Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    ‘Hazy Hawk’ Cybercrime Gang Swoops In for Cloud Resources

    Since December 2023, the threat group has preyed on domains belonging to the US Centers for Disease Control and Prevention (CDC) and numerous other reputable organizations worldwide to redirect users to malicious sites.

    Read More ‘Hazy Hawk’ Cybercrime Gang Swoops In for Cloud ResourcesContinue

  • Blog

    Why Rigid Security Programs Keep Failing

    Organizations that stay ahead of attacks won’t be the most compliant ones — they’ll be the ones most honest about what actually works.

    Read More Why Rigid Security Programs Keep FailingContinue

  • Blog

    Novel Phishing Attack Combines AES With Poisoned npm Packages

    Researchers discovered a phishing attack in the wild that takes multiple well-tread technologies like open source packages and AES encryption and combines them.

    Read More Novel Phishing Attack Combines AES With Poisoned npm PackagesContinue

  • Blog

    South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware

    High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the target of a new campaign orchestrated by a threat actor known as SideWinder. “The attackers used spear phishing emails paired with geofenced payloads to ensure that only victims in specific countries received the malicious content,” Acronis researchers Santiago Pontiroli, Jozsef Gegeny, and…

    Read More South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom MalwareContinue

  • Blog

    AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

    Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate privileges, manipulate other AWS services, and, in some cases, even fully compromise AWS accounts. “These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full…

    Read More AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service ExploitationContinue

  • Blog

    The Crowded Battle: Key Insights from the 2025 State of Pentesting Report

    In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISOs from global enterprises (200 from within the USA) to understand the strategies, tactics, and tools they use to cope with the thousands of security alerts, the persisting breaches and the growing cyber risks they have to handle. The findings reveal a complex…

    Read More The Crowded Battle: Key Insights from the 2025 State of Pentesting ReportContinue

  • Blog

    Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization

    Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed international organization in Saudi Arabia with a previously undocumented backdoor dubbed MarsSnake. ESET, which first discovered the hacking group’s intrusions targeting the entity in March 2023 and again a year later, said the activity leverages spear-phishing emails using

    Read More Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi OrganizationContinue

  • Blog

    Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

    Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that’s targeting publicly accessible Redis servers. The malicious activity has been codenamed RedisRaider by Datadog Security Labs. “RedisRaider aggressively scans randomized portions of the IPv4 space and uses legitimate Redis configuration commands to execute malicious cron jobs on vulnerable systems,”

    Read More Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration AbuseContinue

  • Blog

    Sophos Partners with Capsule on New Cyber Insurance Program

    The partnership rewards real-world, observable security controls, while removing the traditional barriers to insurance coverage.

    Read More Sophos Partners with Capsule on New Cyber Insurance ProgramContinue

  • Blog

    Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts

    Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as checker tools to validate stolen email addresses against TikTok and Instagram APIs. All three packages are no longer available on PyPI. The names of the Python packages are below – checker-SaGaF (2,605 downloads) steinlurks (1,049 downloads) sinnercore (3,300…

    Read More Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User AccountsContinue

Page navigation

Previous PagePrevious 1 … 283 284 285 286 287 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us