Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    How the Story of a USB Penetration Test Went Viral

    Two decades ago Dark Reading posted its first blockbuster — a column by a pen tester who sprinkled rigged thumb drives around a credit union parking lot and let curious employees do the rest. This episode looks back at the history-making piece with its author Steve Stasiukonis, Dark Reading senior editor Becky Bracken, and Dark…

    Read More How the Story of a USB Penetration Test Went ViralContinue

  • Blog

    MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks

    Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck. The vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), a code injection flaw that could result in arbitrary code execution. “MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated…

    Read More MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution AttacksContinue

  • Blog

    GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event

    Post Content

    Read More GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity EventContinue

  • Blog

    We Scanned 1 Million Exposed AI Services. Here’s How Bad the Security Actually Is

    While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption is putting that progress at risk. Businesses are moving fast to self-host LLM infrastructure, drawn by the promise of AI as a force multiplier and the pressure to deliver more value faster….

    Read More We Scanned 1 Million Exposed AI Services. Here’s How Bad the Security Actually IsContinue

  • Blog

    ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

    The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China. While prior versions of the backdoor have primarily targeted Windows users only, the supply chain attack is assessed to…

    Read More ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and WindowsContinue

  • Blog

    Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

    A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild. The vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthenticated remote code execution affecting Weaver E-cology 10.0 versions prior to 20260312. The issue resides in the “/papi/esearch/data/devops/

    Read More Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug APIContinue

  • Blog

    Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries

    Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures and legitimate email services to direct users to attacker-controlled domains and steal authentication tokens. The multi-stage campaign, observed between April 14 and 16, 2026, targeted more than 35,000 users across over 13,000 organizations in 26…

    Read More Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 CountriesContinue

  • Blog

    RMM Tools Fuel Stealthy Phishing Campaign

    Attackers are abusing two remote monitoring and management (RMM) tools to evade detection in a campaign that has impacted over 80 organizations so far.

    Read More RMM Tools Fuel Stealthy Phishing CampaignContinue

  • Blog

    Exploit Cyber-Frenzy Threatens Millions via Critical cPanel Vulnerability

    Shortly after the authentication-bypass flaw was disclosed multiple proof-of-concept exploits appeared, and one researcher claims there’s been zero-day activity for at least a month.

    Read More Exploit Cyber-Frenzy Threatens Millions via Critical cPanel VulnerabilityContinue

  • Blog

    Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

    An active phishing campaign has been observed targeting multiple vectors since at least April 2025, with legitimate Remote Monitoring and Management (RMM) software as a way to establish persistent remote access to compromised hosts. The activity, codenamed VENOMOUS#HELPER, has impacted over 80 organizations, most of which are in the U.S., according to Securonix. It shares…

    Read More Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM ToolsContinue

Page navigation

Previous PagePrevious 1 2 3 4 … 457 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us