Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Suspected Hacker Linked to Silk Typhoon Arrested in Milan

    The alleged Chinese state-sponsored hacker faces multiple charges, including wire fraud, aggravated identity theft, and unauthorized access to protected computers.

    Read More Suspected Hacker Linked to Silk Typhoon Arrested in MilanContinue

  • Blog

    Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

    In yet another instance of threat actors repurposing legitimate tools for malicious purposes, it has been discovered that hackers are exploiting a popular red teaming tool called Shellter to distribute stealer malware. The company behind the software said a company that had recently purchased Shellter Elite licenses leaked their copy, prompting malicious actors to weaponize…

    Read More Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT MalwareContinue

  • Blog

    Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play

    Cybersecurity researchers have discovered an Android banking malware campaign that has leveraged a trojan named Anatsa to target users in North America using malicious apps published on Google’s official app marketplace. The malware, disguised as a “PDF Update” to a document viewer app, has been caught serving a deceptive overlay when users attempt to access…

    Read More Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google PlayContinue

  • Blog

    Hackers ‘Shellter’ Various Stealers in Red Team Tool to Evade Detection

    Researchers have uncovered multiple campaigns spreading Lumma, Arechclient2, and Rhadamanthys malware by leveraging key features of the AV/EDR evasion framework.

    Read More Hackers ‘Shellter’ Various Stealers in Red Team Tool to Evade DetectionContinue

  • Blog

    4 Critical Steps in Advance of 47-Day SSL/TLS Certificates

    With certificate lifespans set to shrink by 2029, IT teams need to spend the next 100 days planning in order to avoid operational disruptions.

    Read More 4 Critical Steps in Advance of 47-Day SSL/TLS CertificatesContinue

  • Blog

    Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension

    Cybersecurity researchers have flagged a supply chain attack targeting a Microsoft Visual Studio Code (VS Code) extension called Ethcode that has been installed a little over 6,000 times. The compromise, per ReversingLabs, occurred via a GitHub pull request that was opened by a user named Airez299 on June 17, 2025. First released by 7finney in…

    Read More Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code ExtensionContinue

  • Blog

    Checking for Fraud: Texas Community Bank Nips Check Fraud in the Bud

    Within months of implementing anti-fraud measures and automation, Texas National Bank prevented more than $300,000 in check fraud.

    Read More Checking for Fraud: Texas Community Bank Nips Check Fraud in the BudContinue

  • Blog

    5 Ways Identity-based Attacks Are Breaching Retail

    From overprivileged admin roles to long-forgotten vendor tokens, these attackers are slipping through the cracks of trust and access. Here’s how five retail breaches unfolded, and what they reveal about… In recent months, major retailers like Adidas, The North Face, Dior, Victoria’s Secret, Cartier, Marks & Spencer, and Co‑op have all been breached. These attacks weren’t sophisticated

    Read More 5 Ways Identity-based Attacks Are Breaching RetailContinue

  • Blog

    RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

    Cybersecurity researchers are calling attention to a malware campaign that’s targeting security flaws in TBK digital video recorders (DVRs) and Four-Faith routers to rope the devices into a new botnet called RondoDox. The vulnerabilities in question include CVE-2024-3721, a medium-severity command injection vulnerability affecting TBK DVR-4104 and DVR-4216 DVRs, and CVE-2024-12856, an operating

    Read More RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS AttacksContinue

  • Blog

    BaitTrap: Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally

    A newly released report by cybersecurity firm CTM360 reveals a large-scale scam operation utilizing fake news websites—known as Baiting News Sites (BNS)—to deceive users into online investment fraud across 50 countries. These BNS pages are made to look like real news outlets: CNN, BBC, CNBC, or regional media. They publish fake stories that feature public…

    Read More BaitTrap: Over 17,000 Fake News Websites Caught Fueling Investment Fraud GloballyContinue

Page navigation

Previous PagePrevious 1 … 232 233 234 235 236 … 411 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us