Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Marine Transportation Final Cyber Rule Goes Into Effect

    The cybersecurity rule has several requirements that must be met and will follow an extended timeline over the next two years.

    Read More Marine Transportation Final Cyber Rule Goes Into EffectContinue

  • Blog

    How to Advance from SOC Manager to CISO?

    Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant career leap. Not only do you need a solid foundation of tech knowledge but also leadership skills and business smarts.  This article will guide you through the practical steps and skills you’ll need to…

    Read More How to Advance from SOC Manager to CISO?Continue

  • Blog

    China-Backed APT41 Cyberattack Surfaces in Africa

    Up to now, the prolific China-sponsored cyber-espionage group has been mostly absent from the region, but a sophisticated and highly targeted attack on an African IT company shows Beijing is branching out.

    Read More China-Backed APT41 Cyberattack Surfaces in AfricaContinue

  • Blog

    Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access

    The recently disclosed critical Microsoft SharePoint vulnerability has been under exploitation as early as July 7, 2025, according to findings from Check Point Research. The cybersecurity company said it observed first exploitation attempts targeting an unnamed major Western government, with the activity intensifying on July 18 and 19, spanning government, telecommunications, and software

    Read More Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent AccessContinue

  • Blog

    Human Digital Twins Could Give Attackers a Dangerous Advantage

    While this emerging technology offers many benefits, digital twins also have several drawbacks, as these convincing impersonations can be used in social engineering attacks.

    Read More Human Digital Twins Could Give Attackers a Dangerous AdvantageContinue

  • Blog

    Malicious Implants Are Coming to AI Components, Applications

    A red teamer is publishing research next month about how weaknesses in modern security products lay the groundwork for stealthy implants in AI-powered applications.

    Read More Malicious Implants Are Coming to AI Components, ApplicationsContinue

  • Blog

    Europol Sting Leaves Russian Cybercrime’s ‘NoName057(16)’ Group Fractured

    National authorities have issued seven arrest warrants in total relating to the cybercrime collective known as NoName057(16), which recruits followers to carry out DDoS attacks on perceived enemies of Russia.

    Read More Europol Sting Leaves Russian Cybercrime’s ‘NoName057(16)’ Group FracturedContinue

  • Blog

    Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents

    Cybersecurity researchers have unearthed new Android spyware artifacts that are likely affiliated with the Iranian Ministry of Intelligence and Security (MOIS) and have been distributed to targets by masquerading as VPN apps and Starlink, a satellite internet connection service offered by SpaceX. Mobile security vendor Lookout said it discovered four samples of a surveillanceware tool…

    Read More Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on DissidentsContinue

  • Blog

    China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure

    The China-linked cyber espionage group tracked as APT41 has been attributed to a new campaign targeting government IT services in the African region. “The attackers used hardcoded names of internal services, IP addresses, and proxy servers embedded within their malware,” Kaspersky researchers Denis Kulik and Daniil Pogorelov said. “One of the C2s [command-and-control servers] was…

    Read More China-Linked Hackers Launch Targeted Espionage Campaign on African IT InfrastructureContinue

  • Blog

    SharePoint ‘ToolShell’ vulnerabilities being exploited in the wild

    Sophos X-Ops sees exploitation across multiple customer estates

    Read More SharePoint ‘ToolShell’ vulnerabilities being exploited in the wildContinue

Page navigation

Previous PagePrevious 1 … 219 220 221 222 223 … 412 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us