Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Securing the Agentic Era: Introducing Astrix’s AI Agent Control Plane

    AI agents are rapidly becoming a core part of the enterprise, being embedded across enterprise workflows, operating with autonomy, and making decisions about which systems to access and how to use them. But as agents grow in power and autonomy, so do the risks and threats.  Recent studies show 80% of companies have already experienced…

    Read More Securing the Agentic Era: Introducing Astrix’s AI Agent Control PlaneContinue

  • Blog

    Emerging Yurei Ransomware Claims First Victims

    The cybercrime group, named after Japanese ghosts but believed to be from Morocco, uses a modified version of the Prince-Ransomware binary that includes a flaw allowing for partial data recovery. However, an extortion threat remains.

    Read More Emerging Yurei Ransomware Claims First VictimsContinue

  • Blog

    Sophos tops G2 Fall 2025 Reports: #1 Overall in MDR and Firewall

    #1 Ranked in 47 Global Reports

    Read More Sophos tops G2 Fall 2025 Reports: #1 Overall in MDR and FirewallContinue

  • Blog

    Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

    A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5) memory chips from South Korean semiconductor vendor SK Hynix. The RowHammer attack variant, codenamed Phoenix (CVE-2025-6202, CVSS score: 7.1), is capable of bypassing sophisticated protection mechanisms put in place to resist…

    Read More Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 SecondsContinue

  • Blog

    40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

    Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm registry that has affected more than 40 packages that belong to multiple maintainers. “The compromised versions include a function (NpmModule.updatePackage) that downloads a package tarball, modifies package.json, injects a local script (bundle.js), repacks the archive, and republishes it, enabling

    Read More 40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal CredentialsContinue

  • Blog

    SecurityScorecard Buys AI Automation Capabilities, Boosts Vendor Risk Management

    The company acquired HyperComply to help enterprises automate vendor security reviews and gain a real-time picture of the security of their entire supply chain.

    Read More SecurityScorecard Buys AI Automation Capabilities, Boosts Vendor Risk ManagementContinue

  • Blog

    ‘HybridPetya’ Ransomware Bypasses Secure Boot

    The malware, which has traits of Petya ransomware and the infamous NotPetya wiper, is designed to target UEFI-based systems, according to researchers.

    Read More ‘HybridPetya’ Ransomware Bypasses Secure BootContinue

  • Blog

    KillSec Ransomware Hits Brazilian Healthcare Software Provider

    The ransomware gang breached a “major element” of the healthcare technology supply chain and stole sensitive patient data, according to researchers.

    Read More KillSec Ransomware Hits Brazilian Healthcare Software ProviderContinue

  • Blog

    FBI Warns of Threat Actors Hitting Salesforce Customers

    The FBI’s IC3 recently warned of two threat actors, UNC6040 and UNC6395, targeting Salesforce customers, separately and in tandem.

    Read More FBI Warns of Threat Actors Hitting Salesforce CustomersContinue

  • Blog

    Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs

    The China-aligned threat actor known as Mustang Panda has been observed using an updated version of a backdoor called TONESHELL and a previously undocumented USB worm called SnakeDisk. “The worm only executes on devices with Thailand-based IP addresses and drops the Yokai backdoor,” IBM X-Force researchers Golo Mühr and Joshua Chung said in an analysis…

    Read More Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPsContinue

Page navigation

Previous PagePrevious 1 … 161 162 163 164 165 … 414 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us