Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws impacting Citrix Session Recording and Git to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2024-8068 (CVSS score: 5.1) – An improper privilege management vulnerability in Citrix Session Recording

    Read More CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and GitContinue

  • Blog

    Hackers Lied In Wait, Then Knocked Out Iran Ship Comms

    Lab-Dookhtegen claims major attack on more than 60 cargo ships and oil tankers belonging to two Iranian companies on US sanctions list.

    Read More Hackers Lied In Wait, Then Knocked Out Iran Ship CommsContinue

  • Blog

    FTC Chair Tells Tech Giants to Hold the Line on Encryption

    The chairman sent letters out to companies like Apple, Meta, and Microsoft, advising them not to adhere to the demands of foreign governments to weaken their encryption.

    Read More FTC Chair Tells Tech Giants to Hold the Line on EncryptionContinue

  • Blog

    ClickFix Attack Tricks AI Summaries Into Pushing Malware

    Because instructions appear to come from AI-generated content summaries and not an external source, the victim is more likely to follow them without suspicion.

    Read More ClickFix Attack Tricks AI Summaries Into Pushing MalwareContinue

  • Blog

    UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

    A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the globe to advance Beijing’s strategic interests. “This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade

    Read More UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting DiplomatsContinue

  • Blog

    Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3

    Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows and macOS that could potentially allow an attacker to break out of the confines of a container. The vulnerability, tracked as CVE-2025-9074, carries a CVSS score of 9.3 out of 10.0. It has been addressed in version 4.44.3….

    Read More Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3Continue

  • Blog

    Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

    Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware loader called UpCrypter. The campaign leverages “carefully crafted emails to deliver malicious URLs linked to convincing phishing pages,” Fortinet FortiGuard Labs researcher Cara Lin said. “These pages are designed to entice recipients into downloading JavaScript

    Read More Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT PayloadsContinue

  • Blog

    Fast-Spreading, Complex Phishing Campaign Installs RATs

    Attackers not only steal credentials but also can maintain long-term, persistent access to corporate networks through the global campaign.

    Read More Fast-Spreading, Complex Phishing Campaign Installs RATsContinue

  • Blog

    Securing the Cloud in an Age of Escalating Cyber Threats

    As threats intensify and cloud adoption expands, organizations must leave outdated security models behind.

    Read More Securing the Cloud in an Age of Escalating Cyber ThreatsContinue

  • Blog

    ⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More

    Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage, or shift who holds the upper hand. For leaders, this means defense isn’t just a matter of firewalls and patches—it’s about strategy. The strongest organizations aren’t the ones with the most tools,…

    Read More ⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & MoreContinue

Page navigation

Previous PagePrevious 1 … 181 182 183 184 185 … 414 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us