Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

    Google’s Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet’s Triofox file-sharing and remote access platform. The critical vulnerability, tracked as CVE-2025-12480 (CVSS score: 9.1), allows an attacker to bypass authentication and access the configuration pages, resulting in the upload and execution of arbitrary payloads.  The

    Read More Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus FeatureContinue

  • Blog

    Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon

    The North Korea-affiliated threat actor known as Konni (aka Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia) has been attributed to a new set of attacks targeting both Android and Windows devices for data theft and remote control. “Attackers impersonated psychological counselors and North Korean human rights activists, distributing malware disguised as stress-relief programs,” the…

    Read More Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping WeaponContinue

  • Blog

    ClickFix Campaign Targets Hotels, Spurs Secondary Customer Attacks

    Attackers compromise hospitality providers with an infostealer and RAT malware and then use stolen data to launch a phishing attacks against customers via both email and WhatsApp.

    Read More ClickFix Campaign Targets Hotels, Spurs Secondary Customer AttacksContinue

  • Blog

    ⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

    Cyber threats didn’t slow down last week—and attackers are getting smarter. We’re seeing malware hidden in virtual machines, side-channel leaks exposing AI chats, and spyware quietly targeting Android devices in the wild. But that’s just the surface. From sleeper logic bombs to a fresh alliance between major threat groups, this week’s roundup highlights a clear…

    Read More ⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and MoreContinue

  • Blog

    New Browser Security Report Reveals Emerging Threats for Enterprises

    According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in a single place, the user’s browser. Yet traditional controls like DLP, EDR, and SSE still operate one layer too low. What’s emerging isn’t just a blindspot. It’s a parallel threat surface: unmanaged extensions acting…

    Read More New Browser Security Report Reveals Emerging Threats for EnterprisesContinue

  • Blog

    Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware

    Cybersecurity researchers have called attention to a massive phishing campaign targeting the hospitality industry that lures hotel managers to ClickFix-style pages and harvest their credentials by deploying malware like PureRAT. “The attacker’s modus operandi involved using a compromised email account to send malicious messages to multiple hotel establishments,” Sekoia said. “This campaign

    Read More Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT MalwareContinue

  • Blog

    GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs

    Cybersecurity researchers have disclosed a new set of three extensions associated with the GlassWorm campaign, indicating continued attempts on part of threat actors to target the Visual Studio Code (VS Code) ecosystem. The extensions in question, which are still available for download, are listed below – ai-driven-dev.ai-driven-dev (3,402 downloads) adhamu.history-in-sublime-merge (4,057

    Read More GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of InstallsContinue

  • Blog

    Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic

    Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with capabilities to observe network traffic to glean details about model conversation topics despite encryption protections under certain circumstances. This leakage of data exchanged between humans and streaming-mode language models could pose serious risks to

    Read More Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted TrafficContinue

  • Blog

    ‘Landfall’ Malware Targeted Samsung Galaxy Users

    The tool let its operators secretly record conversations, track device locations, capture photos, collect contacts, and perform other surveillance on compromised devices.

    Read More ‘Landfall’ Malware Targeted Samsung Galaxy UsersContinue

  • Blog

    ‘Ransomvibing’ Infests Visual Studio Extension Market

    A published VS Code extension didn’t hide the fact that it encrypts and exfiltrates data and also failed to remove obvious signs it was AI-generated.

    Read More ‘Ransomvibing’ Infests Visual Studio Extension MarketContinue

Page navigation

Previous PagePrevious 1 … 110 111 112 113 114 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us