Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

    Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken steps to revoke a small number of tokens that were leaked within Visual Studio Code (VS Code) extensions published in the marketplace. The action comes following a report from cloud security company Wiz earlier this month, which found several extensions from both…

    Read More Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz DiscoveryContinue

  • Blog

    CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Broadcom VMware Tools and VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild. The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), which could be exploited by an attacker to…

    Read More CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active AttacksContinue

  • Blog

    A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do

    A design firm is editing a new campaign video on a MacBook Pro. The creative director opens a collaboration app that quietly requests microphone and camera permissions. MacOS is supposed to flag that, but in this case, the checks are loose. The app gets access anyway. On another Mac in the same office, file sharing…

    Read More A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers DoContinue

  • Blog

    Zombie Projects Rise Again to Undermine Security

    Companies left them for dead, but the remnants of old infrastructure and failed projects continue to haunt businesses’ security teams.

    Read More Zombie Projects Rise Again to Undermine SecurityContinue

  • Blog

    An 18-Year-Old Codebase Left Smart Buildings Wide Open

    Researcher Gjoko Krstic’s “Project Brainfog” exposed hundreds of zero-day vulnerabilities in building-automation systems still running hospitals, schools, and offices worldwide.

    Read More An 18-Year-Old Codebase Left Smart Buildings Wide OpenContinue

  • Blog

    Claroty Patches Authentication Bypass Flaw

    CVE-2025-54603 gave attackers an opening to disrupt critical operational technology (OT) environments and steal data from them.

    Read More Claroty Patches Authentication Bypass FlawContinue

  • Blog

    LotL Attack Hides Malware in Windows Native AI Stack

    Security programs trust AI data files, but they shouldn’t: they can conceal malware more stealthily than most file types.

    Read More LotL Attack Hides Malware in Windows Native AI StackContinue

  • Blog

    BRONZE BUTLER exploits Japanese asset management software vulnerability

    The threat group targeted a LANSCOPE zero-day vulnerability (CVE-2025-61932)

    Read More BRONZE BUTLER exploits Japanese asset management software vulnerabilityContinue

  • Blog

    Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

    Google on Thursday revealed that the scam defenses built into Android safeguard users around the world from more than 10 billion suspected malicious calls and messages every month. The tech giant also said it has blocked over 100 million suspicious numbers from using Rich Communication Services (RCS), an evolution of the SMS protocol, thereby preventing…

    Read More Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a MonthContinue

  • Blog

    Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

    The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are related to Russian ransomware gangs. AdaptixC2 is an emerging extensible post-exploitation and adversarial emulation framework designed for penetration testing. While the server component is written in Golang, the GUI Client is written in…

    Read More Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced AttacksContinue

Page navigation

Previous PagePrevious 1 … 25 26 27 28 29 … 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us