Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers

    Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS and PE headers, according to new findings from Fortinet. The DOS (Disk Operating System) and PE (Portable Executable) headers are essential parts of a Windows PE file, providing information about the executable. While the DOS header makes the…

    Read More New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE HeadersContinue

  • Blog

    DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints

    The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider’s (MSP) SimpleHelp remote monitoring and management (RMM) tool, and then leveraged it to exfiltrate data and drop the locker on multiple endpoints. It’s believed that the attackers exploited a trio of security flaws in SimpleHelp (CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726) that…

    Read More DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer EndpointsContinue

  • Blog

    ‘Haozi’ Gang Sells Turnkey Phishing Tools to Amateurs

    The phishing operation is using Telegram groups to sell a phishing-as-a-service kit with customer service, a mascot, and infrastructure that requires little technical knowledge to install.

    Read More ‘Haozi’ Gang Sells Turnkey Phishing Tools to AmateursContinue

  • Blog

    Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations

    Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called TOUGHPROGRESS that uses Google Calendar for command-and-control (C2). The tech giant, which discovered the activity in late October 2024, said the malware was hosted on a compromised government website and was used to target multiple other government entities….

    Read More Chinese APT41 Exploits Google Calendar for Malware Command-and-Control OperationsContinue

  • Blog

    Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

    Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that could be exploited by unauthenticated attackers to upload arbitrary files. TI WooCommerce Wishlist, which has over 100,000 active installations, is a tool to allow e-commerce site customers to save their favorite products for later and share the lists…

    Read More Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist PluginContinue

  • Blog

    Certified Randomness Uses Quantum Cryptography to Make Stronger Keys

    Researchers are using quantum computers to generate keys that are truly random to strengthen data encryption.

    Read More Certified Randomness Uses Quantum Cryptography to Make Stronger KeysContinue

  • Blog

    Hundreds of Web Apps Have Full Access to OneDrive Files

    Researchers at Oasis Security say the problem has to do with OneDrive File Picker having overly broad permissions.

    Read More Hundreds of Web Apps Have Full Access to OneDrive FilesContinue

  • Blog

    CISA Issues SOAR, SIEM Implementation Guidance

    The Cybersecurity and Infrastructure Security Agency (CISA) and Australian Cyber Security Centre (ACSC) recommend that organizations conduct thorough testing and manage costs, which can be hefty, before implementing the platforms.

    Read More CISA Issues SOAR, SIEM Implementation GuidanceContinue

  • Blog

    Implementing Secure by Design Principles for AI

    Harnessing AI’s full transformative potential safely and securely requires more than an incremental enhancement of existing cybersecurity practices. A Secure by Design approach represents the best path forward.

    Read More Implementing Secure by Design Principles for AIContinue

  • Blog

    Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore

    An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and extortion scheme involving the Robbinhood ransomware. Sina Gholinejad (aka Sina Ghaaf), 37, and his co-conspirators are said to have breached the computer networks of various organizations in the United States and encrypted files with Robbinhood ransomware to demand…

    Read More Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on BaltimoreContinue

Page navigation

Previous PagePrevious 1 … 272 273 274 275 276 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us