Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Data I/O Becomes Latest Ransomware Attack Victim

    The “incident” led to outages affecting a variety of the tech company’s operations, though the full scope of the breach is unknown.

    Read More Data I/O Becomes Latest Ransomware Attack VictimContinue

  • Blog

    Citrix Under Active Attack Again With Another Zero-Day

    The flaw is one of three that the company disclosed affecting its NetScaler ADC and NetScaler Gateway technologies.

    Read More Citrix Under Active Attack Again With Another Zero-DayContinue

  • Blog

    Hook Android Trojan Now Delivers Ransomware-Style Attacks

    New features to take over smartphones and monitor user activity demonstrate the continued evolution of the malware, which is now being spread on GitHub.

    Read More Hook Android Trojan Now Delivers Ransomware-Style AttacksContinue

  • Blog

    Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775

    Citrix has released fixes to address three security flaws in NetScaler ADC and NetScaler Gateway, including one that it said has been actively exploited in the wild. The vulnerabilities in question are listed below – CVE-2025-7775 (CVSS score: 9.2) – Memory overflow vulnerability leading to Remote Code Execution and/or Denial-of-Service CVE-2025-7776 (CVSS score: 8.8) –…

    Read More Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775Continue

  • Blog

    New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station

    A team of academics has devised a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on a rogue base station (gNB). The attack, per the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and Design (SUTD), relies on a new open-source software…

    Read More New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base StationContinue

  • Blog

    The Hidden Risk of Consumer Devices in the Hybrid Workforce

    Until businesses begin to account for uncontrolled variables in their threat models, attackers will continue to exploit the weakest link in the chain.

    Read More The Hidden Risk of Consumer Devices in the Hybrid WorkforceContinue

  • Blog

    MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

    Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory malware dubbed MixShell. The activity has been codenamed ZipLine by Check Point Research. “Instead of sending unsolicited phishing emails, attackers initiate contact through a company’s public ‘Contact Us’ form, tricking

    Read More MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain ManufacturersContinue

  • Blog

    ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

    A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA verification pages that employ the ClickFix social engineering tactic to deliver information stealers, ransomware, and cryptocurrency miners. The large-scale cybercrime campaign, first detected in August 2025, has been codenamed ShadowCaptcha by the Israel National

    Read More ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto MinersContinue

  • Blog

    HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

    Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay screens to display extortion messages. “A prominent characteristic of the latest variant is its capacity to deploy a full-screen ransomware overlay, which aims to coerce the victim into remitting a ransom payment,” Zimperium zLabs researcher Vishnu Pratapagiri

    Read More HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote CommandsContinue

  • Blog

    Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

    Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside the Play Store. “Android will require all apps to be registered by verified developers in order to be installed by users on certified Android devices,” the company said. “This creates…

    Read More Google to Verify All Android Developers in 4 Countries to Block Malicious AppsContinue

Page navigation

Previous PagePrevious 1 … 180 181 182 183 184 … 414 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us