Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

    Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware. The DomainTools Investigations (DTI) team said it identified “malicious multi-stage downloader Powershell scripts” hosted on lure websites that masquerade as Gitcode and DocuSign….

    Read More Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell AttackContinue

  • Blog

    Is Your CISO Navigating Your Flight Path?

    If your CISO isn’t wielding influence with the CEO and helping top leaders clearly see the flight path ahead, your company is dangerously exposed.

    Read More Is Your CISO Navigating Your Flight Path?Continue

  • Blog

    Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code

    Cybersecurity researchers have disclosed details of a critical security flaw in the Roundcube webmail software that has gone unnoticed for a decade and could be exploited to take over susceptible systems and execute arbitrary code. The vulnerability, tracked as CVE-2025-49113, carries a CVSS score of 9.9 out of 10.0. It has been described as a…

    Read More Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious CodeContinue

  • Blog

    Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization

    In the wake of high-profile attacks on UK retailers Marks & Spencer and Co-op, Scattered Spider has been all over the media, with coverage spilling over into the mainstream news due to the severity of the disruption caused — currently looking like hundreds of millions in lost profits for M&S alone.  This coverage is extremely…

    Read More Scattered Spider: Understanding Help Desk Scams and How to Defend Your OrganizationContinue

  • Blog

    Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets

    A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to target users in Europe and South America. The malware, according to a new report published by ThreatFabric, has also adopted improved obfuscation techniques to hinder analysis and detection, and includes the ability to create new contacts in the…

    Read More Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto WalletsContinue

  • Blog

    Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues

    Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing “patterns of concerning behavior observed over the past year.” The changes are expected to be introduced in Chrome 139, which is scheduled for public release in early August 2025. The current major version is 137.  The update…

    Read More Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct IssuesContinue

  • Blog

    Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues

    Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing “patterns of concerning behavior observed over the past year.” The changes are expected to be introduced in Chrome 139, which is scheduled for public release in early August 2025. The current major version is 137.  The update…

    Read More Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct IssuesContinue

  • Blog

    Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion

    Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping. “By mapping where our knowledge of these actors align, we will provide security professionals with the ability to connect insights faster and make decisions with greater confidence,” Vasu Jakkal, corporate…

    Read More Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution ConfusionContinue

  • Blog

    Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion

    Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping. “By mapping where our knowledge of these actors align, we will provide security professionals with the ability to connect insights faster and make decisions with greater confidence,” Vasu Jakkal, corporate…

    Read More Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution ConfusionContinue

  • Blog

    New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch

    Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild. The high-severity flaw is being tracked as CVE-2025-5419, and has been flagged as an out-of-bounds read and write vulnerability in the V8 JavaScript and WebAssembly engine. “Out…

    Read More New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band PatchContinue

Page navigation

Previous PagePrevious 1 … 266 267 268 269 270 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us