Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

    You can’t control when the next critical vulnerability drops. You can control how much of your environment is exposed when it does. The problem is that most teams have more internet-facing exposure than they realise. Intruder’s Head of Security digs into why this happens and how teams can manage it deliberately. Time-to-exploit is shrinking The…

    Read More The Zero-Day Scramble is Avoidable: A Guide to Attack Surface ReductionContinue

  • Blog

    APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

    The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to facilitate long‑term surveillance of Ukrainian military personnel. The two malware families have been put to use since April 2024, ESET said in a new report shared with The Hacker News. APT28, also tracked as…

    Read More APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian MilitaryContinue

  • Blog

    Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

    Salesforce has warned of an increase in threat actor activity that’s aimed at exploiting misconfigurations in publicly accessible Experience Cloud sites by making use of a customized version of an open-source tool called AuraInspector. The activity, per the company, involves the exploitation of customers’ overly permissive Experience Cloud guest user configurations to obtain access to…

    Read More Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector ToolContinue

  • Blog

    CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability list is as follows – CVE-2021-22054 (CVSS score: 7.5) – A server-side request forgery (SSRF) vulnerability in Omnissa Workspace One UEM (formerly VMware Workspace One UEM)…

    Read More CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively ExploitedContinue

  • Blog

    White House Cyber Strategy Prioritizes Offense

    In a seven-page strategy document, the Trump administration signaled a shift to preemption and deterrence to handling cyber threats.

    Read More White House Cyber Strategy Prioritizes OffenseContinue

  • Blog

    ‘InstallFix’ Attacks Spread Fake Claude Code Sites

    A fresh cyberattack campaign blends malvertising with a ClickFix-style technique that highlights risky behavior with AI coding assistants and command-line interfaces.

    Read More ‘InstallFix’ Attacks Spread Fake Claude Code SitesContinue

  • Blog

    Are We Ready for Auto Remediation With Agentic AI?

    With the rapid innovations in AI, we are entering an exciting era of automated risk remediation. Learn about security team readiness to leverage agentic AI for threat and exposure management.

    Read More Are We Ready for Auto Remediation With Agentic AI?Continue

  • Blog

    Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

    Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote access trojan (RAT) and steal sensitive data from compromised hosts. The package, named “@openclaw-ai/openclawai,” was uploaded to the registry by a user named “openclaw-ai” on March 3, 2026. It has been downloaded 178 times to date. The…

    Read More Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS CredentialsContinue

  • Blog

    Outbreak Alert- Annual Report 2025

    In 2025, the FortiGuard Labs team processed and blocked 3.8 trillion vulnerability exploitation attempts, preventing 2.71 billion malware deliveries, and blocking 257 million newly seen malware variants worldwide to protect its customers from cyber threats. Through the outbreak alert system, FortiGuard Labs escalated the significant threats to raise awareness and keep customers informed.

    Read More Outbreak Alert- Annual Report 2025Continue

  • Blog

    UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

    The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign targeting a cryptocurrency organization in 2025 to steal millions of dollars in cryptocurrency. The activity has been attributed with moderate confidence to the state-sponsored adversary, which is also tracked under the cryptonyms Jade Sleet, PUKCHONG, Slow Pisces,…

    Read More UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work DeviceContinue

Page navigation

Previous PagePrevious 1 … 10 11 12 13 14 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us