Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    ‘Zealot’ Shows What AI’s Capable of in Staged Cloud Attack

    The proof of concept revealed AI-based attacks unfold too fast for human defenders to respond, and that AI evinced more autonomous behavior than expected.

    Read More ‘Zealot’ Shows What AI’s Capable of in Staged Cloud AttackContinue

  • Blog

    China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

    Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. “The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors in its arsenal,” Slovakian cybersecurity company ESET said in a report shared…

    Read More China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go BackdoorsContinue

  • Blog

    Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

    Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal systems. The company said it made the discovery after expanding its investigation to include an extra set of compromise indicators, alongside a review of requests…

    Read More Vercel Finds More Compromised Accounts in Context.ai-Linked BreachContinue

  • Blog

    Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case

    Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device. The vulnerability, tracked as CVE-2026-28950 (CVSS score: N/A), has been described as a logging issue that has been addressed with improved data redaction. “Notifications marked for deletion could be…

    Read More Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic CaseContinue

  • Blog

    Africa Relinquishes Cyberattack Lead to Latin America — For Now

    The volume of cyberattacks targeting Africa declined in the past year, with weekly attacks down 22%, as attackers seemingly shifted their focus to other regions.

    Read More Africa Relinquishes Cyberattack Lead to Latin America — For NowContinue

  • Blog

    ‘The Gentlemen’ Rapidly Rises to Ransomware Prominence

    Not nearly as polite as the name suggests, the ransomware gang has impressed researchers with its speed in scaling up operations — and its sophistication.

    Read More ‘The Gentlemen’ Rapidly Rises to Ransomware ProminenceContinue

  • Blog

    Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

    Cybersecurity researchers have warned of malicious images pushed to the official “checkmarx/kics” Docker Hub repository. In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official…

    Read More Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply ChainContinue

  • Blog

    Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens

    Cybersecurity researchers have flagged a fresh set of packages that have been compromised by bad actors to deliver a self-propagating worm that spreads through stolen developer npm tokens. The supply chain worm has been detected by both Socket and StepSecurity, with the companies tracking the activity under the name CanisterSprawl owing to the use of…

    Read More Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer TokensContinue

  • Blog

    Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

    The threat actor known as Harvester has been attributed to a new Linux version of its GoGra backdoor deployed as part of attacks likely targeting entities in South Asia. “The malware uses the legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control (C2) channel, allowing it to bypass traditional perimeter network defenses,” the…

    Read More Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph APIContinue

  • Blog

    DPRK Fake Job Scams Self-Propagate in ‘Contagious Interview’

    A compromised developer’s repository serves as a worm-like infection vector to spread remote access Trojans (RATs) and other malware.

    Read More DPRK Fake Job Scams Self-Propagate in ‘Contagious Interview’Continue

Page navigation

Previous PagePrevious 1 … 10 11 12 13 14 … 457 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us