Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

    Google’s artificial intelligence (AI)-powered cybersecurity agent called Big Sleep has been credited by Apple for discovering as many as five different security flaws in the WebKit component used in its Safari web browser that, if successfully exploited, could result in a browser crash or memory corruption. The list of vulnerabilities is as follows – CVE-2025-43429…

    Read More Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKitContinue

  • Blog

    U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks

    Federal prosecutors in the U.S. have accused a trio of allegedly hacking the networks of five U.S. companies with BlackCat (aka ALPHV) ransomware between May and November 2023 and extorting them. Ryan Clifford Goldberg, Kevin Tyler Martin, and an unnamed co–conspirator (aka “Co-Conspirator 1”) based in Florida, all U.S. nationals, are said to have used…

    Read More U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware AttacksContinue

  • Blog

    Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel

    Microsoft has disclosed details of a novel backdoor dubbed SesameOp that uses OpenAI Assistants Application Programming Interface (API) for command-and-control (C2) communications. “Instead of relying on more traditional methods, the threat actor behind this backdoor abuses OpenAI as a C2 channel as a way to stealthily communicate and orchestrate malicious activities within the compromised

    Read More Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command ChannelContinue

  • Blog

    Microsoft Windows Server Update Service Remote Code Execution Vulnerability

    What is the Vulnerability? CVE-2025-59287 is a critical unauthenticated remote code execution (RCE) vulnerability affecting Windows Server Update Services (WSUS). The flaw stems from unsafe deserialization of untrusted data, allowing attackers to execute arbitrary code on vulnerable servers without authentication. A public proof-of-concept exploit has been released, and CISA has added the vulnerability to its…

    Read More Microsoft Windows Server Update Service Remote Code Execution VulnerabilityContinue

  • Blog

    Android Malware Mutes Alerts, Drains Crypto Wallets

    Android/BankBot-YNRK is currently targeting users in Indonesia by masquerading as legitimate applications.

    Read More Android Malware Mutes Alerts, Drains Crypto WalletsContinue

  • Blog

    Hackers Weaponize Remote Tools to Hijack Cargo Freight

    Researchers uncovered a new threat campaign in which attackers use RMM tools to steal physical cargo out of the supply chain.

    Read More Hackers Weaponize Remote Tools to Hijack Cargo FreightContinue

  • Blog

    Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

    Cybersecurity researchers have flagged a new malicious extension in the Open VSX registry that harbors a remote access trojan called SleepyDuck. According to Secure Annex’s John Tuckner, the extension in question, juan-bianco.solidity-vlang (version 0.0.7), was first published on October 31, 2025, as a completely benign library that was subsequently updated to version 0.0.8 on November…

    Read More Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server AliveContinue

  • Blog

    Let’s Get Physical: A New Convergence for Electrical Grid Security

    The power grid is being attacked online and IRL. Increasingly, regulators and industry experts agree: Security teams need to focus on both cyber and physical threats, together.

    Read More Let’s Get Physical: A New Convergence for Electrical Grid SecurityContinue

  • Blog

    Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks

    Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and management (RMM) software for financial gain and ultimately steal cargo freight. The threat cluster, believed to be active since at least June 2025 according to Proofpoint, is said to be collaborating with organized…

    Read More Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight NetworksContinue

  • Blog

    ⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

    Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems—some just hours after being found. No system was fully safe. From spying and fake job scams to strong ransomware and tricky phishing, the attacks came from all sides. Even encrypted…

    Read More ⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & MoreContinue

Page navigation

Previous PagePrevious 1 … 116 117 118 119 120 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us