Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    CISA: Attackers Breach Federal Agency via Critical GeoServer Flaw

    Threat actors exploited CVE-2024-36401 less than two weeks after it was initially disclosed and used it to gain access to a large federal civilian executive branch (FCEB) agency that uses the geospatial mapping data.

    Read More CISA: Attackers Breach Federal Agency via Critical GeoServer FlawContinue

  • Blog

    The Fall of Scattered Spider? Teen Member Surrenders Amid Group’s Shutdown Claims

    The cybercrime group continues to gain attention despite its apparent shutdown last week.

    Read More The Fall of Scattered Spider? Teen Member Surrenders Amid Group’s Shutdown ClaimsContinue

  • Blog

    Russia Targets Moldovan Election in Disinformation Play

    Researchers have tracked a Russian disinformation campaign against upcoming Moldovan elections, linking it to a previous campaign that began in 2022.

    Read More Russia Targets Moldovan Election in Disinformation PlayContinue

  • Blog

    Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike

    A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning Africa, Asia, North America, South America, and Oceania has been assessed to be a Chinese state-sponsored threat actor. Recorded Future, which was tracking the activity under the moniker TAG-100, has now graduated it to a hacking group…

    Read More Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt StrikeContinue

  • Blog

    UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

    Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the U.S. have been targeted by a suspected China-nexus cyber espionage group to deliver a known backdoor referred to as BRICKSTORM. The activity, attributed to UNC5221 and closely related, suspected China-nexus threat clusters, is designed to facilitate

    Read More UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology SectorsContinue

  • Blog

    Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

    Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the system to artificial intelligence (AI) model tampering and supply chain risks. The critical-rated vulnerabilities in question, discovered by Trend Micro, are listed below – CVE-2025-10643 (CVSS score: 9.1) – An authentication bypass vulnerability that

    Read More Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI ModelsContinue

  • Blog

    Threat Actor Deploys ‘OVERSTEP’ Backdoor in Ongoing SonicWall SMA Attacks

    Hackers tracked as UNC6148 are attacking SonicWall security devices by installing hidden software, allowing them to control systems, steal passwords, and hide their activities.

    Read More Threat Actor Deploys ‘OVERSTEP’ Backdoor in Ongoing SonicWall SMA AttacksContinue

  • Blog

    How One Bad Password Ended a 158-Year-Old Business

    Most businesses don’t make it past their fifth birthday – studies show that roughly 50% of small businesses fail within the first five years. So when KNP Logistics Group (formerly Knights of Old) celebrated more than a century and a half of operations, it had mastered the art of survival. For 158 years, KNP adapted and endured,…

    Read More How One Bad Password Ended a 158-Year-Old BusinessContinue

  • Blog

    New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

    Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share “significant” source code overlaps with IcedID and Latrodectus. “The exact connection to YiBackdoor is not yet clear, but it may be used in conjunction with Latrodectus and IcedID during attacks,” Zscaler ThreatLabz said in a Tuesday report….

    Read More New YiBackdoor Malware Shares Major Code Overlaps with IcedID and LatrodectusContinue

  • Blog

    iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks

    Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit checkout pages and steal credit card data by bypassing the very security policies designed to stop them. Download the complete iframe security guide here.  TL;DR: iframe Security Exposed Payment iframes are being actively exploited by attackers…

    Read More iframe Security Exposed: The Blind Spot Fueling Payment Skimmer AttacksContinue

Page navigation

Previous PagePrevious 1 … 152 153 154 155 156 … 415 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us