Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Can Cybersecurity Keep Up In the AI Arms Race?

    New research shows China is quickly catching up with the US in AI innovation. Experts weigh in on what it means for cyber defenders.

    Read More Can Cybersecurity Keep Up In the AI Arms Race?Continue

  • Blog

    ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files

    ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could enable an attacker to leverage the software in order to achieve remote code execution. DriverHub is a tool that’s designed to automatically detect the motherboard model of a computer and display necessary driver updates for subsequent installation by…

    Read More ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini FilesContinue

  • Blog

    Vulnerability Detection Tops Agentic AI at RSAC’s Startup Competition

    Agentic-native startups threaten to reduce the zero-day problem to just a zero-hour issue. Of course, AI agents will accelerate offensive attacks as well.

    Read More Vulnerability Detection Tops Agentic AI at RSAC’s Startup CompetitionContinue

  • Blog

    ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams

    What do a source code editor, a smart billboard, and a web server have in common? They’ve all become launchpads for attacks—because cybercriminals are rethinking what counts as “infrastructure.” Instead of chasing high-value targets directly, threat actors are now quietly taking over the overlooked: outdated software, unpatched IoT devices, and open-source packages. It’s not just…

    Read More ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered ScamsContinue

  • Blog

    The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That

    Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the equation—is what happens after detection. New research from GitGuardian’s State of Secrets Sprawl 2025 report reveals a disturbing trend: the vast majority of exposed company secrets discovered in public repositories remain valid for years after detection, creating an…

    Read More The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change ThatContinue

  • Blog

    Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures

    Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a lure to entice users into downloading an information stealer malware dubbed Noodlophile. “Instead of relying on traditional phishing or cracked software sites, they build convincing AI-themed platforms – often advertised via legitimate-looking Facebook groups and viral social media campaigns,”

    Read More Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook LuresContinue

  • Blog

    Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection

    Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits that accused the company of tracking users’ personal location and maintaining their facial recognition data without consent. The $1.375 billion payment dwarfs the fines the tech giant has paid to settle similar lawsuits brought by other U.S. states….

    Read More Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data CollectionContinue

  • Blog

    Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data

    Germany’s Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown linked to the eXch cryptocurrency exchange over allegations of money laundering and operating a criminal trading platform. The operation was carried out on April 30, 2025, authorities said, adding they also confiscated 8 terabytes worth of data and cryptocurrency…

    Read More Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of DataContinue

  • Blog

    SAP Netweaver Zero-Day Attack

    What is the Attack?A zero-day SAP vulnerability, CVE-2025-31324, with CVSS score of 10.0 is being actively exploited in the wild. This vulnerability affects SAP Visual Composer, allowing unauthenticated threat actors to upload arbitrary files, resulting in full compromise of the targeted system that could significantly affect the confidentiality, integrity, and availability of the targeted system.The…

    Read More SAP Netweaver Zero-Day AttackContinue

  • Blog

    Rapid7 Launches Managed Detection & Response (MDR) for Enterprise

    Post Content

    Read More Rapid7 Launches Managed Detection & Response (MDR) for EnterpriseContinue

Page navigation

Previous PagePrevious 1 … 292 293 294 295 296 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us