Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

    Cybersecurity researchers have discovered a previously undocumented data wiper that has been used in attacks targeting Venezuela at the end of last year and the start of 2026. Dubbed Lotus Wiper, the novel file wiper has been used in a destructive campaign targeting the energy and utilities sector in Venezuela, per findings from Kaspersky. “Two…

    Read More Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive AttackContinue

  • Blog

    Toxic Combinations: When Cross-App Permissions Stack into Risk

    On January 31, 2026, researchers disclosed that Moltbook, a social network built for AI agents, had left its database wide open, exposing 35,000 email addresses and 1.5 million agent API tokens across 770,000 active agents. The more worrying part sat inside the private messages. Some of those conversations held plaintext third-party credentials, including OpenAI API…

    Read More Toxic Combinations: When Cross-App Permissions Stack into RiskContinue

  • Blog

    Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug

    Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could allow an attacker to escalate privileges. The vulnerability, tracked as CVE-2026-40372, carries a CVSS score of 9.1 out of 10.0. It’s rated Important in severity. An anonymous researcher has been credited with discovering and reporting the flaw. “Improper verification of…

    Read More Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation BugContinue

  • Blog

    Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

    Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that’s distributed via a theme related to India’s banking sector. “The backdoor communicates with a dynamic DNS-based command-and-control server over HTTPS and supports remote shell access, file operations, and session management, indicating a continued espionage-focused capability set rather than

    Read More Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy CirclesContinue

  • Blog

    Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

    A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code execution. The vulnerability, tracked as CVE-2026-5752, is rated 9.3 on the CVSS scoring system. “Sandbox escape vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal,” according…

    Read More Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container EscapeContinue

  • Blog

    Ransomware Negotiator Pleads Guilty to BlackCat Scheme

    A cautionary tale illustrates why the person negotiating should never be involved with any part of the ransom payment process, experts noted.

    Read More Ransomware Negotiator Pleads Guilty to BlackCat SchemeContinue

  • Blog

    Exploits Turn Windows Defender into Attacker Tool

    Three proof-of-concept exploits are being used in active attacks against Microsoft’s built-in security platform; two are unpatched.

    Read More Exploits Turn Windows Defender into Attacker ToolContinue

  • Blog

    SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

    Threat actors associated with The Gentlemen ransomware‑as‑a‑service (RaaS) operation have been observed attempting to deploy a known proxy malware called SystemBC. According to new research published by Check Point, the command-and-control (C2 or C&C) server linked to SystemBC has led to the discovery of a botnet of more than 1,570 victims. “SystemBC establishes SOCKS5 network…

    Read More SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware OperationContinue

  • Blog

    22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters

    Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serial-to-IP converters from Lantronix and Silex that could be exploited to hijack susceptible devices and tamper with data exchanged by them. The vulnerabilities have been collectively codenamed BRIDGE:BREAK by Forescout Research Vedere Labs, which identified nearly 20,000 Serial-to-Ethernet converters exposed

    Read More 22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP ConvertersContinue

  • Blog

    Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk

    The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to spread ransomware and compromise supply chains.

    Read More Surge in Bomgar RMM Exploitation Demonstrates Supply Chain RiskContinue

Page navigation

Previous PagePrevious 1 … 11 12 13 14 15 … 457 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us