Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer

    A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That’s according to findings from Infoblox, which found the threat actor to maintain control of domains hosting the first stage of the stealer, a backdoor called StarFish. The DNS threat intelligence firm said it has…

    Read More Detour Dog Caught Running DNS-Powered Malware Factory for Strela StealerContinue

  • Blog

    Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads

    The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated to support the ability to collect device and web browser fingerprints, among others. “Rhadamanthys was initially promoted through posts on cybercrime forums, but soon it…

    Read More Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography PayloadsContinue

  • Blog

    Jaguar Land Rover Shows Cyberattacks Mean (Bad) Business

    The company likely failed to completely clean out attackers from a previous breach and now is a case study for the high cost of ransomware.

    Read More Jaguar Land Rover Shows Cyberattacks Mean (Bad) BusinessContinue

  • Blog

    BCI: The Thing of Nightmare or Dreams?

    Brain computer interface technology looks to provide users with hands-free device control, but could security ever keep up with the risks?

    Read More BCI: The Thing of Nightmare or Dreams?Continue

  • Blog

    Microsoft’s Voice Clone Becomes Scary & Unsalvageable

    An attacker’s dream: Windows Speak for Me could integrate into apps, creating perfect voice replicas for Teams calls and AI agent interactions across multiple SaaS platforms.

    Read More Microsoft’s Voice Clone Becomes Scary & UnsalvageableContinue

  • Blog

    UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft

    A Chinese-language threat actor uses every part of the kill: infecting Web servers with malware, poisoning sites with SEO spam, and stealing organizational data for follow-on attacks.

    Read More UAT-8099 Hijacks Reputable Sites for SEO Fraud & TheftContinue

  • Blog

    Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL

    Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp. The campaign, codenamed SORVEPOTEL by Trend Micro, weaponizes the trust with the platform to extend its reach across Windows systems, adding the attack is “engineered for speed and propagation” rather than data theft or ransomware….

    Read More Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTELContinue

  • Blog

    Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security

    Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity of credential storage and sharing in modern organizations. The platform recently received a major update that reworks all the core mechanics. Passwork 7 introduces significant changes to how credentials are organized, accessed, and managed, reflecting

    Read More Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise SecurityContinue

  • Blog

    New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT

    A threat actor that’s known to share overlaps with a hacking group called YoroTrooper has been observed targeting the Russian public sector with malware families such as FoalShell and StallionRAT. Cybersecurity vendor BI.ZONE is tracking the activity under the moniker Cavalry Werewolf. It’s also assessed to have commonalities with clusters tracked as SturgeonPhisher, Silent Lynx,…

    Read More New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRATContinue

  • Blog

    CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded Meteobridge to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, CVE-2025-4008 (CVSS score: 8.7), is a case of command injection in the Meteobridge web interface that could result in code execution. “

    Read More CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the WildContinue

Page navigation

Previous PagePrevious 1 … 143 144 145 146 147 … 415 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us