Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack

    Law enforcement authorities in the U.K. have arrested two teen members of the Scattered Spider hacking group in connection with their alleged participation in an August 2024 cyber attack targeting Transport for London (TfL), the city’s public transportation agency. Thalha Jubair (aka EarthtoStar, Brad, Austin, and @autistic), 19, from East London and Owen Flowers, 18,…

    Read More U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber AttackContinue

  • Blog

    CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of two sets of malware that were discovered in an unnamed organization’s network following the exploitation of security flaws in Ivanti Endpoint Manager Mobile (EPMM). “Each set contains loaders for malicious listeners that enable cyber threat actors to run arbitrary code on the…

    Read More CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428Continue

  • Blog

    7 Lessons for Securing AI Transformation from former CIA Digital Guru

    Jennifer Ewbank, former CIA deputy director of digital innovation, on resilience, cultural shifts, and cyber fundamentals in the AI era.

    Read More 7 Lessons for Securing AI Transformation from former CIA Digital GuruContinue

  • Blog

    TikTok Deal Won’t End Enterprise Risks

    The proposed restructuring plan would address many concerns related to the social media platform, but risks remain for security teams.

    Read More TikTok Deal Won’t End Enterprise RisksContinue

  • Blog

    SonicWall Breached, Firewall Backup Data Exposed

    Threat actors breached the MySonicWall service and accessed backup firewall configuration files belonging to “fewer than 5%” of its install base, according to the company.

    Read More SonicWall Breached, Firewall Backup Data ExposedContinue

  • Blog

    SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers

    SonicWall is urging customers to reset credentials after their firewall configuration backup files were exposed in a security breach impacting MySonicWall accounts. The company said it recently detected suspicious activity targeting the cloud backup service for firewalls, and that unknown threat actors accessed backup firewall preference files stored in the cloud for less than 5%…

    Read More SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of CustomersContinue

  • Blog

    K-12 schools face cybersecurity risks inside and outside of the classroom

    As students return to school, it’s crucial for administrators and IT teams to stay vigilant against opportunistic threat actors.

    Read More K-12 schools face cybersecurity risks inside and outside of the classroomContinue

  • Blog

    CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader

    Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to deliver post-exploitation tools like Cobalt Strike and AdaptixC2, and a remote access trojan known as PureHVNC RAT. “CountLoader is being used either as part of an Initial Access Broker’s (IAB) toolset or by a…

    Read More CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware LoaderContinue

  • Blog

    SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers

    Cybersecurity researchers have discovered two new malicious packages in the Python Package Index (PyPI) repository that are designed to deliver a remote access trojan called SilentSync on Windows systems. “SilentSync is capable of remote command execution, file exfiltration, and screen capturing,” Zscaler ThreatLabz’s Manisha Ramcharan Prajapati and Satyam Singh said. “SilentSync also extracts

    Read More SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python DevelopersContinue

  • Blog

    How CISOs Can Drive Effective AI Governance

    AI’s growing role in enterprise environments has heightened the urgency for Chief Information Security Officers (CISOs) to drive effective AI governance. When it comes to any emerging technology, governance is hard – but effective governance is even harder. The first instinct for most organizations is to respond with rigid policies. Write a policy document, circulate…

    Read More How CISOs Can Drive Effective AI GovernanceContinue

Page navigation

Previous PagePrevious 1 … 157 158 159 160 161 … 414 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us