Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials

    Cisco has released security updates to address a maximum-severity security flaw in Unified Communications Manager (Unified CM) and Unified Communications Manager Session Management Edition (Unified CM SME) that could permit an attacker to login to a susceptible device as the root user, allowing them to gain elevated privileges. The vulnerability, tracked as CVE-2025-20309, carries a…

    Read More Critical Cisco Vulnerability in Unified CM Grants Root Access via Static CredentialsContinue

  • Blog

    Qantas Airlines Breached, Impacting 6M Customers

    Passengers’ personal information was likely accessed via a third-party platform used at a call center, but didn’t include passport or credit card info.

    Read More Qantas Airlines Breached, Impacting 6M CustomersContinue

  • Blog

    Browser Extensions Pose Heightened, but Manageable, Security Risks

    Attackers can abuse malicious extensions to access critical data, including credentials, but organizations can reduce the risks by raising awareness and enforcing strict policy controls.

    Read More Browser Extensions Pose Heightened, but Manageable, Security RisksContinue

  • Blog

    Initial Access Broker Self-Patches Zero Days as Turf Control

    A likely China-nexus threat actor has been exploiting unpatched Ivanti vulnerabilities to gain initial access to victim networks and then patching the systems to block others from breaking in to the same network.

    Read More Initial Access Broker Self-Patches Zero Days as Turf ControlContinue

  • Blog

    US Treasury Sanctions BPH Provider Aeza Group

    In the past, the bulletproof group has been affiliated with many well-known ransomware and malware groups, such as BianLian and Lumma Stealer.

    Read More US Treasury Sanctions BPH Provider Aeza GroupContinue

  • Blog

    Russian APT ‘Gamaredon’ Hits Ukraine With Fierce Phishing

    A Russian APT known as “Gamaredon” is using spear-phishing attacks and network-drive weaponization to target government entities in Ukraine.

    Read More Russian APT ‘Gamaredon’ Hits Ukraine With Fierce PhishingContinue

  • Blog

    ClickFix Spin-off Attack Bypasses Key Browser Safeguards

    A new threat vector exploits how modern browsers save HTML files, bypassing Mark of the Web and giving attackers another social-engineering attack for delivering malware.

    Read More ClickFix Spin-off Attack Bypasses Key Browser SafeguardsContinue

  • Blog

    North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

    Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the Nim programming language, underscoring a constant evolution of their tactics. “Unusually for macOS malware, the threat actors employ a process injection technique and remote communications via wss, the TLS-encrypted version of the WebSocket protocol,”

    Read More North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark CampaignContinue

  • Blog

    1 Year Later: Lessons Learned From the CrowdStrike Outage

    The ever-growing volume of vulnerabilities and threats requires organizations to remain resilient and anti-fragile — that is, to be able to proactively respond to issues and continuously improve.

    Read More 1 Year Later: Lessons Learned From the CrowdStrike OutageContinue

  • Blog

    FileFix Attack Chain Enables Malicious Script Execution

    By using social engineering tactics, threat actors are able to manipulate their victims into saving and renaming files that will backfire against them.

    Read More FileFix Attack Chain Enables Malicious Script ExecutionContinue

Page navigation

Previous PagePrevious 1 … 236 237 238 239 240 … 411 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us