Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Automation Is Redefining Pentest Delivery

    Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But as the threat landscape has evolved, the way we deliver pentest results hasn’t kept pace. Most organizations still rely on traditional reporting methods—static PDFs, emailed documents, and spreadsheet-based tracking. The problem? These outdated workflows introduce delays,

    Read More Automation Is Redefining Pentest DeliveryContinue

  • Blog

    VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages

    Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics (SVG) files as part of phishing attacks impersonating the Colombian judicial system. The SVG files, according to VirusTotal, are distributed via email and designed to execute an embedded JavaScript payload, which then decodes and injects a Base64-encoded HTML phishing page masquerading…

    Read More VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing PagesContinue

  • Blog

    Bridgestone Americas Confirms Cyberattack

    Reports of disruptions at North American plants emerged earlier this week, though the nature of the attack on the tire manufacturer remains unclear.

    Read More Bridgestone Americas Confirms CyberattackContinue

  • Blog

    Chinese Hackers Game Google to Boost Gambling Sites

    New threat actor “GhostRedirector” is using a malicious IIS module to inject links that try to artificially boost search engine ranking for target sites.

    Read More Chinese Hackers Game Google to Boost Gambling SitesContinue

  • Blog

    ISC2 Aims to Bridge DFIR Skill Gap with New Certificate

    The Nonprofit organization launched the Threat Handling Foundations Certificate amid mounting incident and breach disclosures.

    Read More ISC2 Aims to Bridge DFIR Skill Gap with New CertificateContinue

  • Blog

    Phishing Empire Runs Undetected on Google, Cloudflare

    What’s believed to be a global phishing-as-a-service enterprise using cloaking techniques has been riding on public cloud infrastructure for more than 3 years.

    Read More Phishing Empire Runs Undetected on Google, CloudflareContinue

  • Blog

    Czech Warning Highlights China Stealing User Data

    Czech cyber agency NÚKIB warned of the risks of using products and software that send data back to China.

    Read More Czech Warning Highlights China Stealing User DataContinue

  • Blog

    Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries

    The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor “is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word,” S2 Grupo’s LAB52 threat intelligence team said….

    Read More Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO CountriesContinue

  • Blog

    GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module

    Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to the deployment of a passive C++ backdoor called Rungan and a native Internet Information Services…

    Read More GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS ModuleContinue

  • Blog

    Blast Radius of Salesloft Drift Attacks Remains Uncertain

    Many high-profile Salesloft Drift customers have disclosed data breaches as a result of a recent supply-chain attack, but the extent and severity of this campaign are unclear.

    Read More Blast Radius of Salesloft Drift Attacks Remains UncertainContinue

Page navigation

Previous PagePrevious 1 … 170 171 172 173 174 … 414 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us