Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control

    Cybersecurity researchers have disclosed two critical security flaws impacting Red Lion Sixnet remote terminal unit (RTU) products that, if successfully exploited, could result in code execution with the highest privileges. The shortcomings, tracked as CVE-2023-40151 and CVE-2023-42770, are both rated 10.0 on the CVSS scoring system. “The vulnerabilities affect Red Lion SixTRAK and VersaTRAK

    Read More Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial ControlContinue

  • Blog

    Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access

    Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2025-2611 (CVSS score: 9.3), relates to improper input validation that can result in unauthenticated remote code execution due to the fact that the call…

    Read More Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell AccessContinue

  • Blog

    New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login

    SAP has rolled out security fixes for 13 new security issues, including additional hardening for a maximum-severity bug in SAP NetWeaver AS Java that could result in arbitrary command execution. The vulnerability, tracked as CVE-2025-42944, carries a CVSS score of 10.0. It has been described as a case of insecure deserialization. “Due to a deserialization…

    Read More New SAP NetWeaver Bug Lets Attackers Take Over Servers Without LoginContinue

  • Blog

    Microsoft Drops Terrifyingly Large October Patch Update

    October 2025’s enormous Patch Tuesday offers plenty of nightmares for admins, including actively exploited zero-days and insidious high-severity privilege-escalation bugs — and it spells curtains for Windows 10 updates.

    Read More Microsoft Drops Terrifyingly Large October Patch UpdateContinue

  • Blog

    China’s Flax Typhoon Turns Geo-Mapping Server into a Backdoor

    Chinese APT threat actors compromised an organization’s ArcGIS server, modifying the widely used geospatial mapping software for stealth access.

    Read More China’s Flax Typhoon Turns Geo-Mapping Server into a BackdoorContinue

  • Blog

    Pixnapping Attack Lets Attackers Steal 2FA on Android

    The proof-of-concept exploit allows an attacker to steal sensitive data from Gmail, Google Accounts, Google Authenticator, Google Maps, Signal, and Venmo.

    Read More Pixnapping Attack Lets Attackers Steal 2FA on AndroidContinue

  • Blog

    Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

    Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored hacking group called Flax Typhoon, which is also tracked as Ethereal Panda and RedJuliett. According…

    Read More Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a YearContinue

  • Blog

    Shift left, stay ahead: The case for early threat prevention

    “‘Shift left’ is a very trendy concept over the past few years [in application security]. The weird thing is, prevention is seen as something that’s kind of old school in endpoint security or security operations.”

    Read More Shift left, stay ahead: The case for early threat preventionContinue

  • Blog

    Moving Beyond Awareness: How Threat Hunting Builds Readiness

    Every October brings a familiar rhythm – pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween may be just around the corner, yet for those of us in cybersecurity, Security Awareness Month is the true seasonal milestone. Make no mistake, as a security professional, I love…

    Read More Moving Beyond Awareness: How Threat Hunting Builds ReadinessContinue

  • Blog

    RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing

    Chipmaker AMD has released fixes to address a security flaw dubbed RMPocalypse that could be exploited to undermine confidential computing guarantees provided by Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). The attack, per ETH Zürich researchers Benedict Schlüter and Shweta Shinde, exploits AMD’s incomplete protections that make it possible to perform a single memory

    Read More RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential ComputingContinue

Page navigation

Previous PagePrevious 1 … 134 135 136 137 138 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us