

    Read More Securing the Win: What Cybersecurity Can Learn From the PaddockContinue

  • Blog

    Chinese APT Infects Routers to Hijack Software Updates

    A unique take on the software update gambit has allowed “PlushDaemon” to evade attention as it mostly targets Chinese organizations.

    Read More Chinese APT Infects Routers to Hijack Software UpdatesContinue

  • Blog

    Same Old Security Problems: Cyber Training Still Fails Miserably

    Editors from Dark Reading, Cybersecurity Dive, and TechTarget Search Security break down the depressing state of cybersecurity awareness campaigns and how organizations can overcome basic struggles with password hygiene and phishing attacks.

    Read More Same Old Security Problems: Cyber Training Still Fails MiserablyContinue

  • Blog

    WhatsApp compromise leads to Astaroth deployment

    Another campaign targeting WhatsApp users in Brazil spreads like a worm and employs multiple payloads for credential theft, session hijacking, and persistence

    Read More WhatsApp compromise leads to Astaroth deploymentContinue

  • Blog

    ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

    Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in the Ray open-source artificial intelligence (AI) framework to turn infected clusters with NVIDIA GPUs into a self-replicating cryptocurrency mining botnet. The activity, codenamed ShadowRay 2.0, is an evolution of a prior wave that was observed between September 2023 and March 2024. The…

    Read More ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining BotnetContinue

  • Blog

    ‘Matrix Push’ C2 Tool Hijacks Browser Notifications

    Have you ever given two seconds of thought to a browser notification? No? That’s what hackers bent on phishing are counting on.

    Read More ‘Matrix Push’ C2 Tool Hijacks Browser NotificationsContinue

  • Blog

    Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows

    Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that’s targeting Windows users. Active since mid-2025, the threat is designed to execute arbitrary JavaScript code retrieved from a command-and-control (C2) server, Kaspersky researcher Lisandro Ubiedo said in an analysis published today. There are currently no details on how the botnet malware is propagated;

    Read More Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on WindowsContinue

  • Blog

    WhatsApp ‘Eternidade’ Trojan Self-Propagates Through Brazil

    The infostealer specifically targets Brazilian Portuguese speakers and combines malware designed to phish banking credentials and steal data, a worm, and some uniquely Brazilian quirks.

    Read More WhatsApp ‘Eternidade’ Trojan Self-Propagates Through BrazilContinue

  • Blog

    ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

    This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we’ve seen arrests, spies at work, and big power moves online. Hackers are getting caught. Spies are getting better at their jobs. Even simple things like browser add-ons and smart home gadgets are being used…

    Read More ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware WavesContinue

  • Blog

    CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

    CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication portals and impersonation pages. The campaign, internally dubbed HackOnChat, abuses WhatsApp’s familiar web interface, using social engineering tactics to trick users into compromising their accounts. Investigators identified thousands of malicious URLs

    Read More CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChatContinue

Page navigation

Previous PagePrevious 1 … 100 101 102 103 104 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us