Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

    An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. “This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the…

    Read More LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP PacketsContinue

  • Blog

    Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform

    Scaling the SOC with AI – Why now?  Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960 alerts per day, while large enterprises manage more than 3,000 alerts daily from an average of 28 different tools. Nearly 40% of those alerts go…

    Read More Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC PlatformContinue

  • Blog

    Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks

    Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the…

    Read More Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ AttacksContinue

  • Blog

    Beware the Hidden Costs of Pen Testing

    Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and money – while producing inferior results.  The benefits of pen testing are clear. By empowering “white hat” hackers to attempt to breach your system using…

    Read More Beware the Hidden Costs of Pen TestingContinue

  • Blog

    ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More

    The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn everyday technology into a weapon. Tools made to help us work, connect, and stay safe are now being used to steal, spy, and deceive. Hackers don’t always break systems anymore — they use them. They…

    Read More ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & MoreContinue

  • Blog

    RediShell RCE Vulnerability

    What is the Vulnerability? A Use-After-Free (UAF) bug in Redis’s Lua scripting subsystem (tracked as CVE-2025-49844, “RediShell”) allows an authenticated attacker who can run Lua scripts to escape the Lua sandbox and achieve arbitrary native code execution on the Redis host. This is a critical (CVSS 10.0), high-impact vulnerability because Lua scripting is enabled by…

    Read More RediShell RCE VulnerabilityContinue

  • Blog

    CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Adobe Experience Manager to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-54253 (CVSS score: 10.0), a maximum-severity misconfiguration bug that could result in arbitrary code execution.

    Read More CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active AttackContinue

  • Blog

    LevelBlue Announces Plans to Acquire XDR Provider Cybereason

    The deal, which builds on LevelBlue’s recent acquisition of Trustwave and Aon, aims to provide customers with a broad portfolio of extended detection and response (XDR), managed detection and response (MDR), and forensic services.

    Read More LevelBlue Announces Plans to Acquire XDR Provider CybereasonContinue

  • Blog

    ‘Mysterious Elephant’ Moves Beyond Recycled Malware

    The cyber-espionage group has been using sophisticated custom tools to target government and diplomatic entities in South Asia since early 2025.

    Read More ‘Mysterious Elephant’ Moves Beyond Recycled MalwareContinue

  • Blog

    F5 BIG-IP Environment Breached by Nation-State Actor

    F5 disclosed a breach this week that included zero-day bugs, source code, and some customer information.

    Read More F5 BIG-IP Environment Breached by Nation-State ActorContinue

Page navigation

Previous PagePrevious 1 … 132 133 134 135 136 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us