Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    GodFather Banking Trojan Debuts Virtualization Tactic

    The Android malware is targeting Turkish financial institutions, completely taking over legitimate banking and crypto apps by creating an isolated virtualized environment on a device.

    Read More GodFather Banking Trojan Debuts Virtualization TacticContinue

  • Blog

    New Tool Traps Jitters to Detect Beacons

    Concerned by rapidly evolving evasion tactics, the new Jitter-Trap tool from Varonis aims to help organizations detect beacons that help attackers establish communication inside a victim network.

    Read More New Tool Traps Jitters to Detect BeaconsContinue

  • Blog

    New Tool Traps Jitters to Detect Beacons

    Concerned by rapidly evolving evasion tactics, the new Jitter-Trap tool from Varonis aims to help organizations detect beacons that help attackers establish communication inside a victim network.

    Read More New Tool Traps Jitters to Detect BeaconsContinue

  • Blog

    New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains

    A new campaign is making use of Cloudflare Tunnel subdomains to host malicious payloads and deliver them via malicious attachments embedded in phishing emails. The ongoing campaign has been codenamed SERPENTINE#CLOUD by Securonix. It leverages “the Cloudflare Tunnel infrastructure and Python-based loaders to deliver memory-injected payloads through a chain of shortcut files and obfuscated

    Read More New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing ChainsContinue

  • Blog

    1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub

    A new multi-stage malware campaign is targeting Minecraft users with a Java-based malware that employs a distribution-as-service (DaaS) offering called Stargazers Ghost Network. “The campaigns resulted in a multi-stage attack chain targeting Minecraft users specifically,” Check Point researchers Jaromír Hořejší and Antonis Terefos said in a report shared with The Hacker News. “The malware was

    Read More 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHubContinue

  • Blog

    How CISOs Can Govern AI & Meet Evolving Regulations

    Security teams are no longer just the last line of defense — they are the foundation for responsible AI adoption.

    Read More How CISOs Can Govern AI & Meet Evolving RegulationsContinue

  • Blog

    Serpentine#Cloud Uses Cloudflare Tunnels in Sneak Attacks

    An unidentified threat actor is using .lnk Windows shortcut files in a series of sophisticated attacks utilizing in-memory code execution and living-off-the-land cyberattack strategies.

    Read More Serpentine#Cloud Uses Cloudflare Tunnels in Sneak AttacksContinue

  • Blog

    FedRAMP at Startup Speed: Lessons Learned

    For organizations eyeing the federal market, FedRAMP can feel like a gated fortress. With strict compliance requirements and a notoriously long runway, many companies assume the path to authorization is reserved for the well-resourced enterprise. But that’s changing. In this post, we break down how fast-moving startups can realistically achieve FedRAMP Moderate authorization without derailing

    Read More FedRAMP at Startup Speed: Lessons LearnedContinue

  • Blog

    Water Curse Hijacks 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign

    Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub repositories to deliver multi-stage malware. “The malware enables data exfiltration (including credentials, browser data, and session tokens), remote access, and long-term persistence on infected systems,” Trend Micro researchers Jovit Samaniego, Aira Marcelo, Mohamed

    Read More Water Curse Hijacks 76 GitHub Accounts to Deliver Multi-Stage Malware CampaignContinue

  • Blog

    Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

    A former U.S. Central Intelligence Agency (CIA) analyst has been sentenced to little more than three years in prison for unlawfully retaining and transmitting top secret National Defense Information (NDI) to people who were not entitled to receive them and for attempting to cover up the malicious activity. Asif William Rahman, 34, of Vienna, has…

    Read More Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense DocumentsContinue

Page navigation

Previous PagePrevious 1 … 250 251 252 253 254 … 411 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us