Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

    Cybersecurity researchers have discovered four malicious NuGet packages that are designed to target ASP.NET web application developers to steal sensitive data. The campaign, discovered by Socket, exfiltrates ASP.NET Identity data, including user accounts, role assignments, and permission mappings, as well as manipulates authorization rules to create persistent backdoors in victim applications.

    Read More Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped MalwareContinue

  • Blog

    ‘Richter Scale’ Model Measures Magnitude of OT Cyber Incidents

    ICS/OT experts have devised a scoring system for rating the severity and effects of cybersecurity events in operational technology environments.

    Read More ‘Richter Scale’ Model Measures Magnitude of OT Cyber IncidentsContinue

  • Blog

    Manual Processes Are Putting National Security at Risk

    Why automating sensitive data transfers is now a mission-critical priority More than half of national security organizations still rely on manual processes to transfer sensitive data, according to The CYBER360: Defending the Digital Battlespace report. This should alarm every defense and government leader because manual handling of sensitive data is not just inefficient, it is…

    Read More Manual Processes Are Putting National Security at RiskContinue

  • Blog

    Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

    A 39-year-old Australian national who was previously employed at U.S. defense contractor L3Harris has been sentenced to a little over seven years in prison for selling eight zero-day exploits to Russian exploit broker Operation Zero in exchange for millions of dollars. Peter Williams pleaded guilty to two counts of theft of trade secrets in October…

    Read More Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian BrokerContinue

  • Blog

    Operation Red Card 2.0 Leads to 651 Arrests in Africa

    In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than USD 4.3 million.

    Read More Operation Red Card 2.0 Leads to 651 Arrests in AfricaContinue

  • Blog

    SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

    SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below – CVE-2025-40538 – A broken access control vulnerability that allows an attacker to create a system…

    Read More SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code ExecutionContinue

  • Blog

    CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed vulnerability in FileZen to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2026-25108 (CVSS v4 score: 8.7), is a case of operating system (OS) command injection that could allow an authenticated user to execute

    Read More CISA Confirms Active Exploitation of FileZen CVE-2026-25108 VulnerabilityContinue

  • Blog

    Attackers Now Need Just 29 Minutes to Own a Network

    Credential misuse, AI tools, and security blind spots help attackers move through breached networks faster than ever, CrowdStrike finds.

    Read More Attackers Now Need Just 29 Minutes to Own a NetworkContinue

  • Blog

    Lazarus Group Picks a New Poison: Medusa Ransomware

    The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks.

    Read More Lazarus Group Picks a New Poison: Medusa RansomwareContinue

  • Blog

    RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

    A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence (AI)-driven vulnerability has been codenamed RoguePilot by Orca Security. It has since been patched by Microsoft following responsible disclosure. “Attackers can craft hidden instructions inside a

    Read More RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKENContinue

Page navigation

Previous PagePrevious 1 … 21 22 23 24 25 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us