Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats

    A China-affiliated threat actor known as UNC6384 has been linked to a fresh set of attacks exploiting an unpatched Windows shortcut vulnerability to target European diplomatic and government entities between September and October 2025. The activity targeted diplomatic organizations in Hungary, Belgium, Italy, and the Netherlands, as well as government agencies in Serbia, Arctic Wolf…

    Read More China-Linked Hackers Exploit Windows Shortcut Flaw to Target European DiplomatsContinue

  • Blog

    China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems

    The exploitation of a recently disclosed critical security flaw in Motex Lanscope Endpoint Manager has been attributed to a cyber espionage group known as Tick. The vulnerability, tracked as CVE-2025-61932 (CVSS score: 9.3), allows remote attackers to execute arbitrary commands with SYSTEM privileges on on-premise versions of the program. JPCERT/CC, in an alert issued this…

    Read More China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate SystemsContinue

  • Blog

    The MSP Cybersecurity Readiness Guide: Turning Security into Growth

    MSPs are facing rising client expectations for strong cybersecurity and compliance outcomes, while threats grow more complex and regulatory demands evolve. Meanwhile, clients are increasingly seeking comprehensive protection without taking on the burden of managing security themselves. This shift represents a major growth opportunity. By delivering advanced cybersecurity and compliance

    Read More The MSP Cybersecurity Readiness Guide: Turning Security into GrowthContinue

  • Blog

    Phake phishing: Phundamental or pholly?

    Debates over the effectiveness of phishing simulations are widespread. Sophos X-Ops looks at the arguments for and against – and our own phishing philosophy

    Read More Phake phishing: Phundamental or pholly?Continue

  • Blog

    Cyber’s Role in the Rapid Rise of Digital Authoritarianism

    Dark Reading Confidential Episode 11: Enterprise cyber teams are in prime position to push back against our current “Golden Age of Surveillance,” according to our guests Ronald Deibert from Citizen Lab and David Greene from the EFF.

    Read More Cyber’s Role in the Rapid Rise of Digital AuthoritarianismContinue

  • Blog

    CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), along with international partners from Australia and Canada, have released guidance to harden on-premise Microsoft Exchange Server instances from potential exploitation. “By restricting administrative access, implementing multi-factor authentication, enforcing strict transport security

    Read More CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange ServersContinue

  • Blog

    Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

    Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken steps to revoke a small number of tokens that were leaked within Visual Studio Code (VS Code) extensions published in the marketplace. The action comes following a report from cloud security company Wiz earlier this month, which found several extensions from both…

    Read More Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz DiscoveryContinue

  • Blog

    CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Broadcom VMware Tools and VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild. The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), which could be exploited by an attacker to…

    Read More CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active AttacksContinue

  • Blog

    A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do

    A design firm is editing a new campaign video on a MacBook Pro. The creative director opens a collaboration app that quietly requests microphone and camera permissions. MacOS is supposed to flag that, but in this case, the checks are loose. The app gets access anyway. On another Mac in the same office, file sharing…

    Read More A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers DoContinue

  • Blog

    Zombie Projects Rise Again to Undermine Security

    Companies left them for dead, but the remnants of old infrastructure and failed projects continue to haunt businesses’ security teams.

    Read More Zombie Projects Rise Again to Undermine SecurityContinue

Page navigation

Previous PagePrevious 1 … 118 119 120 121 122 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us