Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

    Threat hunters have uncovered similarities between a banking malware called Coyote and a newly disclosed malicious program dubbed Maverick that has been propagated via WhatsApp. According to a report from CyberProof, both malware strains are written in .NET, target Brazilian users and banks, and feature identical functionality to decrypt, targeting banking URLs and monitor banking…

    Read More WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest BanksContinue

  • Blog

    GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites

    The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from Huntress. The cybersecurity company said it observed three GootLoader infections since October 27, 2025, out of which two resulted in hands-on keyboard intrusions with domain controller compromise taking place within 17 hours…

    Read More GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress SitesContinue

  • Blog

    Grandparents to C-Suite: Elder Fraud Reveals Gaps in Human-Centered Cybersecurity

    Cybercriminals are weaponizing AI voice cloning and publicly available data to craft social engineering scams that emotionally manipulate senior citizens—and drain billions from their savings.

    Read More Grandparents to C-Suite: Elder Fraud Reveals Gaps in Human-Centered CybersecurityContinue

  • Blog

    Bridging the Skills Gap: How Military Veterans Are Strengthening Cybersecurity

    From intelligence analysts to surface warfare officers, military veterans of all backgrounds are successfully pivoting to cybersecurity careers and strengthening the industry’s defense capabilities.

    Read More Bridging the Skills Gap: How Military Veterans Are Strengthening CybersecurityContinue

  • Blog

    CISO’s Expert Guide To AI Supply Chain Attacks

    AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations. Download the full CISO’s expert guide to AI Supply chain attacks here.  TL;DR AI-enabled supply chain attacks are exploding in scale and sophistication – Malicious package uploads to open-source repositories jumped…

    Read More CISO’s Expert Guide To AI Supply Chain AttacksContinue

  • Blog

    Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories

    Cybersecurity researchers have discovered a malicious npm package named “@acitons/artifact” that typosquats the legitimate “@actions/artifact” package with the intent to target GitHub-owned repositories. “We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish

    Read More Researchers Detect Malicious npm Package Targeting GitHub-Owned RepositoriesContinue

  • Blog

    Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

    Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that’s sold on Russian-speaking Telegram channels under a Malware-as-a-Service (MaaS) model. According to its seller, the malware enables device control and espionage, allowing threat actors to collect SMS messages, contacts, call logs, images, and videos, as well as intercept,…

    Read More Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for HackersContinue

  • Blog

    Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk

    Konni, a subset of the state-sponsored DPRK cyberespionage group, first exploits Google Find Hub, which ironically aims to protect lost Android devices, to remotely wipe devices.

    Read More Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalkContinue

  • Blog

    OWASP Highlights Supply Chain Risks in New Top 10

    Security misconfiguration jumped to second place while injection vulnerabilities dropped, as organizations improve defenses against traditional coding flaws.

    Read More OWASP Highlights Supply Chain Risks in New Top 10Continue

  • Blog

    GlassWorm Returns, Slices Back into VS Code Extensions

    GlassWorm, a self-propagating VS Code malware first found in the Open VSX marketplace, continues to infect developer devices around the world.

    Read More GlassWorm Returns, Slices Back into VS Code ExtensionsContinue

Page navigation

Previous PagePrevious 1 … 109 110 111 112 113 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us