Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

    Google on Monday released security updates for its Chrome browser to address two security flaws, including one that has come under active exploitation in the wild. The vulnerability in question is CVE-2025-13223 (CVSS score: 8.8), a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could be exploited to achieve arbitrary code execution…

    Read More Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day VulnerabilityContinue

  • Blog

    Critical Fortinet FortiWeb WAF Bug Exploited in the Wild

    The vulnerability could allow an unauthenticated attacker to remotely execute administrative commands.

    Read More Critical Fortinet FortiWeb WAF Bug Exploited in the WildContinue

  • Blog

    US Citizens Plead Guilty to Aiding North Korean IT Worker Campaigns

    Four individuals admitted to assisting foreign IT workers in gaining employment at US companies by providing false identities and remote access to employer-owned laptops.

    Read More US Citizens Plead Guilty to Aiding North Korean IT Worker CampaignsContinue

  • Blog

    New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

    Cybersecurity researchers have discovered malware campaigns using the now-prevalent ClickFix social engineering tactic to deploy Amatera Stealer and NetSupport RAT. The activity, observed this month, is being tracked by eSentire under the moniker EVALUSION. First spotted in June 2025, Amatera is assessed to be an evolution of ACR (short for “AcridRain”) Stealer, which was available…

    Read More New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RATContinue

  • Blog

    Cursor Issue Paves Way for Credential-Stealing Attacks

    Researchers discovered a security weakness in the AI-powered coding tool that allows malicious MCP server to hijack Cursor’s internal browser.

    Read More Cursor Issue Paves Way for Credential-Stealing AttacksContinue

  • Blog

    ⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More

    This week showed just how fast things can go wrong when no one’s watching. Some attacks were silent and sneaky. Others used tools we trust every day — like AI, VPNs, or app stores — to cause damage without setting off alarms. It’s not just about hacking anymore. Criminals are building systems to make money,…

    Read More ⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & MoreContinue

  • Blog

    5 Reasons Why Attackers Are Phishing Over LinkedIn

    Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social media, search engines, and messaging apps. LinkedIn in particular has become a hotbed for phishing attacks, and for good reason. Attackers are running sophisticated spear-phishing attacks against company executives, with recent…

    Read More 5 Reasons Why Attackers Are Phishing Over LinkedInContinue

  • Blog

    Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

    The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codenamed RONINGLOADER to deliver a modified variant of a remote access trojan called Gh0st RAT. The campaign, which is primarily aimed at Chinese-speaking users, employs trojanized NSIS installers masquerading as legitimate like Google Chrome and Microsoft Teams, according to…

    Read More Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RATContinue

  • Blog

    Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time

    Google has disclosed that the company’s continued adoption of the Rust programming language in Android has resulted in the number of memory safety vulnerabilities falling below 20% for the first time. “We adopted Rust for its security and are seeing a 1000x reduction in memory safety vulnerability density compared to Android’s C and C++ code….

    Read More Rust Adoption Drives Android Memory Safety Bugs Below 20% for First TimeContinue

  • Blog

    RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

    The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could allow attackers to achieve arbitrary code execution. The vulnerability in question is CVE-2025-24893 (CVSS score: 9.8), an eval injection bug that could allow any guest user to perform arbitrary remote code execution through a request…

    Read More RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its BotnetContinue

Page navigation

Previous PagePrevious 1 … 10 11 12 13 14 … 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us