Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

    Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that’s functional on Windows, macOS, and Linux systems. The names of the packages are listed below – nhattuanbl/lara-helper (37 Downloads) nhattuanbl/simple-queue (29 Downloads) nhattuanbl/lara-swagger (49 Downloads)

    Read More Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and LinuxContinue

  • Blog

    APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

    Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024. “Silver Dragon gains its initial access by exploiting public-facing internet servers and by delivering phishing emails that contain malicious attachments,” Check Point…

    Read More APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2Continue

  • Blog

    CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild. The high-severity vulnerability, CVE-2026-22719 (CVSS score: 8.1), has been described as a case of command injection that could allow an

    Read More CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV CatalogContinue

  • Blog

    India APT ‘Sloppy Lemming’ Targets Defense, Critical Infrastructure

    India-nexus cyber threat actors are growing more active and sophisticated, using custom tools coded in Rust and cloud-based command and control.

    Read More India APT ‘Sloppy Lemming’ Targets Defense, Critical InfrastructureContinue

  • Blog

    Vehicle Tire Pressure Sensors Enable Silent Tracking

    Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat actors.

    Read More Vehicle Tire Pressure Sensors Enable Silent TrackingContinue

  • Blog

    Qualcomm Zero-Day Exploited in Targeted Android Attacks

    The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.

    Read More Qualcomm Zero-Day Exploited in Targeted Android AttacksContinue

  • Blog

    Speakeasies to Shadow AI: Banning AI Browsers Will Fail

    Lessons from history highlight why AI-enabled browsers require controlled enablement.

    Read More Speakeasies to Shadow AI: Banning AI Browsers Will FailContinue

  • Blog

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as…

    Read More Fake Tech Support Spam Deploys Customized Havoc C2 Across OrganizationsContinue

  • Blog

    Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

    Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive and organizational pressures that quietly erode…

    Read More Building a High-Impact Tier 1: The 3 Steps CISOs Must FollowContinue

  • Blog

    Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

    The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings come from Team Cymru, which detected its use following an analysis of the IP address (“212.11.64[.]250”) that was used by the suspected

    Read More Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 CountriesContinue

Page navigation

Previous PagePrevious 1 … 15 16 17 18 19 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us