Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike

    A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning Africa, Asia, North America, South America, and Oceania has been assessed to be a Chinese state-sponsored threat actor. Recorded Future, which was tracking the activity under the moniker TAG-100, has now graduated it to a hacking group…

    Read More Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt StrikeContinue

  • Blog

    UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

    Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the U.S. have been targeted by a suspected China-nexus cyber espionage group to deliver a known backdoor referred to as BRICKSTORM. The activity, attributed to UNC5221 and closely related, suspected China-nexus threat clusters, is designed to facilitate

    Read More UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology SectorsContinue

  • Blog

    Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

    Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the system to artificial intelligence (AI) model tampering and supply chain risks. The critical-rated vulnerabilities in question, discovered by Trend Micro, are listed below – CVE-2025-10643 (CVSS score: 9.1) – An authentication bypass vulnerability that

    Read More Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI ModelsContinue

  • Blog

    Threat Actor Deploys ‘OVERSTEP’ Backdoor in Ongoing SonicWall SMA Attacks

    Hackers tracked as UNC6148 are attacking SonicWall security devices by installing hidden software, allowing them to control systems, steal passwords, and hide their activities.

    Read More Threat Actor Deploys ‘OVERSTEP’ Backdoor in Ongoing SonicWall SMA AttacksContinue

  • Blog

    How One Bad Password Ended a 158-Year-Old Business

    Most businesses don’t make it past their fifth birthday – studies show that roughly 50% of small businesses fail within the first five years. So when KNP Logistics Group (formerly Knights of Old) celebrated more than a century and a half of operations, it had mastered the art of survival. For 158 years, KNP adapted and endured,…

    Read More How One Bad Password Ended a 158-Year-Old BusinessContinue

  • Blog

    New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

    Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share “significant” source code overlaps with IcedID and Latrodectus. “The exact connection to YiBackdoor is not yet clear, but it may be used in conjunction with Latrodectus and IcedID during attacks,” Zscaler ThreatLabz said in a Tuesday report….

    Read More New YiBackdoor Malware Shares Major Code Overlaps with IcedID and LatrodectusContinue

  • Blog

    iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks

    Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit checkout pages and steal credit card data by bypassing the very security policies designed to stop them. Download the complete iframe security guide here.  TL;DR: iframe Security Exposed Payment iframes are being actively exploited by attackers…

    Read More iframe Security Exposed: The Blind Spot Fueling Payment Skimmer AttacksContinue

  • Blog

    Npm Package Hides Malware in Steganographic QR Codes

    The poisoned package, purporting to be a JavaScript utility, threatens the software supply chain with a highly obsfuscated credential stealer.

    Read More Npm Package Hides Malware in Steganographic QR CodesContinue

  • Blog

    Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials

    Cloud security company Wiz has revealed that it uncovered in-the-wild exploitation of a security flaw in a Linux utility called Pandoc as part of attacks designed to infiltrate Amazon Web Services (AWS) Instance Metadata Service (IMDS). The vulnerability in question is CVE-2025-51591 (CVSS score: 6.5), which refers to a case of Server-Side Request Forgery (SSRF)…

    Read More Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM CredentialsContinue

  • Blog

    State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability

    Libraesva has released a security update to address a vulnerability in its Email Security Gateway (ESG) solution that it said has been exploited by state-sponsored threat actors. The vulnerability, tracked as CVE-2025-59689, carries a CVSS score of 6.1, indicating medium severity. “Libraesva ESG is affected by a command injection flaw that can be triggered by…

    Read More State-Sponsored Hackers Exploiting Libraesva Email Security Gateway VulnerabilityContinue

Page navigation

Previous PagePrevious 1 … 152 153 154 155 156 … 414 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us