Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation

    A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage database operations and corrupt industrial control systems. According to software supply chain security company Socket, the packages were published in 2023 and 2024 by a user named “shanhai666” and are designed to run malicious code after specific…

    Read More Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After InstallationContinue

  • Blog

    Enterprise Credentials at Risk – Same Old, Same Old?

    Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She clicks the link, types in her credentials, and goes back to her spreadsheet. But unknown to her, she’s just made a big mistake. Sarah just accidentally handed over her login details to cybercriminals who are…

    Read More Enterprise Credentials at Risk – Same Old, Same Old?Continue

  • Blog

    Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts

    Google on Thursday said it’s rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by threat actors who post inauthentic bad reviews on the platform and demand ransoms to remove the negative comments. The approach is designed to tackle a common practice called review bombing, where online…

    Read More Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion AttemptsContinue

  • Blog

    runC Container Escape Vulnerabilities

    What is the Vulnerability? High-severity vulnerabilities in runc (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) were disclosed in early November 2025. A malicious or compromised container image can abuse how runc handles masked paths, bind-mounts, and special files to write to the host /proc filesystem and escape the container boundary – enabling remote code execution on the host, persistence,…

    Read More runC Container Escape VulnerabilitiesContinue

  • Blog

    Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

    Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to be created with the help of artificial intelligence – in other words, vibe-coded. Secure Annex researcher John Tuckner, who flagged the extension “susvsex,” said it does not attempt to hide its malicious functionality. The extension was…

    Read More Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware CapabilitiesContinue

  • Blog

    Sora 2 Makes Videos So Believable, Reality Checks Are Required

    Threat actors will continue to abuse deepfake technology to conduct fraudulent activity, so organizations need to implement strong security protocols – even if it adds to user friction.

    Read More Sora 2 Makes Videos So Believable, Reality Checks Are RequiredContinue

  • Blog

    SonicWall Firewall Backups Stolen by Nation-State Actor

    The network security vendor said the MySonicWall breach was unrelated to the recent wave of Akira ransomware attacks targeting the company’s devices.

    Read More SonicWall Firewall Backups Stolen by Nation-State ActorContinue

  • Blog

    Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

    A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities. The campaign, detected in May 2025, is tracked by the security outfit under the moniker InedibleOchotense, describing it as Russia-aligned. “InedibleOchotense sent spear-phishing emails and Signal text messages, containing a link

    Read More Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on UkraineContinue

  • Blog

    Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362

    Cisco on Wednesday disclosed that it became aware of a new attack variant that’s designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software releases that are susceptible to CVE-2025-20333 and CVE-2025-20362. “This attack can cause unpatched devices to unexpectedly reload, leading to denial-of-service

    Read More Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362Continue

  • Blog

    From Tabletop to Turnkey: Building Cyber Resilience in Financial Services

    Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement. Crisis management or Tabletop exercises, for a long time relatively rare in the context of cybersecurity, have become required as a series of regulations has introduced this requirement to FSI…

    Read More From Tabletop to Turnkey: Building Cyber Resilience in Financial ServicesContinue

Page navigation

Previous PagePrevious 1 … 18 19 20 21 22 … 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us