Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

    Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as an operating system information utility to stealthily drop a next-stage payload onto compromised systems. “This campaign employs clever Unicode-based steganography to hide its initial malicious code and utilizes a Google Calendar event short link as a dynamic dropper for its final

    Read More Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 DropperContinue

  • Blog

    New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

    Google on Wednesday released updates to address four security issues in its Chrome web browser, including one for which it said there exists an exploit in the wild. The high-severity vulnerability, tracked as CVE-2025-4664 (CVSS score: 4.3), has been characterized as a case of insufficient policy enforcement in a component called Loader. “Insufficient policy enforcement…

    Read More New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer PolicyContinue

  • Blog

    Infosec Layoffs Aren’t the Bargain That Boards May Think

    Salary savings come with hidden costs, including insider threats and depleted cybersecurity defenses, conveying advantages to skilled adversaries, experts argue.

    Read More Infosec Layoffs Aren’t the Bargain That Boards May ThinkContinue

  • Blog

    AI Agents May Have a Memory Problem

    A new study by researchers at Princeton University and Sentient shows it’s surprisingly easy to trigger malicious behavior from AI agents by implanting fake “memories” into the data they rely on for making decisions.

    Read More AI Agents May Have a Memory ProblemContinue

  • Blog

    Ivanti EPMM Zero-Day Flaws Exploited in Chained Attack

    The security software maker said the vulnerabilities in Endpoint Manager Mobile have been exploited in the wild against “a very limited number of customers” — for now — and stem from open source libraries.

    Read More Ivanti EPMM Zero-Day Flaws Exploited in Chained AttackContinue

  • Blog

    Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit

    Samsung has released software updates to address a critical security flaw in MagicINFO 9 Server that has been actively exploited in the wild. The vulnerability, tracked as CVE-2025-4632 (CVSS score: 9.8), has been described as a path traversal flaw. “Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version…

    Read More Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 ExploitContinue

  • Blog

    BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

    At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver, indicating that multiple threat actors are taking advantage of the bug. Cybersecurity firm ReliaQuest, in a new update published today, said it uncovered evidence suggesting involvement from the BianLian data extortion crew and…

    Read More BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic TrojanContinue

  • Blog

    Sophos Firewall v21.5: DNS protection

    How to make the most of the new features in Sophos Firewall v21.5.

    Read More Sophos Firewall v21.5: DNS protectionContinue

  • Blog

    Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering

    A Chinese-language, Telegram-based marketplace called Xinbi Guarantee has facilitated no less than $8.4 billion in transactions since 2022, making it the second major black market to be exposed after HuiOne Guarantee. According to a report published by blockchain analytics firm Elliptic, merchants on the marketplace have been found to peddle technology, personal data, and money…

    Read More Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea LaunderingContinue

  • Blog

    Microsoft primes 71 fixes for May Patch Tuesday

    Five issues actively exploited in the wild, but the real excitement may have been handled in advance

    Read More Microsoft primes 71 fixes for May Patch TuesdayContinue

Page navigation

Previous PagePrevious 1 … 288 289 290 291 292 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us