Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

    Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device takeover to conduct financial fraud. “A key differentiator is its ability to bypass encrypted messaging,” ThreatFabric said in a report shared with The Hacker News. “By capturing content directly from the device screen after decryption,…

    Read More New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks DevicesContinue

  • Blog

    Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

    Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting. The development is a sign that the lines between state-sponsored cyber attacks and kinetic warfare are increasingly blurring, necessitating the need for a new category…

    Read More Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike AttemptContinue

  • Blog

    TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

    Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef. The end goal of the attacks is to establish persistence and deliver JavaScript malware that facilitates remote access and control, per a new report from Acronis Threat Research Unit (TRU)….

    Read More TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global CampaignContinue

  • Blog

    Fortinet Woes Continue With Another WAF Zero-Day Flaw

    A second zero-day vulnerability in its web application firewall (WAF) line has come under attack, raising more questions about the vendor’s disclosure practices.

    Read More Fortinet Woes Continue With Another WAF Zero-Day FlawContinue

  • Blog

    Do National Data Laws Carry Cyber-Risks for Large Orgs?

    When international corporations have to balance competing cyber laws from different countries, the result is fragmented, potentially vulnerable systems.

    Read More Do National Data Laws Carry Cyber-Risks for Large Orgs?Continue

  • Blog

    The AI Attack Surface: How Agents Raise the Cyber Stakes

    Researcher shows how agentic AI is vulnerable to hijacking to subvert an agent’s goals and how agent interaction can be altered to compromise whole networks.

    Read More The AI Attack Surface: How Agents Raise the Cyber StakesContinue

  • Blog

    Securing your network for the holidays

    Tips to better protect your network over extended breaks.

    Read More Securing your network for the holidaysContinue

  • Blog

    Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

    A recently disclosed security flaw impacting 7-Zip has come under active exploitation in the wild, according to an advisory issued by the U.K. NHS England Digital on Tuesday. The vulnerability in question is CVE-2025-11001 (CVSS score: 7.0), which allows remote attackers to execute arbitrary code. It has been addressed in 7-Zip version 25.00 released in…

    Read More Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)Continue

  • Blog

    Cloudflare Blames Outage on Internal Configuration Error

    Initially though to be a DDoS attack, the incident was actually due to a routine change in permissions that caused widespread software failure.

    Read More Cloudflare Blames Outage on Internal Configuration ErrorContinue

  • Blog

    Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

    Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to distribute a Delphi-based banking trojan named Eternidade Stealer as part of attacks targeting users in Brazil. “It uses Internet Message Access Protocol (IMAP) to dynamically retrieve command-and-control (C2) addresses, allowing the threat actor to

    Read More Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian DevicesContinue

Page navigation

Previous PagePrevious 1 … 101 102 103 104 105 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us