Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure

    Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical User Interface (GUI) for Windows and Java that, if successfully exploited, could have enabled attackers to access sensitive information under certain conditions. The vulnerabilities, tracked as CVE-2025-0055 and CVE-2025-0056 (CVSS scores: 6.0), were patched by SAP as part of its monthly updates for January

    Read More Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data ExposureContinue

  • Blog

    XOR Marks the Flaw in SAP GUI

    The company has patched two vulnerabilities in its Graphical User Interface that would have allowed attackers to grab data from a user’s input history feature.

    Read More XOR Marks the Flaw in SAP GUIContinue

  • Blog

    Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

    Thousands of personal records allegedly linked to athletes and visitors of the Saudi Games have been published online by a pro-Iranian hacktivist group called Cyber Fattah. Cybersecurity company Resecurity said the breach was announced on Telegram on June 22, 2025, in the form of SQL database dumps, characterizing it as an information operation “carried out…

    Read More Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi GamesContinue

  • Blog

    Beware the Hidden Risk in Your Entra Environment

    If you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk.  A gap in access control in Microsoft Entra’s subscription handling is allowing guest users to create and transfer subscriptions into the tenant they are invited into, while maintaining full ownership of them.  All the guest…

    Read More Beware the Hidden Risk in Your Entra EnvironmentContinue

  • Blog

    SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

    Unknown threat actors have been distributing a trojanized version of SonicWall’s SSL VPN NetExtender application to steal credentials from unsuspecting users who may have installed it. “NetExtender enables remote users to securely connect and run applications on the company network,” SonicWall researcher Sravan Ganachari said. “Users can upload and download files, access network drives, and…

    Read More SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access AttacksContinue

  • Blog

    North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

    Cybersecurity researchers have uncovered a fresh batch of malicious npm packages linked to the ongoing Contagious Interview operation originating from North Korea. According to Socket, the ongoing supply chain attack involves 35 malicious packages that were uploaded from 24 npm accounts. These packages have been collectively downloaded over 4,000 times. The complete list of the…

    Read More North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm PackagesContinue

  • Blog

    Africa Sees Surge in Cybercrime as Law Enforcement Struggles

    Cybercrime accounts for more than 30% of all reported crime in East Africa and West Africa, with online scams, ransomware, business email compromise, and digital sextortion taking off.

    Read More Africa Sees Surge in Cybercrime as Law Enforcement StrugglesContinue

  • Blog

    Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options

    Microsoft on Tuesday announced that it’s extending Windows 10 Extended Security Updates (ESU) for an extra year by letting users either pay a small fee of $30 or by sync their PC settings to the cloud. The development comes ahead of the tech giant’s upcoming October 14, 2025, deadline, when it plans to officially end…

    Read More Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment OptionsContinue

  • Blog

    Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App

    A threat actor hacked a version of SonicWall’s NetExtender SSL VPN application in an effort to trick users into installing a Trojanized version of the product.

    Read More Threat Actor Trojanizes Copy of SonicWall NetExtender VPN AppContinue

  • Blog

    China-Nexus ‘LapDogs’ Network Thrives on Backdoored SOHO Devices

    The campaign infected devices in the US and Southeast Asia to build an operational relay box (ORB) network for use as an extensive cyber-espionage infrastructure.

    Read More China-Nexus ‘LapDogs’ Network Thrives on Backdoored SOHO DevicesContinue

Page navigation

Previous PagePrevious 1 … 244 245 246 247 248 … 411 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us