Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

    Cybersecurity researchers have flagged a new malicious extension in the Open VSX registry that harbors a remote access trojan called SleepyDuck. According to Secure Annex’s John Tuckner, the extension in question, juan-bianco.solidity-vlang (version 0.0.7), was first published on October 31, 2025, as a completely benign library that was subsequently updated to version 0.0.8 on November…

    Read More Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server AliveContinue

  • Blog

    Let’s Get Physical: A New Convergence for Electrical Grid Security

    The power grid is being attacked online and IRL. Increasingly, regulators and industry experts agree: Security teams need to focus on both cyber and physical threats, together.

    Read More Let’s Get Physical: A New Convergence for Electrical Grid SecurityContinue

  • Blog

    Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks

    Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and management (RMM) software for financial gain and ultimately steal cargo freight. The threat cluster, believed to be active since at least June 2025 according to Proofpoint, is said to be collaborating with organized…

    Read More Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight NetworksContinue

  • Blog

    ⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

    Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems—some just hours after being found. No system was fully safe. From spying and fake job scams to strong ransomware and tricky phishing, the attacks came from all sides. Even encrypted…

    Read More ⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & MoreContinue

  • Blog

    AI Developed Code: 5 Critical Security Checkpoints for Human Oversight

    To write secure code with LLMs developers must have the skills to use AI as a collaborative assistant rather than an autonomous tool, Madou argues.

    Read More AI Developed Code: 5 Critical Security Checkpoints for Human OversightContinue

  • Blog

    The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations

    Security Operations Centers (SOC) today are overwhelmed. Analysts handle thousands of alerts every day, spending much time chasing false positives and adjusting detection rules reactively. SOCs often lack the environmental context and relevant threat intelligence needed to quickly verify which alerts are truly malicious. As a result, analysts spend excessive time manually triaging alerts, the

    Read More The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security OperationsContinue

  • Blog

    Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data

    Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting sensitive data from compromised devices. According to CYFIRMA, which analyzed three different samples of BankBot-YNRK, the malware incorporates features to sidestep analysis efforts by first checking its running within a virtualized or emulated environment

    Read More Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial DataContinue

  • Blog

    ‘TruffleNet’ Attack Wields Stolen Credentials Against AWS

    Reconnaissance and BEC are among the malicious activities attackers commit after compromising cloud accounts, using a framework based on the TruffleHog tool.

    Read More ‘TruffleNet’ Attack Wields Stolen Credentials Against AWSContinue

  • Blog

    New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea

    The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely spear-phishing attack targeting a single victim in South Korea. Gen Digital, which disclosed details of the activity, did not reveal any details on when the incident occurred, but noted that the phishing email contained…

    Read More New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South KoreaContinue

  • Blog

    ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

    The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE devices in the country with a previously undocumented implant known as BADCANDY. The activity, per the intelligence agency, involves the exploitation of CVE-2023-20198 (CVSS score: 10.0), a critical vulnerability that allows a remote, unauthenticated attacker to create…

    Read More ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE VulnerabilityContinue

Page navigation

Previous PagePrevious 1 … 23 24 25 26 27 … 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us