Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack

    Microsoft on Tuesday released patches for 63 new security vulnerabilities identified in its software, including one that has come under active exploitation in the wild. Of the 63 flaws, four are rated Critical and 59 are rated Important in severity. Twenty-nine of these vulnerabilities are related to privilege escalation, followed by 16 remote code execution,…

    Read More Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active AttackContinue

  • Blog

    Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy

    Google on Tuesday unveiled a new privacy-enhancing technology called Private AI Compute to process artificial intelligence (AI) queries in a secure platform in the cloud. The company said it has built Private AI Compute to “unlock the full speed and power of Gemini cloud models for AI experiences, while ensuring your personal data stays private…

    Read More Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level PrivacyContinue

  • Blog

    Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs

    Security teams may have a less burdensome rollout in November after October’s Goliath Patch Tuesday, but shouldn’t wait on a few top-priority fixes.

    Read More Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click BugsContinue

  • Blog

    WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

    Threat hunters have uncovered similarities between a banking malware called Coyote and a newly disclosed malicious program dubbed Maverick that has been propagated via WhatsApp. According to a report from CyberProof, both malware strains are written in .NET, target Brazilian users and banks, and feature identical functionality to decrypt, targeting banking URLs and monitor banking…

    Read More WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest BanksContinue

  • Blog

    GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites

    The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from Huntress. The cybersecurity company said it observed three GootLoader infections since October 27, 2025, out of which two resulted in hands-on keyboard intrusions with domain controller compromise taking place within 17 hours…

    Read More GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress SitesContinue

  • Blog

    Grandparents to C-Suite: Elder Fraud Reveals Gaps in Human-Centered Cybersecurity

    Cybercriminals are weaponizing AI voice cloning and publicly available data to craft social engineering scams that emotionally manipulate senior citizens—and drain billions from their savings.

    Read More Grandparents to C-Suite: Elder Fraud Reveals Gaps in Human-Centered CybersecurityContinue

  • Blog

    Bridging the Skills Gap: How Military Veterans Are Strengthening Cybersecurity

    From intelligence analysts to surface warfare officers, military veterans of all backgrounds are successfully pivoting to cybersecurity careers and strengthening the industry’s defense capabilities.

    Read More Bridging the Skills Gap: How Military Veterans Are Strengthening CybersecurityContinue

  • Blog

    CISO’s Expert Guide To AI Supply Chain Attacks

    AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations. Download the full CISO’s expert guide to AI Supply chain attacks here.  TL;DR AI-enabled supply chain attacks are exploding in scale and sophistication – Malicious package uploads to open-source repositories jumped…

    Read More CISO’s Expert Guide To AI Supply Chain AttacksContinue

  • Blog

    Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories

    Cybersecurity researchers have discovered a malicious npm package named “@acitons/artifact” that typosquats the legitimate “@actions/artifact” package with the intent to target GitHub-owned repositories. “We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish

    Read More Researchers Detect Malicious npm Package Targeting GitHub-Owned RepositoriesContinue

  • Blog

    Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

    Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that’s sold on Russian-speaking Telegram channels under a Malware-as-a-Service (MaaS) model. According to its seller, the malware enables device control and espionage, allowing threat actors to collect SMS messages, contacts, call logs, images, and videos, as well as intercept,…

    Read More Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for HackersContinue

Page navigation

Previous PagePrevious 1 … 15 16 17 18 19 … 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us