Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    WhatsApp Worm Targets Brazilian Banking Customers

    Counter Threat Unit™ (CTU) researchers are investigating multiple incidents in an ongoing campaign targeting users of the WhatsApp messaging platform. The campaign, which started on September 29, 2025, is focused on Brazil and seeks to trick users into executing a malicious file attached to a self-spreading message received from a previously infected WhatsApp web session….

    Read More WhatsApp Worm Targets Brazilian Banking CustomersContinue

  • Blog

    Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks

    In a new wrinkle for adversary tactics, the Storm-2603 threat group is abusing the digital forensics and incident response (DFIR) tool to gain persistent access to victim networks.

    Read More Chinese Hackers Use Velociraptor IR Tool in Ransomware AttacksContinue

  • Blog

    Microsoft Adds Agentic AI Capabilities to Sentinel

    Microsoft previewed the Sentinel security graph and MCP server at its annual Microsoft Secure virtual event earlier this month.

    Read More Microsoft Adds Agentic AI Capabilities to SentinelContinue

  • Blog

    Deepfake Awareness High at Orgs, But Cyber Defenses Badly Lag

    The vast majority of organizations are encountering AI-augmented threats, but remain confident in their defenses, despite inadequate detection investment and more than half falling to successful attacks.

    Read More Deepfake Awareness High at Orgs, But Cyber Defenses Badly LagContinue

  • Blog

    Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

    Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js’ Single Executable Application (SEA) feature as a way to distribute its payloads. According to Fortinet FortiGuard Labs, select iterations have also employed the open-source Electron framework to deliver the malware. It’s assessed that the malware is being propagated through

    Read More Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN InstallersContinue

  • Blog

    Commentary Section Launches New, More Opinionated Era

    Dark Reading is looking for leading industry experts with a point of view they want to share with the rest of the cybersecurity community for our new Commentary section.

    Read More Commentary Section Launches New, More Opinionated EraContinue

  • Blog

    Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries

    A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of diverting salary payments to attacker-controlled accounts. “Storm-2657 is actively targeting a range of U.S.-based organizations, particularly employees in sectors like higher education, to gain access to third-party human resources (HR) software as a service (SaaS) platforms like Workday,”…

    Read More Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee SalariesContinue

  • Blog

    From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

    Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that’s assessed to have come under active exploitation since at least September 11, 2025. The company said it began its investigation on September 11 following a “potential vulnerability” reported by a customer, uncovering “potentially…

    Read More From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 ExploitationContinue

  • Blog

    The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?

    The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and velocity, a new generation of AI-powered agents is reshaping how Security Operations Centers (SOCs) detect, respond, and adapt. But not all AI SOC platforms are created equal. From prompt-dependent copilots to autonomous, multi-agent systems, the…

    Read More The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?Continue

  • Blog

    175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign

    Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential harvesting attacks as part of an unusual campaign. The packages have been collectively downloaded 26,000 times, acting as an infrastructure for a widespread phishing campaign codenamed Beamglea targeting more than 135 industrial, technology,…

    Read More 175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing CampaignContinue

Page navigation

Previous PagePrevious 1 … 137 138 139 140 141 … 415 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us