Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies

    The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty to assisting North Korea’s illicit revenue generation schemes by enabling information technology (IT) worker fraud in violation of international sanctions. The five individuals are listed below – Audricus Phagnasay, 24 Jason Salazar, 30 Alexander Paul Travis, 34 Oleksandr Didenko, 28,…

    Read More Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 CompaniesContinue

  • Blog

    Akira RaaS Targets Nutanix VMs, Threatens Critical Orgs

    The Akira ransomware group has been experimenting with new tools, bugs, and attack surfaces, with demonstrated success in significant sectors.

    Read More Akira RaaS Targets Nutanix VMs, Threatens Critical OrgsContinue

  • Blog

    New Security Tools Target Growing macOS Threats

    A public dataset and platform-agnostic analysis tool aim to help organizations in the fight against Apple-targeted malware, which researchers say has lacked proper attention.

    Read More New Security Tools Target Growing macOS ThreatsContinue

  • Blog

    Hardened Containers Look to Eliminate Common Source of Vulnerabilities

    A kitchen-sink approach to building containers has loaded many with vulnerabilities. A handful of companies are trying to slim them down to address the issue.

    Read More Hardened Containers Look to Eliminate Common Source of VulnerabilitiesContinue

  • Blog

    150,000 Packages Flood NPM Registry in Token Farming Campaign

    A self-replicating attack led to a tidal wave of malicious packages in the NPM registry, targeting tokens for the tea.xyz protocol.

    Read More 150,000 Packages Flood NPM Registry in Token Farming CampaignContinue

  • Blog

    North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

    The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads. “The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to host and deliver malware from trojanized code projects, with the lure,” NVISO…

    Read More North Korean Hackers Turn JSON Services into Covert Malware Delivery ChannelsContinue

  • Blog

    Shadow Program Gives AWS Exec New Security Lens

    Sara Duffer highlights the top lessons she brought back to her security role following three years in Amazon’s shadow program.

    Read More Shadow Program Gives AWS Exec New Security LensContinue

  • Blog

    Identity Governance and Administration, App Proliferation, and the App Integration Chasm

    Most enterprises use more than 1,000 apps, according to ESG research, yet about half are integrated with IGA. Industry innovations enable teams to expand app coverage and get more IGA value.

    Read More Identity Governance and Administration, App Proliferation, and the App Integration ChasmContinue

  • Blog

    Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

    Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta, Nvidia, Microsoft, and open-source PyTorch projects such as vLLM and SGLang. “These vulnerabilities all traced back to the same root cause: the overlooked unsafe use of ZeroMQ (ZMQ) and Python’s pickle deserialization,”

    Read More Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference FrameworksContinue

  • Blog

    Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets

    The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the Islamic Revolutionary Guard Corps (IRGC) as part of a new espionage-focused campaign. The activity, detected in early September 2025 and assessed to be ongoing, has been codenamed SpearSpecter by the Israel National Digital Agency (INDA)….

    Read More Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government TargetsContinue

Page navigation

Previous PagePrevious 1 … 11 12 13 14 15 … 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us