Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More

    Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and even trusted apps or social platforms are turning into attack vectors. The result is a global system where every digital weakness can be…

    Read More ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & MoreContinue

  • Blog

    Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response

    Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) — marking the fourth consecutive year of inclusion. According to Gartner, more than 600 providers globally claim to deliver MDR services, yet only a select few meet the criteria to appear in the Market…

    Read More Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and ResponseContinue

  • Blog

    Multiple ChatGPT Security Bugs Allow Rampant Data Theft

    Attackers can use them to inject arbitrary prompts, exfiltrate personal user information, bypass safety mechanisms, and take other malicious actions.

    Read More Multiple ChatGPT Security Bugs Allow Rampant Data TheftContinue

  • Blog

    Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

    The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender, the adversary is said to have enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine. “This hidden…

    Read More Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR DetectionContinue

  • Blog

    WatchGuard Fireware OS IKEv2 Out-of-Bounds Vulnerability

    What is the Vulnerability? A critical Out-of-Bounds Write vulnerability (CVE-2025-9242) exists in the WatchGuard Fireware OS iked process, which handles IKEv2 VPN connections. The flaw allows a remote, unauthenticated attacker to execute arbitrary code on affected devices. The vulnerability impacts both: – Mobile user VPNs using IKEv2, and – Branch Office VPNs using IKEv2 when…

    Read More WatchGuard Fireware OS IKEv2 Out-of-Bounds VulnerabilityContinue

  • Blog

    SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

    SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. “The malicious activity – carried out by a state-sponsored threat actor – was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call,”…

    Read More SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup BreachContinue

  • Blog

    APT ‘Bronze Butler’ Exploits Zero-Day to Root Japan Orgs

    A critical security issue in a popular endpoint manager (CVE-2025-61932) allowed Chinese state-sponsored attackers to backdoor Japanese businesses.

    Read More APT ‘Bronze Butler’ Exploits Zero-Day to Root Japan OrgsContinue

  • Blog

    Nikkei Suffers Breach Via Slack Compromise

    The Japanese media giant said thousands of employee and business partners were impacted by an attack that compromised Slack account data and chat histories.

    Read More Nikkei Suffers Breach Via Slack CompromiseContinue

  • Blog

    Faster, safer, stronger: Sophos Firewall v22 security enhancements

    Hardened kernel, remote integrity monitoring, an enhanced anti-malware engine, and more.

    Read More Faster, safer, stronger: Sophos Firewall v22 security enhancementsContinue

  • Blog

    5 ways to strengthen your firewall and endpoint’s defenses against ransomware

    Sophos Firewall uses intelligent TLS inspection and AI-powered analysts to reveal hidden threats — without compromising performance.  

    Read More 5 ways to strengthen your firewall and endpoint’s defenses against ransomwareContinue

Page navigation

Previous PagePrevious 1 … 19 20 21 22 23 … 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us