Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service

    Cybersecurity researchers have disclosed details of a new botnet that customers can rent access to conduct distributed denial-of-service (DDoS) attacks against targets of interest. The ShadowV2 botnet, according to Darktrace, predominantly targets misconfigured Docker containers on Amazon Web Services (AWS) cloud servers to deploy a Go-based malware that turns infected systems into attack nodes

    Read More ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire ServiceContinue

  • Blog

    SEO Poisoning Campaign Tied to Chinese Actor

    In Operation Rewrite, an unspecified actor is using legitimate compromised web servers to deliver malicious content to visitors for financial gain.

    Read More SEO Poisoning Campaign Tied to Chinese ActorContinue

  • Blog

    GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security

    GitHub on Monday announced that it will be changing its authentication and publishing options “in the near future” in response to a recent wave of supply chain attacks targeting the npm ecosystem, including the Shai-Hulud attack. This includes steps to address threats posed by token abuse and self-replicating malware by allowing local publishing with required…

    Read More GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain SecurityContinue

  • Blog

    BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

    Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a Chinese-speaking threat actor using a malware called BadIIS in attacks targeting East and Southeast Asia, particularly with a focus on Vietnam. The activity, dubbed Operation Rewrite, is being tracked by Palo Alto Networks Unit 42 under the moniker…

    Read More BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web ShellsContinue

  • Blog

    Iran-Linked Hackers Target Europe With New Malware

    “Nimbus Manticore” is back at it, this time with improved variants of its flagship malware and targets that are outside its usual focus area.

    Read More Iran-Linked Hackers Target Europe With New MalwareContinue

  • Blog

    Attackers Use Phony GitHub Pages to Deliver Mac Malware

    Threat actors are using a large-scale SEO poisoning campaign and fake GitHub repositories to deliver Atomic infostealers to Mac users.

    Read More Attackers Use Phony GitHub Pages to Deliver Mac MalwareContinue

  • Blog

    ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks

    Organizations in Belarus, Kazakhstan, and Russia have emerged as the target of a phishing campaign undertaken by a previously undocumented hacking group called ComicForm since at least April 2025. The activity primarily targeted industrial, financial, tourism, biotechnology, research, and trade sectors, cybersecurity company F6 said in an analysis published last week. The attack chain involves

    Read More ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian CyberattacksContinue

  • Blog

    Airport Chaos Shows Human Impact of 3rd-Party Attacks

    Major EU airports such as Heathrow were disrupted over the weekend after a cyberattack hit the provider of check-in kiosk software, which caused delays and flight cancellations.

    Read More Airport Chaos Shows Human Impact of 3rd-Party AttacksContinue

  • Blog

    15 Years of Zero Trust: Why It Matters More Than Ever

    With the emergence of AI-driven attacks and quantum computing, and the explosion of hyperconnected devices, zero trust remains a core strategy for security operations.

    Read More 15 Years of Zero Trust: Why It Matters More Than EverContinue

  • Blog

    ⚡ Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More

    The security landscape now moves at a pace no patch cycle can match. Attackers aren’t waiting for quarterly updates or monthly fixes—they adapt within hours, blending fresh techniques with old, forgotten flaws to create new openings. A vulnerability closed yesterday can become the blueprint for tomorrow’s breach. This week’s recap explores the trends driving that…

    Read More ⚡ Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & MoreContinue

Page navigation

Previous PagePrevious 1 … 154 155 156 157 158 … 414 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us