Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

    The U.S. House of Representatives has formally banned congressional staff members from using WhatsApp on government-issued devices, citing security concerns. The development was first reported by Axios. The decision, according to the House Chief Administrative Officer (CAO), was motivated by worries about the app’s security. “The Office of Cybersecurity has deemed WhatsApp a high-risk to…

    Read More U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection IssuesContinue

  • Blog

    APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

    The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new cyber attack campaign by the Russia-linked APT28 (aka UAC-0001) threat actors using Signal chat messages to deliver two new malware families dubbed BEARDSHELL and COVENANT. BEARDSHELL, per CERT-UA, is written in C++ and offers the ability to download and execute PowerShell scripts,…

    Read More APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in UkraineContinue

  • Blog

    China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

    The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory warning of cyber attacks mounted by the China-linked Salt Typhoon actors to breach major global telecommunications providers as part of a cyber espionage campaign. The attackers exploited a critical Cisco IOS XE software (CVE-2023-20198, CVSS score: 10.0)…

    Read More China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian TelecomContinue

  • Blog

    SparkKitty Swipes Pics from iOS, Android Devices

    Like its predecessor, SparkCat, the new malware appears to be going after sensitive data — such as seed phrases for cryptocurrency wallets — in device photo galleries.

    Read More SparkKitty Swipes Pics from iOS, Android DevicesContinue

  • Blog

    ‘Echo Chamber’ Attack Blows Past AI Guardrails

    An AI security researcher has developed a proof of concept that uses subtle, seemingly benign prompts to get GPT and Gemini to generate inappropriate content.

    Read More ‘Echo Chamber’ Attack Blows Past AI GuardrailsContinue

  • Blog

    Citrix Patches Critical Vulns in NetScaler ADC and Gateway

    Citrix is recommending its customers upgrade their appliances to mitigate potential exploitation of the vulnerabilities.

    Read More Citrix Patches Critical Vulns in NetScaler ADC and GatewayContinue

  • Blog

    DHS Warns of Rise in Cyberattacks in Light of US-Iran Conflict

    After President’s Trump decision to enter the US into the conflict in the Middle East, the Department of Homeland Security expects there to be an uptick in Iranian hacktivists and state-sponsored actors targeting US systems.

    Read More DHS Warns of Rise in Cyberattacks in Light of US-Iran ConflictContinue

  • Blog

    Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content

    Cybersecurity researchers are calling attention to a new jailbreaking method called Echo Chamber that could be leveraged to trick popular large language models (LLMs) into generating undesirable responses, irrespective of the safeguards put in place. “Unlike traditional jailbreaks that rely on adversarial phrasing or character obfuscation, Echo Chamber weaponizes indirect references, semantic

    Read More Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful ContentContinue

  • Blog

    DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

    The United States government has warned of cyber attacks mounted by pro-Iranian groups after it launched airstrikes on Iranian nuclear sites as part of the Iran–Israel war that commenced on June 13, 2025. Stating that the ongoing conflict has created a “heightened threat environment” in the country, the Department of Homeland Security (DHS) said in…

    Read More DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear StrikesContinue

  • Blog

    Attackers Use Docker APIs, Tor Anonymity in Stealthy Crypto Heist

    The attack is similar to previous campaigns by an actor called Commando Cat to use misconfigured APIs to compromise containers and deploy cryptocurrency miners.

    Read More Attackers Use Docker APIs, Tor Anonymity in Stealthy Crypto HeistContinue

Page navigation

Previous PagePrevious 1 … 246 247 248 249 250 … 411 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us