Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor

    Microsoft said it has revamped the Internet Explorer (IE) mode in its Edge browser after receiving “credible reports” in August 2025 that unknown threat actors were abusing the backward compatibility feature to gain unauthorized access to users’ devices. “Threat actors were leveraging basic social engineering techniques alongside unpatched (0-day) exploits in Internet Explorer’s JavaScript

    Read More Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into BackdoorContinue

  • Blog

    Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

    Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs GitHub as a backbone for its operations to stay resilient in the face of infrastructure takedowns. “Instead of relying solely on traditional command-and-control (C2) servers that can be taken down, these attackers are leveraging GitHub repositories to host…

    Read More Astaroth Banking Trojan Abuses GitHub to Remain Operational After TakedownsContinue

  • Blog

    New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

    Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct reconnaissance and execute arbitrary commands on compromised hosts. “Threat actors leveraged compromised credentials that mapped to both Cisco VPN and an over-privileged Active Directory account named, ‘serviceaccount,’” eSentire said in a technical report published

    Read More New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCsContinue

  • Blog

    New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login

    Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite that it said could allow unauthorized access to sensitive data. The vulnerability, tracked as CVE-2025-61884, carries a CVSS score of 7.5, indicating high severity. It affects versions from 12.2.3 through 12.2.14. “Easily exploitable vulnerability allows an unauthenticated attacker…

    Read More New Oracle E-Business Suite Bug Could Let Hackers Access Data Without LoginContinue

  • Blog

    Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts

    Cybersecurity company Huntress on Friday warned of “widespread compromise” of SonicWall SSL VPN devices to access multiple customer environments. “Threat actors are authenticating into multiple accounts rapidly across compromised devices,” it said. “The speed and scale of these attacks imply that the attackers appear to control valid credentials rather than brute-forcing.” A significant chunk of

    Read More Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 AccountsContinue

  • Blog

    Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

    Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection with ransomware attacks likely orchestrated by Storm-2603 (aka CL-CRI-1040 or Gold Salem), which is known for deploying the Warlock and LockBit ransomware. The threat actor’s use of the security utility was documented by Sophos last month. It’s assessed that…

    Read More Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware AttacksContinue

  • Blog

    1Password Addresses Critical AI Browser Agent Security Gap

    The security company looks to tackle new authentication challenges that could lead to credential leakage, as enterprises increasingly leverage AI browser agents.

    Read More 1Password Addresses Critical AI Browser Agent Security GapContinue

  • Blog

    RondoDox Botnet: an ‘Exploit Shotgun’ for Edge Vulns

    RondoDox takes a hit-and-run, shotgun approach to exploiting bugs in consumer edge devices around the world.

    Read More RondoDox Botnet: an ‘Exploit Shotgun’ for Edge VulnsContinue

  • Blog

    The Fight Against Ransomware Heats Up on the Factory Floor

    Ransomware gangs continue to set their sights on the manufacturing industry, but companies are taking steps to protect themselves, starting with implementing timely patch management protocols.

    Read More The Fight Against Ransomware Heats Up on the Factory FloorContinue

  • Blog

    Feds Shutter ShinyHunters Salesforce Extortion Site

    The group warned that law-enforcement crackdowns are imminent in the wake of the takedown, but its extortion threats against Salesforce victims remain active.

    Read More Feds Shutter ShinyHunters Salesforce Extortion SiteContinue

Page navigation

Previous PagePrevious 1 … 136 137 138 139 140 … 415 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us