Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

    A “novel” social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors. Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage

    Read More Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto AttacksContinue

  • Blog

    Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu

    A bank approved a Taboola pixel. That pixel quietly redirected logged-in users to a Temu tracking endpoint. This occurred without the bank’s knowledge, without user consent, and without a single security control registering a violation. Read the full technical breakdown in the Security Intelligence Brief. Download now → The “First-Hop Bias” Blind Spot Most&

    Read More Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to TemuContinue

  • Blog

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and WhatsApp. The activity, which was observed between March and April

    Read More UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware CampaignContinue

  • Blog

    6-Year Ransomware Campaign Targets Turkish Homes & SMBs

    While enterprises breaches make more headlines, smaller incidents tend to be under-reported, if at all, allowing campaigns to last longer with less disruption.

    Read More 6-Year Ransomware Campaign Targets Turkish Homes & SMBsContinue

  • Blog

    Critical MCP Integration Flaw Puts NGINX at Risk

    Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuration files.

    Read More Critical MCP Integration Flaw Puts NGINX at RiskContinue

  • Blog

    Navigating the Unique Security Risks of Asia’s Digital Supply Chain

    Regulatory differences, interconnected digital ecosystems, and the rise of AI have created a complex supply chain Asian organizations must wrangle.

    Read More Navigating the Unique Security Risks of Asia’s Digital Supply ChainContinue

  • Blog

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    Threat actors have been observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices by sending automated emails. “By leveraging trusted infrastructure, these attackers bypass traditional security filters, turning productivity tools into delivery

    Read More n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing EmailsContinue

  • Blog

    Prepping for ‘Q-Day’: Why Quantum Risk Management Should Start Now

    Quantum computers are coming and may impact systems in unexpected ways, and it will “take years to be fully quantum-safe, if ever,” cryptography expert warns.

    Read More Prepping for ‘Q-Day’: Why Quantum Risk Management Should Start NowContinue

  • Blog

    Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests

    Google, Meta, and Microsoft about half the time don’t comply with requests to opt out of online tracking per a California law mandate, privacy watchdog finds.

    Read More Audit: Big Tech Often Ignores CA Privacy Law Opt-Out RequestsContinue

  • Blog

    Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

    A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8), an authentication bypass vulnerability that enables threat actors to seize control of the Nginx service. It has been codenamed MCPwn by Pluto Security. “

    Read More Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server TakeoverContinue

Page navigation

Previous PagePrevious 1 … 16 17 18 19 20 … 458 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us