Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events

    Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO) attacks and perform fraudulent transactions by preying on the elderly. Dutch mobile security company ThreatFabric said it discovered the campaign in August 2025 after users in Australia reported scammers managing Facebook groups promoting “active senior

    Read More New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel EventsContinue

  • Blog

    Evolving Enterprise Defense to Secure the Modern AI Supply Chain

    The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors are embedding powerful LLMs directly into their platforms. Organizations are embracing AI-powered applications across every function, from marketing and development to finance and HR. This transformation unlocks innovation and efficiency, but it also

    Read More Evolving Enterprise Defense to Secure the Modern AI Supply ChainContinue

  • Blog

    U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust

    A Chinese national has been convicted for her role in a fraudulent cryptocurrency scheme after law enforcement authorities in the U.K. confiscated £5.5 billion (about $7.39 billion) during a raid of her home in London. The cryptocurrency seizure, amounting to 61,000 Bitcoin, is believed to be the single largest such effort in the world, the…

    Read More U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto BustContinue

  • Blog

    Is your SIEM still serving You? Why it might be time to rethink your security stack

    Security teams are under increasing pressure to detect and respond to threats in real time, especially as the median dwell time for ransomware attacks has dropped from weeks to a few days. Yet many organizations still rely on legacy Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) tools. These tools…

    Read More Is your SIEM still serving You? Why it might be time to rethink your security stackContinue

  • Blog

    AI-Powered Voice Cloning Raises Vishing Risks

    A researcher-developed framework could enable attackers to conduct real-time conversations using simulated audio to compromise organizations and extract sensitive information.

    Read More AI-Powered Voice Cloning Raises Vishing RisksContinue

  • Blog

    CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line utility for Linux and Unix-like operating systems to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability in question is CVE-2025-32463 (CVSS score: 9.3), which affects Sudo versions prior…

    Read More CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix SystemsContinue

  • Blog

    IoT Security Flounders Amid Churning Risk

    The Internet of Things (IoT) has made everything more interconnected than ever, but an important US government security initiative is stuck in limbo even as threat actors step up attacks on everything from medical gear to printers.

    Read More IoT Security Flounders Amid Churning RiskContinue

  • Blog

    Sneaky, Malicious MCP Server Exfiltrates Secrets via BCC

    The first known malicious MCP server is an AI integration tool that automatically sends email such as those related to password resets, account confirmations, security alerts, invoices, and receipts to threat actors.

    Read More Sneaky, Malicious MCP Server Exfiltrates Secrets via BCCContinue

  • Blog

    Akira Hits SonicWall VPNs in Broad Ransomware Campaign

    Akira ransomware actors are currently targeting SonicWall firewall customers vulnerable to a bug discovered last year.

    Read More Akira Hits SonicWall VPNs in Broad Ransomware CampaignContinue

  • Blog

    Sophos named a Leader in the IDC MarketScape™: Worldwide Extended Detection and Response (XDR) Software 2025

    A milestone that reflects our progress.

    Read More Sophos named a Leader in the IDC MarketScape™: Worldwide Extended Detection and Response (XDR) Software 2025Continue

Page navigation

Previous PagePrevious 1 … 148 149 150 151 152 … 415 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us