Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

    Russian organizations have been targeted as part of an ongoing campaign that delivers a previously undocumented Windows spyware called Batavia. The activity, per cybersecurity vendor Kaspersky, has been active since July 2024. “The targeted attack begins with bait emails containing malicious links, sent under the pretext of signing a contract,” the Russian company said. “The…

    Read More Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian FirmsContinue

  • Blog

    CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of flaws is as follows – CVE-2014-3931 (CVSS score: 9.8) – A buffer overflow vulnerability in Multi-Router Looking Glass (MRLG) that could allow remote…

    Read More CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active ExploitationContinue

  • Blog

    TAG-140 Targets Indian Government Via ‘ClickFix-Style’ Lure

    The threat actors trick victims into opening a malicious script, leading to the execution of the BroaderAspect .NET loader.

    Read More TAG-140 Targets Indian Government Via ‘ClickFix-Style’ LureContinue

  • Blog

    Bert Blitzes Linux & Windows Systems

    The new ransomware strain’s aggressive multithreading and cross-platform capabilities make it a potent threat to enterprise environments.

    Read More Bert Blitzes Linux & Windows SystemsContinue

  • Blog

    DPRK macOS ‘NimDoor’ Malware Targets Web3, Crypto Platforms

    Researchers observed North Korean threat actors targeting cryptocurrency and Web3 platforms on Telegram using malicious Zoom meeting requests.

    Read More DPRK macOS ‘NimDoor’ Malware Targets Web3, Crypto PlatformsContinue

  • Blog

    Ransomware Attack Triggers Widespread Outage at Ingram Micro

    The outage began shortly before the July 4 holiday weekend and caused disruptions for customer ordering and other services provided by the IT distributor.

    Read More Ransomware Attack Triggers Widespread Outage at Ingram MicroContinue

  • Blog

    ‘Hunters International’ RaaS Group Closes Its Doors

    The announcement comes just months after security researchers observed that the group was making the transition to rebrand to World Leaks, a data theft outfit.

    Read More ‘Hunters International’ RaaS Group Closes Its DoorsContinue

  • Blog

    SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools

    Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization (SEO) poisoning techniques to deliver a known malware loader called Oyster (aka Broomstick or CleanUpLoader). The malvertising activity, per Arctic Wolf, promotes fake websites hosting trojanized versions of legitimate tools like PuTTY and WinSCP, aiming to trick software professionals

    Read More SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI ToolsContinue

  • Blog

    Chrome Store Features Extension Poisoned With Sophisticated Spyware

    A color picker for Google’s browser with more than 100,000 downloads hijacks sessions every time a user navigates to a new webpage and also redirects them to malicious sites.

    Read More Chrome Store Features Extension Poisoned With Sophisticated SpywareContinue

  • Blog

    Strengthening cyber resilience: Introducing Internal Attack Surface Management (IASM) for Sophos Managed Risk

    Enhanced vulnerability management delivered as a managed service.

    Read More Strengthening cyber resilience: Introducing Internal Attack Surface Management (IASM) for Sophos Managed RiskContinue

Page navigation

Previous PagePrevious 1 … 233 234 235 236 237 … 411 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us