Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware

    Threat actors have been observed exploiting a now-patched critical SAP NetWeaver flaw to deliver the Auto-Color backdoor in an attack targeting a U.S.-based chemicals company in April 2025. “Over the course of three days, a threat actor gained access to the customer’s network, attempted to download several suspicious files and communicated with malicious infrastructure linked…

    Read More Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color MalwareContinue

  • Blog

    Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure

    Google Cloud’s Mandiant Consulting has revealed that it has witnessed a drop in activity from the notorious Scattered Spider group, but emphasized the need for organizations to take advantage of the lull to shore up their defenses. “Since the recent arrests tied to the alleged Scattered Spider (UNC3944) members in the U.K., Mandiant Consulting hasn’t…

    Read More Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security PressureContinue

  • Blog

    Nimble ‘Gunra’ Ransomware Evolves With Linux Variant

    The emerging cybercriminal gang, which initially targeted Microsoft Windows systems, is looking to go cross-platform using sophisticated, multithread encryption.

    Read More Nimble ‘Gunra’ Ransomware Evolves With Linux VariantContinue

  • Blog

    GOLD BLADE Remote DLL Sideloading Attack Deploys RedLoader

    Attacks surged in July 2025 after the threat group updated its process to combine malicious LNK files and a recycled WebDAV technique

    Read More GOLD BLADE Remote DLL Sideloading Attack Deploys RedLoaderContinue

  • Blog

    Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44

    Cybersecurity researchers have disclosed a now-patched critical security flaw in a popular vibe coding platform called Base44 that could allow unauthorized access to private applications built by its users. “The vulnerability we discovered was remarkably simple to exploit — by providing only a non-secret app_id value to undocumented registration and email verification endpoints, an attacker

    Read More Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44Continue

  • Blog

    PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain

    The maintainers of the Python Package Index (PyPI) repository have issued a warning about an ongoing phishing attack that’s targeting users in an attempt to redirect them to fake PyPI sites. The attack involves sending email messages bearing the subject line “[PyPI] Email verification” that are sent from the email address noreply@pypj[.]org (note that the…

    Read More PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike DomainContinue

  • Blog

    The Hidden Threat of Rogue Access

    With the right IGA tools, governance policies, and risk thresholds, enterprises can continuously detect and act on rogue access before attackers do.

    Read More The Hidden Threat of Rogue AccessContinue

  • Blog

    Critical Flaw in Vibe-Coding Platform Base44 Exposed Apps

    A now-patched authentication issue on the popular vibe-coding platform gave unauthorized users open access to any private application on Base44.

    Read More Critical Flaw in Vibe-Coding Platform Base44 Exposed AppsContinue

  • Blog

    Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims

    A newly emerged ransomware-as-a-service (RaaS) gang called Chaos is likely made up of former members of the BlackSuit crew, as the latter’s dark web infrastructure has been the subject of a law enforcement seizure. Chaos, which sprang forth in February 2025, is the latest entrant in the ransomware landscape to conduct big-game hunting and double…

    Read More Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. VictimsContinue

  • Blog

    Supply Chain Attacks Spotted in GitHub Actions, Gravity Forms, npm

    Researchers discovered backdoors, poisoned code, and malicious commits in some of the more popular tool developers, jeopardizing software supply chains.

    Read More Supply Chain Attacks Spotted in GitHub Actions, Gravity Forms, npmContinue

Page navigation

Previous PagePrevious 1 … 209 210 211 212 213 … 412 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us