Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

    Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency trading apps to deploy a compiled V8 JavaScript (JSC) malware called JSCEAL that can capture data from credentials and wallets. The activity leverages thousands of malicious advertisements posted on Facebook in an attempt to redirect unsuspecting victims to counterfeit sites that instruct

    Read More Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading AppsContinue

  • Blog

    FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant

    Cybersecurity experts have released a decryptor for a ransomware strain called FunkSec, allowing victims to recover access to their files for free. “Because the ransomware is now considered dead, we released the decryptor for public download,” Gen Digital researcher Ladislav Zezula said. FunkSec, which emerged towards the end of 2024, has claimed 172 victims, according…

    Read More FunkSec Ransomware Decryptor Released Free to Public After Group Goes DormantContinue

  • Blog

    The CrowdStrike Outage Was Bad, but It Could Have Been Worse

    A year after the largest outage in IT history, organizations need to make an active effort to diversify their technology and software vendors and create a more resilient cyber ecosystem moving forward.

    Read More The CrowdStrike Outage Was Bad, but It Could Have Been WorseContinue

  • Blog

    Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits

    Cybersecurity researchers have disclosed now-patched critical security flaws in the firmware of Dahua smart cameras that, if left unaddressed, could allow attackers to hijack control of susceptible devices. “The flaws, affecting the device’s ONVIF protocol and file upload handlers, allow unauthenticated attackers to execute arbitrary commands remotely, effectively taking over the device,”

    Read More Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload ExploitsContinue

  • Blog

    Attackers Can Use Browser Extensions to Inject AI Prompts

    A proof-of-concept attack shows how threat actors can use a poisoned browser extension to inject malicious prompts into a generative AI tool.

    Read More Attackers Can Use Browser Extensions to Inject AI PromptsContinue

  • Blog

    Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools

    Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified as behind over a dozen technology patents, shedding light on the shadowy cyber contracting ecosystem and its offensive capabilities. The patents cover forensics and intrusion tools that enable encrypted endpoint data collection, Apple device forensics, and remote access…

    Read More Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage ToolsContinue

  • Blog

    Product Walkthrough: A Look Inside Pillar’s AI Security Platform

    In this article, we will provide a brief overview of Pillar Security’s platform to better understand how they are tackling AI security challenges. Pillar Security is building a platform to cover the entire software development and deployment lifecycle with the goal of providing trust in AI systems. Using its holistic approach, the platform introduces new…

    Read More Product Walkthrough: A Look Inside Pillar’s AI Security PlatformContinue

  • Blog

    Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome

    Apple on Tuesday released security updates for its entire software portfolio, including a fix for a vulnerability that Google said was exploited as a zero-day in the Chrome web browser earlier this month. The vulnerability, tracked as CVE-2025-6558 (CVSS score: 8.8), is an incorrect validation of untrusted input in the browser’s ANGLE and GPU components…

    Read More Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google ChromeContinue

  • Blog

    Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero

    Google has announced that it’s making a security feature called Device Bound Session Credentials (DBSC) in open beta to ensure that users are safeguarded against session cookie theft attacks. DBSC, first introduced as a prototype in April 2024, is designed to bind authentication sessions to a device so as to prevent threat actors from using…

    Read More Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project ZeroContinue

  • Blog

    African Orgs Fall to Mass Microsoft SharePoint Exploits

    The National Treasury of South Africa is among the half-dozen known victims in South Africa — along with other nations — of the mass compromise of on-premises Microsoft SharePoint servers.

    Read More African Orgs Fall to Mass Microsoft SharePoint ExploitsContinue

Page navigation

Previous PagePrevious 1 … 208 209 210 211 212 … 412 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us