Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Backdoored Malware Reels in Newbie Cybercriminals

    Sophos researchers found this operation has similarities or connections to many other campaigns targeting GitHub repositories dating back to August 2022.

    Read More Backdoored Malware Reels in Newbie CybercriminalsContinue

  • Blog

    Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials

    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. “Several widely used extensions […] unintentionally transmit sensitive data over simple HTTP,” Yuanjing Guo, a security researcher in the Symantec’s Security Technology and Response

    Read More Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded CredentialsContinue

  • Blog

    Questions Swirl Around ConnectWise Flaw Used in Attacks

    ConnectWise issued a patch to stave off attacks on ScreenConnect customers, but the company’s disclosures don’t explain what the vulnerability is and when it was first exploited.

    Read More Questions Swirl Around ConnectWise Flaw Used in AttacksContinue

  • Blog

    Finding Balance in US AI Regulation

    The US can’t afford to wait for political consensus to catch up to technological change.

    Read More Finding Balance in US AI RegulationContinue

  • Blog

    Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

    The threat actor known as Bitter has been assessed to be a state-backed hacking group that’s tasked with gathering intelligence that aligns with the interests of the Indian government. That’s according to new findings jointly published by Proofpoint and Threatray in an exhaustive two-part analysis. “Their diverse toolset shows consistent coding patterns across malware families,…

    Read More Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope ExpandsContinue

  • Blog

    Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation

    Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business getting in return? CISOs respond with reports on controls and vulnerability counts – but executives want to understand risk in terms of financial exposure, operational…

    Read More Redefining Cyber Value: Why Business Impact Should Lead the Security ConversationContinue

  • Blog

    Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware

    An Iran-aligned hacking group has been attributed to a new set of cyber attacks targeting Kurdish and Iraqi government officials in early 2024. The activity is tied to a threat group ESET tracks as BladedFeline, which is assessed with medium confidence to be a sub-cluster within OilRig, a known Iranian nation-state cyber actor. It’s said…

    Read More Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal MalwareContinue

  • Blog

    DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown

    The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of cryptocurrency funds and about 145 clearnet and dark web domains associated with an illicit carding marketplace called BidenCash. “The operators of the BidenCash marketplace use the platform to simplify the process of buying and selling stolen credit cards and associated personal information,” the…

    Read More DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global TakedownContinue

  • Blog

    Iranian APT ‘BladedFeline’ Hides in Network for 8 Years

    ESET published research on the Iranian APT “BladedFeline,” which researchers believe is a subgroup of the cyber-espionage entity APT34.

    Read More Iranian APT ‘BladedFeline’ Hides in Network for 8 YearsContinue

  • Blog

    Cybersecurity Training in Africa Aims to Bolster Professionals’ Ranks

    The United Nations, Carnegie Mellon University, and private organizations are all aiming to train the next generation of cybersecurity experts, boost economies, and disrupt pipelines to armed groups.

    Read More Cybersecurity Training in Africa Aims to Bolster Professionals’ RanksContinue

Page navigation

Previous PagePrevious 1 … 263 264 265 266 267 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us