Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on Ukraine

    Russian hackers’ adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the first half of 2025 (H1 2025), the country’s State Service for Special Communications and Information Protection (SSSCIP) said. “Hackers now employ it not only to generate phishing messages, but some of the malware samples we have…

    Read More From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on UkraineContinue

  • Blog

    Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme

    Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain unauthorized access to any account, including administrators, and take control of susceptible sites. The authentication bypass vulnerability, tracked as CVE-2025-5947 (CVSS score: 9.8), affects the Service Finder Bookings, a WordPress plugin bundled with the

    Read More Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder ThemeContinue

  • Blog

    Vampire Bot Malware Sinks Fangs Into Job Hunters

    The campaign is the latest by BatShadow, one of a growing number of cybercrime groups operating out of Vietnam.

    Read More Vampire Bot Malware Sinks Fangs Into Job HuntersContinue

  • Blog

    Red Hat Hackers Team Up With Scattered Lapsus$ Hunters

    Crimson Collective, which recently breached the GitLab instance of Red Hat Consulting, has teamed up with the notorious cybercriminal collective.

    Read More Red Hat Hackers Team Up With Scattered Lapsus$ HuntersContinue

  • Blog

    3 Extortion Gangs Join Forces in Ransomware ‘Cartel’

    LockBit, Qilin, and DragonForce also invited other attackers to join their collaboration to share attack information and resources.

    Read More 3 Extortion Gangs Join Forces in Ransomware ‘Cartel’Continue

  • Blog

    The State of Ransomware in Healthcare 2025

    292 IT and cybersecurity leaders reveal the ransomware realities for healthcare establishments today.

    Read More The State of Ransomware in Healthcare 2025Continue

  • Blog

    Figma MCP Server Opens Orgs to Agentic AI Compromise

    Patch now: A bug (CVE-2025-53967) in the popular Web design tool’s option for talking to agentic AI can lead to remote code execution (RCE).

    Read More Figma MCP Server Opens Orgs to Agentic AI CompromiseContinue

  • Blog

    Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks

    Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that are designed to redirect users to sketchy sites. “Site visitors get injected content that was drive-by malware like fake Cloudflare verification,” Sucuri researcher Puja Srivastava said in an analysis published last week. The website security company

    Read More Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing AttacksContinue

  • Blog

    China-Nexus Actors Weaponize ‘Nezha’ Open Source Tool

    A threat actor is putting a spin on classic remote monitoring and management (RMM) attacks, using a Chinese open source tool instead.

    Read More China-Nexus Actors Weaponize ‘Nezha’ Open Source ToolContinue

  • Blog

    Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave

    Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it to deliver a known malware called Gh0st RAT to targets. The activity, observed by cybersecurity company Huntress in August 2025, is characterized by the use of an unusual technique called log poisoning (aka…

    Read More Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack WaveContinue

Page navigation

Previous PagePrevious 1 … 139 140 141 142 143 … 415 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us