Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters

    Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serial-to-IP converters from Lantronix and Silex that could be exploited to hijack susceptible devices and tamper with data exchanged by them. The vulnerabilities have been collectively codenamed BRIDGE:BREAK by Forescout Research Vedere Labs, which identified nearly 20,000 Serial-to-Ethernet converters exposed

    Read More 22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP ConvertersContinue

  • Blog

    Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk

    The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to spread ransomware and compromise supply chains.

    Read More Surge in Bomgar RMM Exploitation Demonstrates Supply Chain RiskContinue

  • Blog

    Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

    A third individual who was employed as a ransomware negotiator has pleaded guilty to conducting ransomware attacks against U.S. companies in 2023. Angelo Martino, 41, of Land O’Lakes, Florida, teamed up with the operators of the BlackCat ransomware starting in April 2023 to assist the e-crime gang in extracting higher amounts as ransoms. “Working as…

    Read More Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023Continue

  • Blog

    5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time

    Security teams often present MTTR as an internal KPI. Leadership sees it differently: every hour a threat dwells inside the environment is an hour of potential data exfiltration, service disruption, regulatory exposure, and brand damage.  The root cause of slow MTTR is almost never “not enough analysts.” It is almost always the same structural problem:…

    Read More 5 Places where Mature SOCs Keep MTTR Fast and Others Waste TimeContinue

  • Blog

    Chinese APT Targets Indian Banks, Korean Policy Circles

    China is spying on India’s financial sector, for some reason, and it’s not putting much effort into it, judging by some stale TTPs.

    Read More Chinese APT Targets Indian Banks, Korean Policy CirclesContinue

  • Blog

    No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks

    The cybersecurity industry has spent the last several years chasing sophisticated threats like zero-days, supply chain compromises, and AI-generated exploits. However, the most reliable entry point for attackers still hasn’t changed: stolen credentials. Identity-based attacks remain a dominant initial access vector in breaches today. Attackers obtain valid credentials through credential stuffing

    Read More No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based AttacksContinue

  • Blog

    Google Fixes Critical RCE Flaw in AI-Based Antigravity Tool

    The prompt injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that allowed for sandbox escape and arbitrary code execution.

    Read More Google Fixes Critical RCE Flaw in AI-Based Antigravity ToolContinue

  • Blog

    NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs

    Cybersecurity researchers have discovered a new iteration of an Android malware family calledNGate that has been found to abuse a legitimate application called HandyPay instead of NFCGate. “The threat actors took the app, which is used to relay NFC data, and patched it with malicious code that appears to have been AI-generated,” ESET security researcher Lukáš…

    Read More NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINsContinue

  • Blog

    Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution

    Cybersecurity researchers have discovered a vulnerability in Google’s agentic integrated development environment (IDE), Antigravity, that could be exploited to achieve code execution. The flaw, since patched, combines Antigravity’s permitted file-creation capabilities with an insufficient input sanitization in Antigravity’s native file-searching tool, find_by_name, to bypass the program’s Strict

    Read More Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code ExecutionContinue

  • Blog

    CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including three flaws impacting Cisco Catalyst SD-WAN Manager, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2023-27351 (CVSS score: 8.2) – An improper authentication vulnerability in PaperCut

    Read More CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal DeadlinesContinue

Page navigation

Previous PagePrevious 1 … 12 13 14 15 16 … 458 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us