Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on July 22, 2025, added two Microsoft SharePoint flaws, CVE-2025-49704 and CVE-2025-49706, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. To that end, Federal Civilian Executive Branch (FCEB) agencies are required to remediate identified vulnerabilities by July 23, 2025. “CISA is

    Read More CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live AttacksContinue

  • Blog

    Proof of Concept for Microsoft Word RTF Font Table Heap Corruption (CVE-2023-21716) Released

    Update 3/14 – Coverage section updated with available IPS signature.FortiGuard Labs is aware of a new proof of concept released over the weekend for CVE-2023-21716 (Microsoft Word Remote Code Execution Vulnerability).Patched in the February Microsoft Monthly Security Release, CVE-2023-21716 is a vulnerability within Microsoft Office’s wwlib which allows attackers to achieve remote code execution on…

    Read More Proof of Concept for Microsoft Word RTF Font Table Heap Corruption (CVE-2023-21716) ReleasedContinue

  • Blog

    China Introduces National Cyber ID Amid Privacy Concerns

    China officially rolled out a voluntary Internet identity system to protect citizens’ online identities and personal information, but critics worry about privacy and surveillance.

    Read More China Introduces National Cyber ID Amid Privacy ConcernsContinue

  • Blog

    Microsoft Integrates Data Lake With Sentinel SIEM

    Microsoft Sentinel Data Lake aims to provide inexpensive storage for large volumes of telemetry, while threat intelligence will be included with Defender XDR at no extra cost.

    Read More Microsoft Integrates Data Lake With Sentinel SIEMContinue

  • Blog

    Darktrace Acquires Mira Security for Network Visibility

    The acquisition gives the British cybersecurity solutions provider more insights into encrypted network traffic and additional decryption capabilities.

    Read More Darktrace Acquires Mira Security for Network VisibilityContinue

  • Blog

    3 China Nation-State Actors Target SharePoint Bugs

    Hackers and cybercrime groups are part of a virtual feeding frenzy, after Microsoft’s recent disclosure of new vulnerabilities in on-premises editions of SharePoint Server.

    Read More 3 China Nation-State Actors Target SharePoint BugsContinue

  • Blog

    Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups

    Microsoft has formally tied the exploitation of security flaws in internet-facing SharePoint Server instances to two Chinese hacking groups called Linen Typhoon and Violet Typhoon as early as July 7, 2025, corroborating earlier reports. The tech giant said it also observed a third China-based threat actor, which it tracks as Storm-2603, weaponizing the flaws as…

    Read More Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker GroupsContinue

  • Blog

    Dell Breached by Extortion Group, Says Data Stolen Was ‘Fake’

    The World Leaks group accessed and released data from the company’s Customer Solution Center, which is separated from customer and partner systems and stores primarily “synthetic” datasets used for demos and testing, Dell said.

    Read More Dell Breached by Extortion Group, Says Data Stolen Was ‘Fake’Continue

  • Blog

    Critical Infrastructure Security Is a Critical Concern

    To be truly resilient in the ever-growing threat landscape, organizations need to balance protection with preparation.

    Read More Critical Infrastructure Security Is a Critical ConcernContinue

  • Blog

    Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access

    Cisco on Monday updated its advisory of a set of recently disclosed security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) to acknowledge active exploitation. “In July 2025, the Cisco PSIRT [Product Security Incident Response Team], became aware of attempted exploitation of some of these vulnerabilities in the wild,” the company…

    Read More Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root AccessContinue

Page navigation

Previous PagePrevious 1 … 218 219 220 221 222 … 412 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us