Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Securing the Mid-Market Across the Complete Threat Lifecycle

    For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done. The challenge is that many security tools add complexity and cost that most mid-market businesses

    Read More Securing the Mid-Market Across the Complete Threat LifecycleContinue

  • Blog

    Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

    The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility’s update mechanism to redirect update traffic to malicious servers instead. “The attack involved [an] infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org,” developer Don Ho said. “The compromise occurred at the hosting

    Read More Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select UsersContinue

  • Blog

    eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

    The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer systems. “Malicious updates were distributed through eScan’s legitimate update infrastructure, resulting in the deployment of multi-stage malware to enterprise

    Read More eScan Antivirus Update Servers Compromised to Deliver Multi-Stage MalwareContinue

  • Blog

    Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

    Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer’s resources to push malicious updates to downstream users. “On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed…

    Read More Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWormContinue

  • Blog

    Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

    A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses. The activity, observed by HarfangLab in January 2026, has been codenamed RedKitten. It’s said to coincide with the nationwide unrest in Iran that began towards the…

    Read More Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and ActivistsContinue

  • Blog

    Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

    Google-owned Mandiant on Friday said it identified an “expansion in threat activity” that uses tradecraft consistent with extortion-themed attacks orchestrated by a financially motivated hacking group known as ShinyHunters. The attacks leverage advanced voice phishing (aka vishing) and bogus credential harvesting sites mimicking targeted companies to gain unauthorized access to victim

    Read More Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS PlatformsContinue

  • Blog

    CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

    CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) supplying heat to almost half a million customers in the country. The incident took place on December 29,…

    Read More CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar FarmsContinue

  • Blog

    Torq Moves SOCs Beyond SOAR With AI-Powered Hyper Automation

    Investors poured $140 million into Torq’s Series D Round, bringing the startup’s valuation to $1.2 billion, to bring AI-based “hyper automation” to SOCs.

    Read More Torq Moves SOCs Beyond SOAR With AI-Powered Hyper AutomationContinue

  • Blog

    2026: The Year Agentic AI Becomes the Attack-Surface Poster Child

    Dark Reading asked readers whether agentic AI attacks, advanced deepfake threats, board recognition of cyber as a top priority, or password-less technology adoption would be most likely to become a trending reality for 2026.

    Read More 2026: The Year Agentic AI Becomes the Attack-Surface Poster ChildContinue

  • Blog

    Out-of-the-Box Expectations for 2026 Reveal a Grab-Bag of Risk

    Security teams need to be thinking about this list of emerging cybersecurity realities, to avoid rolling the dice on enterprise security risks (and opportunities).

    Read More Out-of-the-Box Expectations for 2026 Reveal a Grab-Bag of RiskContinue

Page navigation

Previous PagePrevious 1 2 3 4 5 … 376 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us