Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Elevation-of-Privilege Vulns Dominate Microsoft’s Patch Tuesday

    The company’s August security update consisted of patches for 111 unique Common Vulnerabilities and Exposures (CVEs).

    Read More Elevation-of-Privilege Vulns Dominate Microsoft’s Patch TuesdayContinue

  • Blog

    Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks

    New research has uncovered Docker images on Docker Hub that contain the infamous XZ Utils backdoor, more than a year after the discovery of the incident. More troubling is the fact that other images have been built on top of these infected base images, effectively propagating the infection further in a transitive manner, Binarly REsearch…

    Read More Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain RisksContinue

  • Blog

    Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager

    Cybersecurity researchers are warning of a “significant spike” in brute-force traffic aimed at Fortinet SSL VPN devices. The coordinated activity, per threat intelligence firm GreyNoise, was observed on August 3, 2025, with over 780 unique IP addresses participating in the effort. As many as 56 unique IP addresses have been detected over the past 24…

    Read More Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManagerContinue

  • Blog

    Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses

    An ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and technology service providers, as ShinyHunters and Scattered Spider appear to be working hand in hand, new findings show. “This latest wave of ShinyHunters-attributed attacks reveals a dramatic shift in tactics, moving beyond the group’s previous credential theft and…

    Read More Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on BusinessesContinue

  • Blog

    Charon Ransomware Emerges With APT-Style Tactics

    The first documented deployment of the novel malware in a campaign against the Middle Eastern public sector and aviation industry may be tied to China’s state-sponsored actor Earth Baxia.

    Read More Charon Ransomware Emerges With APT-Style TacticsContinue

  • Blog

    How to Stay a Step Ahead of a Non-Obvious Threat

    Securing business logic isn’t just a technical requirement — it’s a business imperative.

    Read More How to Stay a Step Ahead of a Non-Obvious ThreatContinue

  • Blog

    Enhancements and new offerings for Sophos’ email security portfolio

    Following multiple enhancements to Sophos Email – the only MDR-optimized email security solution – Sophos is introducing two new offerings to boost email security posture.

    Read More Enhancements and new offerings for Sophos’ email security portfolioContinue

  • Blog

    New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks

    A previously undocumented threat actor dubbed Curly COMrades has been observed targeting entities in Georgia and Moldova as part of a cyber espionage campaign designed to facilitate long-term access to target networks. “They repeatedly tried to extract the NTDS database from domain controllers — the primary repository for user password hashes and authentication data in…

    Read More New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova AttacksContinue

  • Blog

    ShinyHunters Tactics Now Mirror Scattered Spider

    There’s growing evidence that two of arguably the most dangerous cybercrime groups out there are tag-teaming big targets.

    Read More ShinyHunters Tactics Now Mirror Scattered SpiderContinue

  • Blog

    The Ultimate Battle: Enterprise Browsers vs. Secure Browser Extensions

    Most security tools can’t see what happens inside the browser, but that’s where the majority of work, and risk, now lives. Security leaders deciding how to close that gap often face a choice: deploy a dedicated Enterprise Browser or add an enterprise-grade control layer to the browsers employees already use and trust. The Ultimate Battle:…

    Read More The Ultimate Battle: Enterprise Browsers vs. Secure Browser ExtensionsContinue

Page navigation

Previous PagePrevious 1 … 194 195 196 197 198 … 413 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us