Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Digital Fraud at Industrial Scale: 2025 Wasn’t Great

    Advanced fraud attacks surged 180% in 2025 as cyber-scammers used generative AI to churn out flawless IDs, deepfakes, and autonomous bots at levels never before seen.

    Read More Digital Fraud at Industrial Scale: 2025 Wasn’t GreatContinue

  • Blog

    ‘Dark LLMs’ Aid Petty Criminals, But Underwhelm Technically

    As in the wider world, AI is not quite living up to the hype in the cyber underground. But it’s definitely helping low-level cybercriminals do competent work.

    Read More ‘Dark LLMs’ Aid Petty Criminals, But Underwhelm TechnicallyContinue

  • Blog

    Prompt Injections Loom Large Over ChatGPT’s Atlas Browser

    It’s the law of unintended consequences: equipping browsers with agentic AI opens the door to an exponential volume of prompt injections.

    Read More Prompt Injections Loom Large Over ChatGPT’s Atlas BrowserContinue

  • Blog

    How Malware Authors Are Incorporating LLMs to Evade Detection

    Cyberattackers are integrating large language models (LLMs) into the malware, running prompts at runtime to evade detection and augment their code on demand.

    Read More How Malware Authors Are Incorporating LLMs to Evade DetectionContinue

  • Blog

    Enterprises Aren’t Confident They Can Secure Non-Human Identities (NHIs)

    More than half of organizations surveyed aren’t sure they can secure non-human identities (NHIs), underscoring the lag between the rollout of these identities and the tools to protect them.

    Read More Enterprises Aren’t Confident They Can Secure Non-Human Identities (NHIs)Continue

  • Blog

    Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist

    South Korea’s financial sector has been targeted by what has been described as a sophisticated supply chain attack that led to the deployment of Qilin ransomware. “This operation combined the capabilities of a major Ransomware-as-a-Service (RaaS) group, Qilin, with potential involvement from North Korean state-affiliated actors (Moonstone Sleet), leveraging Managed Service Provider (MSP)

    Read More Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data HeistContinue

  • Blog

    When Your $2M Security Detection Fails: Can your SOC Save You?

    Enterprises today are expected to have at least 6-8 detection tools, as detection is considered a standard investment and the first line of defense. Yet security leaders struggle to justify dedicating resources further down the alert lifecycle to their superiors. As a result, most organizations’ security investments are asymmetrical, robust detection tools paired with an…

    Read More When Your $2M Security Detection Fails: Can your SOC Save You?Continue

  • Blog

    Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

    Cybersecurity researchers have discovered a new malicious extension on the Chrome Web Store that’s capable of injecting a stealthy Solana transfer into a swap transaction and transferring the funds to an attacker-controlled cryptocurrency wallet. The extension, named Crypto Copilot, was first published by a user named “sjclark76” on May 7, 2024. The developer describes the…

    Read More Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium SwapsContinue

  • Blog

    Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

    If you’re using community tools like Chocolatey or Winget to keep systems updated, you’re not alone. These platforms are fast, flexible, and easy to work with—making them favorites for IT teams. But there’s a catch… The very tools that make your job easier might also be the reason your systems are at risk. These tools…

    Read More Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained ToolsContinue

  • Blog

    RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

    The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent. “This is the first time that a RomCom payload has been observed being distributed by SocGholish,” Arctic Wolf Labs researcher Jacob Faires said in a Tuesday report. The…

    Read More RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent MalwareContinue

Page navigation

Previous PagePrevious 1 2 3 4 … 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us