Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories 

    Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in number and frequency over the last few years. Some recent reports estimate that 83% of attacks involve compromised secrets. According to reports such as the…

    Read More Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories Continue

  • Blog

    ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more

    Ever wonder what happens when attackers don’t break the rules—they just follow them better than we do? When systems work exactly as they’re built to, but that “by design” behavior quietly opens the door to risk? This week brings stories that make you stop and rethink what’s truly under control. It’s not always about a…

    Read More ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and moreContinue

  • Blog

    FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering

    The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening its targeting footprint to strike the airline sector. To that end, the agency said it’s actively working with aviation and industry partners to combat the activity and help victims. “These actors rely on social engineering…

    Read More FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social EngineeringContinue

  • Blog

    GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool

    The threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a potent intelligence-gathering tool. “Recent campaigns in June 2025 demonstrate GIFTEDCROOK’s enhanced ability to exfiltrate a broad range of sensitive documents from the devices of targeted individuals, including potentially proprietary files and

    Read More GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering ToolContinue

  • Blog

    Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

    Facebook, the social network platform owned by Meta, is asking for users to upload pictures from their phones to suggest collages, recaps, and other ideas using artificial intelligence (AI), including those that have not been directly uploaded to the service. According to TechCrunch, which first reported the feature, users are being served a new pop-up…

    Read More Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy ConcernsContinue

  • Blog

    Top Apple, Google VPN Apps May Help China Spy on Users

    Apple and Google espouse strong values about data privacy, but they allow programs from a Big Brother state to thrive on their app stores, researchers allege.

    Read More Top Apple, Google VPN Apps May Help China Spy on UsersContinue

  • Blog

    ‘CitrixBleed 2’ Shows Signs of Active Exploitation

    If exploited, the critical vulnerability allows attackers to maintain access for longer periods of time than the original CitrixBleed flaw, all while remaining undetected.

    Read More ‘CitrixBleed 2’ Shows Signs of Active ExploitationContinue

  • Blog

    Scattered Spider Taps CFO Credentials in ‘Scorched Earth’ Attack

    In a recent intrusion, the notorious cybercriminal collective accessed CyberArk vaults and obtained more 1,400 secrets, subverted Azure, VMware, and Snowflake environments, and for the first known time, actively fought back against incident response teams.

    Read More Scattered Spider Taps CFO Credentials in ‘Scorched Earth’ AttackContinue

  • Blog

    Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign

    Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber espionage infrastructure campaign for China-nexus hacking groups. The Operational Relay Box (ORB) network has been codenamed LapDogs by SecurityScorecard’s STRIKE team. “The LapDogs network has a high concentration…

    Read More Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage CampaignContinue

  • Blog

    Hackers Make Hay? Smart Tractors Vulnerable to Full Takeover

    Hackers can spy on tens of thousands of connected tractors in the latest IoT threat, and brick them too, thanks to poor security in an aftermarket steering system.

    Read More Hackers Make Hay? Smart Tractors Vulnerable to Full TakeoverContinue

Page navigation

Previous PagePrevious 1 … 240 241 242 243 244 … 411 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us