Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    NSA, CISA Urge Organizations to Secure Data Used in AI Models

    New guidance includes a list of 10 best practices to protect sensitive data throughout the AI lifecycle as well as addressing supply chain and data poisoning risks.

    Read More NSA, CISA Urge Organizations to Secure Data Used in AI ModelsContinue

  • Blog

    Victoria’s Secret Goes Offline After ‘Incident’ Claims

    The lingerie retailer isn’t revealing much about the security incident it’s dealing with but has brought in third-party experts to address the issue.

    Read More Victoria’s Secret Goes Offline After ‘Incident’ ClaimsContinue

  • Blog

    New Botnet Plants Persistent Backdoors in ASUS Routers

    Thousands of ASUS routers have been infected and are believed to be part of a wide-ranging ORB network affecting devices from Linksys, D-Link, QNAP, and Araknis Network.

    Read More New Botnet Plants Persistent Backdoors in ASUS RoutersContinue

  • Blog

    SentinelOne Reports Services Are Back Online After Global Outage

    The outage reportedly hit 10 commercial customer consoles for SentinelOne’s Singularity platform, including Singularity Endpoint, XDR, Cloud Security, Identity, Data Lake, RemoteOps, and more.

    Read More SentinelOne Reports Services Are Back Online After Global OutageContinue

  • Blog

    Zscaler’s Buyout of Red Canary Shows Telemetry’s Value

    Red Canary’s MDR portfolio complements Zscaler’s purchase last year of Israeli startup Avalor, which automates collection, curation, and enrichment of security data.

    Read More Zscaler’s Buyout of Red Canary Shows Telemetry’s ValueContinue

  • Blog

    APT41 Uses Google Calendar Events for C2

    APT41, a Chinese state-sponsored threat actor also known as “Double Dragon,” used Google Calendar as command-and-control infrastructure during a campaign last fall.

    Read More APT41 Uses Google Calendar Events for C2Continue

  • Blog

    PumaBot Targets Linux Devices in Latest Botnet Campaign

    While the botnet may not be completely automated, it uses certain tactics when targeting devices that indicate that it may, at the very least, be semiautomated.

    Read More PumaBot Targets Linux Devices in Latest Botnet CampaignContinue

  • Blog

    LexisNexis Informs 360K+ Customers of Third-Party Data Leak

    While the leak affected customer data, LexisNexis said in a notification letter that its products and systems were not compromised.

    Read More LexisNexis Informs 360K+ Customers of Third-Party Data LeakContinue

  • Blog

    Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools

    Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and Lucky_Gh0$t ransomware families, and a new malware dubbed Numero. “CyberLock ransomware, developed using PowerShell, primarily focuses on encrypting specific files on the victim’s system,” Cisco Talos researcher…

    Read More Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular ToolsContinue

  • Blog

    A Defense-in-Depth Approach for the Modern Era

    By integrating intelligent network policies, zero-trust principles, and AI-driven insights, enterprises can create a robust defense against the next generation of cyber threats.

    Read More A Defense-in-Depth Approach for the Modern EraContinue

Page navigation

Previous PagePrevious 1 … 271 272 273 274 275 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us