Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    BRICKSTORM Espionage Campaign

    What is the Attack? BRICKSTORM is a stealthy, Go-based backdoor deployed by the China-nexus actor UNC5221, enabling long-term persistence and espionage via compromised network appliances in US organizations. Since March 2025, GTIG (Google Threat Intelligence Group) and Mandiant have tracked BRICKSTORM activity impacting legal services, SaaS, BPO, and technology firms. The campaign suggests objectives beyond…

    Read More BRICKSTORM Espionage CampaignContinue

  • Blog

    Genesis Market Malware Attack

    What is the attack? The FortiGuard Lab’s EDR team recently identified malware infection exhibiting strong similarities to the previously reported Genesis Market malicious campaign that was dismantled by law enforcement in early 2023. The investigation traced some initial compromises to tools used for circumventing software licensing and counterfeit GPG MSI installers embedded with PowerShell scripts….

    Read More Genesis Market Malware AttackContinue

  • Blog

    There Are More CVEs, But Cyber Insurers Aren’t Altering Policies

    With nearly 47,000 CVEs expected by the end of the year, organizations must balance comprehensive vulnerability management with strategic cyber insurance policy selection to effectively navigate this rapidly evolving threat landscape.

    Read More There Are More CVEs, But Cyber Insurers Aren’t Altering PoliciesContinue

  • Blog

    For One NFL Team, Tackling Cyber Threats Is Basic Defense

    The NFL’s cyberattack surface is expanding at an unprecedented rate. To find out more, we spoke with a cyber defense coordinator from the Cleveland Browns.

    Read More For One NFL Team, Tackling Cyber Threats Is Basic DefenseContinue

  • Blog

    Red Hat Investigates Widespread Breach of Private GitLab Repositories

    A threat actor claimed 28,000 private repositories had been compromised, and the Linux software maker said it had “initiated necessary remediation steps.”

    Read More Red Hat Investigates Widespread Breach of Private GitLab RepositoriesContinue

  • Blog

    Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

    The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like WooperStealer and Anondoor. “Over the past decade, Confucius has repeatedly targeted government agencies, military organizations, defense contractors, and critical industries — especially in Pakistan – using spear-phishing and malicious documents as initial

    Read More Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor MalwareContinue

  • Blog

    Phishing Is Moving From Email to Mobile. Is Your Security?

    With SMS, voice, and QR-code phishing incidents on the rise, it’s time to take a closer look at securing the mobile user.

    Read More Phishing Is Moving From Email to Mobile. Is Your Security?Continue

  • Blog

    Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

    Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to create a SOCKS5 proxy service, while also providing a stealthy backdoor-like functionality to drop additional payloads on Windows systems. The deceptive package, named soopsocks, attracted a total of 2,653 downloads before it was taken…

    Read More Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before TakedownContinue

  • Blog

    ‘Confucius’ Cyberspy Evolves From Stealers to Backdoors in Pakistan

    The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware.

    Read More ‘Confucius’ Cyberspy Evolves From Stealers to Backdoors in PakistanContinue

  • Blog

    Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

    Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of these results. The way results are delivered hasn’t kept up with today’s fast-moving threat landscape. Too often, findings are packaged into static reports, buried in PDFs or spreadsheets, and handed…

    Read More Automating Pentest Delivery: 7 Key Workflows for Maximum ImpactContinue

Page navigation

Previous PagePrevious 1 … 144 145 146 147 148 … 415 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us