Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

    A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client secrets under certain circumstances. The vulnerability, tracked as CVE-2025-59363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as…

    Read More OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate AppsContinue

  • Blog

    How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

    AI is changing automation—but not always for the better. That’s why we’re hosting a new webinar, “Workflow Clarity: Where AI Fits in Modern Automation,” with Thomas Kinsella, Co-founder & Chief Customer Officer at Tines, to explore how leading teams are cutting through the hype and building workflows that actually deliver.The rise of AI has changed…

    Read More How Leading Security Teams Blend AI + Human Workflows (Free Webinar)Continue

  • Blog

    Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

    A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions. OpenShift AI is a platform for managing the lifecycle of predictive and generative artificial intelligence (GenAI) models at scale and across hybrid cloud environments….

    Read More Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full TakeoverContinue

  • Blog

    Introducing Sophos Advisory Services

    See how your networks, systems, and employees stand up to simulated attacks before an adversary strikes.

    Read More Introducing Sophos Advisory ServicesContinue

  • Blog

    2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

    Bitdefender’s 2025 Cybersecurity Assessment Report paints a sobering picture of today’s cyber defense landscape: mounting pressure to remain silent after breaches, a gap between leadership and frontline teams, and a growing urgency to shrink the enterprise attack surface. The annual research combines insights from over 1,200 IT and security professionals across six countries, along with…

    Read More 2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions RisingContinue

  • Blog

    Hackers Exploit Milesight Routers to Send Phishing SMS to European Users

    Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in European countries since at least February 2022. French cybersecurity company SEKOIA said the attackers are exploiting the cellular router’s API to send malicious SMS messages containing phishing URLs, with the campaigns primarily targeting…

    Read More Hackers Exploit Milesight Routers to Send Phishing SMS to European UsersContinue

  • Blog

    New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones

    A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported in Spain and Italy. Italian fraud prevention firm Cleafy, which discovered the sophisticated malware and remote access trojan (RAT) in late August 2025, said it leverages Hidden Virtual Network Computing (VNC) for remote control of…

    Read More New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected SmartphonesContinue

  • Blog

    Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs

    The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT. The activity, observed in September 2025, has been attributed to a threat cluster it tracks as UAC-0245. The agency said it spotted the attack following the discovery of software tools taking the…

    Read More Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPsContinue

  • Blog

    China Imposes One-Hour Reporting Rule for Major Cyber Incidents

    The sweeping new regulations show that China’s serious about hardening its own networks after launching widespread attacks on global networks.

    Read More China Imposes One-Hour Reporting Rule for Major Cyber IncidentsContinue

  • Blog

    New China APT Strikes With Precision and Persistence

    Phantom Taurus demonstrates a deep understanding of Windows environments, including advanced components like IIServerCore, a fileless backdoor that executes in memory to evade detection.

    Read More New China APT Strikes With Precision and PersistenceContinue

Page navigation

Previous PagePrevious 1 … 146 147 148 149 150 … 415 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us