Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Case Study: University of West England uses Sophos solutions to protect thousands of students across multiple campuses

    As higher education institutions come under fire from threat actors, 24/7 vigilance is key

    Read More Case Study: University of West England uses Sophos solutions to protect thousands of students across multiple campusesContinue

  • Blog

    Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain

    Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to exfiltrate users’ seed phrases. The name of the extension is “Safery: Ethereum Wallet,” with the threat actor describing it as a “secure wallet for managing Ethereum cryptocurrency with flexible settings.” It was uploaded to the Chrome…

    Read More Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui BlockchainContinue

  • Blog

    When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security

    The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit code weaponized within 48 hours. Using the CISA Known Exploited Vulnerabilities Catalog as a reference, hundreds of software flaws are now confirmed as actively targeted within days of public disclosure. Each new…

    Read More When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed SecurityContinue

  • Blog

    Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown

    Malware families like Rhadamanthys Stealer, Venom RAT, and the Elysium botnet have been disrupted as part of a coordinated law enforcement operation led by Europol and Eurojust. The activity, which is taking place between November 10 and 13, 2025, marks the latest phase of Operation Endgame, an ongoing operation designed to take down criminal infrastructures…

    Read More Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global CrackdownContinue

  • Blog

    ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories

    Behind every click, there’s a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting smarter, using new tools to sneak past filters and turn trusted systems against us. But security teams are fighting back. They’re building faster defenses, better ways to spot attacks, and stronger…

    Read More ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More StoriesContinue

  • Blog

    Akira Ransomware

    FortiGuard Labs continue to observe detections in the wild related to the Akira ransomware group. According to the new report by CISA it has targeted over 250 organizations since the past year, affecting numerous businesses and critical infrastructure entities across North America, Europe, and Australia. The gang has made over $42 million from the attacks…

    Read More Akira RansomwareContinue

  • Blog

    CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting WatchGuard Fireware to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-9242 (CVSS score: 9.3), an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 up to and including

    Read More CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login AttacksContinue

  • Blog

    Kenya Kicks Off ‘Code Nation’ With a Nod to Cybersecurity

    The African country aims to train 1 million workers in tech skills in the short term, with a focus on software engineering, cybersecurity, and data science.

    Read More Kenya Kicks Off ‘Code Nation’ With a Nod to CybersecurityContinue

  • Blog

    Over 46,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack

    Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake packages since early 2024 as part of a likely financially motivated effort. “The packages were systematically published over an extended period, flooding the npm registry with junk packages that survived in the ecosystem for almost…

    Read More Over 46,000 Fake npm Packages Flood Registry in Worm-Like Spam AttackContinue

  • Blog

    November Patch Tuesday does its chores

    A cleanup month brings 63 patches… wait, no, 68… how about 61?

    Read More November Patch Tuesday does its choresContinue

Page navigation

Previous PagePrevious 1 … 13 14 15 16 17 … 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us