Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware

    The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as part of an espionage-focused campaign using ClickFix-like social engineering lures. “LOSTKEYS is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker,” the Google Threat

    Read More Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS MalwareContinue

  • Blog

    ‘Lemon Sandstorm’ Underscores Risks to Middle East Infrastructure

    The Iranian state-backed group targeted the operational technology of a critical national infrastructure (CNI) network and persisted in its network for years, but ultimately failed.

    Read More ‘Lemon Sandstorm’ Underscores Risks to Middle East InfrastructureContinue

  • Blog

    Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT

    Cisco has released software fixes to address a maximum-severity security flaw in its IOS XE Wireless Controller that could enable an unauthenticated, remote attacker to upload arbitrary files to a susceptible system. The vulnerability, tracked as CVE-2025-20188, has been rated 10.0 on the CVSS scoring system. “This vulnerability is due to the presence of a…

    Read More Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWTContinue

  • Blog

    Ivanti Connect Buffer Overflow Vulnerability

    What is the Vulnerability?CVE-2025-22457 is identified as a buffer overflow vulnerability affecting Ivanti Connect Secure, Policy Secure and ZTA Gateways. If successfully exploited, can result in remote code execution. This exploitation poses significant risks, potentially allowing unauthorized remote access to systems.The Google Threat Intelligence Group (GTIG) has linked the exploitation of CVE-2025-22457 and the subsequent…

    Read More Ivanti Connect Buffer Overflow VulnerabilityContinue

  • Blog

    ‘CoGUI’ Phishing Kit Helps Chinese Hackers Target Japan

    Japan is being peppered with an overwhelming volume of spam, thanks to a new platform popular across the East China Sea.

    Read More ‘CoGUI’ Phishing Kit Helps Chinese Hackers Target JapanContinue

  • Blog

    AI Agents Fail in Novel Ways, Put Businesses at Risk

    Microsoft researchers identify 10 new potential pitfalls for companies who are developing or deploying agentic AI systems, with failures potentially leading to the AI becoming a malicious insider.

    Read More AI Agents Fail in Novel Ways, Put Businesses at RiskContinue

  • Blog

    TikTok Fined €530 Million Over Chinese Access to EU Data

    European regulators sent an unmistakable message about messing around with GDPR-protected data. How can organizations avoid similar compliance hassles?

    Read More TikTok Fined €530 Million Over Chinese Access to EU DataContinue

  • Blog

    Meta Wins Lawsuit Against Spyware Vendor NSO Group

    The spyware company must pay the tech giant $168 million in punitive and compensatory damages after a 2019 attack targeting 1,400 devices.

    Read More Meta Wins Lawsuit Against Spyware Vendor NSO GroupContinue

  • Blog

    Play Ransomware Group Used Windows Zero-Day

    Previously, Microsoft reported that Storm-2460 had also used the privilege escalation bug to deploy ransomware on organizations in several countries.

    Read More Play Ransomware Group Used Windows Zero-DayContinue

  • Blog

    "Bring Your Own Installer" Attack Targets SentinelOne EDR

    Researchers from Aon’s Stroz Friedberg incident response firm discovered a new attack type, known as “Bring Your Own Installer,” targeting misconfigured SentinelOne EDR installs.

    Read More "Bring Your Own Installer" Attack Targets SentinelOne EDRContinue

Page navigation

Previous PagePrevious 1 … 296 297 298 299 300 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us