Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    MITRE Launches AADAPT Framework for Financial Systems

    The new framework is modeled after and meant to complement the MITRE ATT&CK framework, and it is aimed at detecting and responding to cyberattacks on cryptocurrency assets and other financial targets.

    Read More MITRE Launches AADAPT Framework for Financial SystemsContinue

  • Blog

    State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

    Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive information by means of a previously undocumented Windows backdoor dubbed HazyBeacon. The activity is being tracked by Palo Alto Networks Unit 42 under the moniker CL-STA-1020, where “CL” stands for “cluster” and “STA” refers to “state-backed motivation.” “The…

    Read More State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian GovernmentsContinue

  • Blog

    Securing Agentic AI: How to Protect the Invisible Identity Access

    AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can’t easily see. These “invisible” non-human identities (NHIs) now outnumber human accounts in most cloud…

    Read More Securing Agentic AI: How to Protect the Invisible Identity AccessContinue

  • Blog

    AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

    Cybersecurity researchers have charted the evolution of a widely used remote access trojan called AsyncRAT, which was first released on GitHub in January 2019 and has since served as the foundation for several other variants. “AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into…

    Read More AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the GlobeContinue

  • Blog

    North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

    The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of 67 malicious packages to the npm registry, underscoring ongoing attempts to poison the open-source ecosystem via software supply chain attacks. The packages, per Socket, have attracted more than 17,000 downloads, and incorporate a previously undocumented version of…

    Read More North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack CampaignContinue

  • Blog

    Web-Inject Campaign Debuts Fresh Interlock RAT Variant

    A cyber-threat campaign is using legitimate websites to inject victims with remote access Trojans belonging to the Interlock ransomware group, in order to gain control of devices.

    Read More Web-Inject Campaign Debuts Fresh Interlock RAT VariantContinue

  • Blog

    Military Veterans May Be What Cybersecurity Is Looking For

    As the field struggles with a shortage, programs that aim to provide veterans with the technical skills needed to succeed in cybersecurity may be the solution for everyone.

    Read More Military Veterans May Be What Cybersecurity Is Looking ForContinue

  • Blog

    Google Gemini AI Bug Allows Invisible, Malicious Prompts

    A prompt-injection vulnerability in the AI assistant allows attackers to create messages that appear to be legitimate Google Security alerts but instead can be used to target users across various Google products with vishing and phishing.

    Read More Google Gemini AI Bug Allows Invisible, Malicious PromptsContinue

  • Blog

    The Unusual Suspect: Git Repos

    While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core systems Git is the backbone of modern software development, hosting millions of repositories and serving thousands of organizations worldwide. Yet, amid the daily hustle of shipping

    Read More The Unusual Suspect: Git ReposContinue

  • Blog

    New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries

    Threat actors behind the Interlock ransomware group have unleashed a new PHP variant of its bespoke remote access trojan (RAT) as part of a widespread campaign using a variant of ClickFix called FileFix. “Since May 2025, activity related to the Interlock RAT has been observed in connection with the LandUpdate808 (aka KongTuke) web-inject threat clusters,”…

    Read More New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple IndustriesContinue

Page navigation

Previous PagePrevious 1 … 226 227 228 229 230 … 411 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us