Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations

    Threat actors have been observed using seemingly legitimate artificial intelligence (AI) tools and software to sneakily slip malware for future attacks on organizations worldwide. According to Trend Micro, the campaign is using productivity or AI-enhanced tools to deliver malware targeting various regions, including Europe, the Americas, and the Asia, Middle East, and Africa (AMEA) region.

    Read More EvilAI Malware Masquerades as AI Tools to Infiltrate Global OrganizationsContinue

  • Blog

    Ukrainian Cops Spoofed in Fileless Phishing Attacks on Kyiv

    Attackers impersonate the National Police of Ukraine to deploy Amatera Stealer and PureMiner, using malicious Scalable Vector Graphics to trick victims.

    Read More Ukrainian Cops Spoofed in Fileless Phishing Attacks on KyivContinue

  • Blog

    ⚡ Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More

    Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden software bugs to massive DDoS attacks and new ransomware tricks, this week’s roundup gives you the biggest security moves to know. Whether you’re protecting key systems or locking down cloud apps, these are the updates you…

    Read More ⚡ Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & MoreContinue

  • Blog

    The State of AI in the SOC 2025 – Insights from Recent Study 

    Security leaders are embracing AI for triage, detection engineering, and threat hunting as alert volumes and burnout hit breaking points. A comprehensive survey of 282 security leaders at companies across industries reveals a stark reality facing modern Security Operations Centers: alert volumes have reached unsustainable levels, forcing teams to leave critical threats uninvestigated. You can

    Read More The State of AI in the SOC 2025 – Insights from Recent Study Continue

  • Blog

    Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security

    Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payloads and evade security defenses. “Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging business terminology and…

    Read More Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email SecurityContinue

  • Blog

    First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package

    Cybersecurity researchers have discovered what has been described as the first-ever instance of a Model Context Protocol (MCP) server spotted in the wild, raising software supply chain risks. According to Koi Security, a legitimate-looking developer managed to slip in rogue code within an npm package called “postmark-mcp” that copied an official Postmark Labs library of…

    Read More First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP PackageContinue

  • Blog

    China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks

    Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing campaign distributing a new variant of a known malware called PlugX (aka Korplug or SOGU). “The new variant’s features overlap with both the RainyDay and Turian backdoors, including abuse of the same legitimate applications for DLL side-loading,…

    Read More China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN NetworksContinue

  • Blog

    Volvo Employee SSNs Stolen in Supplier Ransomware Attack

    Three international vehicle manufacturers have fallen to supply chain cyberattacks in the past month alone.

    Read More Volvo Employee SSNs Stolen in Supplier Ransomware AttackContinue

  • Blog

    Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam

    A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then used to drop Amatera Stealer and PureMiner. “The phishing emails contain malicious Scalable Vector Graphics (SVG) files designed to trick recipients into opening harmful attachments,” Fortinet FortiGuard Labs researcher Yurren Wan said in a report shared…

    Read More Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and VietnamContinue

  • Blog

    Iranian State Hackers Use SSL.com Certificates to Sign Malware

    Security researchers say multiple threat groups, including Iran’s Charming Kitten APT offshoot Subtle Snail, are deploying malware with code-signing certificates from the Houston-based company.

    Read More Iranian State Hackers Use SSL.com Certificates to Sign MalwareContinue

Page navigation

Previous PagePrevious 1 … 149 150 151 152 153 … 415 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us