Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models

    SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile Access (SMA) appliances have been exploited in the wild. The vulnerabilities in question are listed below – CVE-2023-44221 (CVSS score: 7.2) – Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to

    Read More SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance ModelsContinue

  • Blog

    Billbug Expands Cyber-Espionage Campaign in Southeast Asia

    The China-linked cyber-operations group, better known as Lotus Panda, uses its own custom malware to focus on government agencies and private companies in Hong Kong, the Philippines, Taiwan, and Vietnam.

    Read More Billbug Expands Cyber-Espionage Campaign in Southeast AsiaContinue

  • Blog

    Prolific RansomHub Operation Goes Dark

    The chat infrastructure and data-leak site of the notorious ransomware-as-a-service group has been inactive since March 31, according to security vendors.

    Read More Prolific RansomHub Operation Goes DarkContinue

  • Blog

    Former CISA Head Slams Trump Admin Over ‘Loyalty Mandate’

    Jen Easterly, former director of CISA, discussed the first 100 days of the second Trump administration and criticized the president’s “mandate for loyalty” during a panel at RSAC 2025.

    Read More Former CISA Head Slams Trump Admin Over ‘Loyalty Mandate’Continue

  • Blog

    Adversaries Are Toying With US Networks & DC Is Short on Answers

    While nation-state actors are demonstrating how easily they can infiltrate US networks, government officials don’t seem to have a clear vision for what comes next.

    Read More Adversaries Are Toying With US Networks & DC Is Short on AnswersContinue

  • Blog

    TheWizards APT Casts a Spell on Asian Gamblers With Novel Attack

    A SLAAC-spoofing, adversary-in-the-middle campaign is hiding the WizardNet backdoor malware inside updates for legitimate software and popular applications.

    Read More TheWizards APT Casts a Spell on Asian Gamblers With Novel AttackContinue

  • Blog

    Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

    As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found how techniques that render the Model Context Protocol (MCP) susceptible to prompt injection attacks could be used to develop security tooling or identify malicious tools, according to a new report from Tenable. MCP, launched by Anthropic in…

    Read More Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and DefenseContinue

  • Blog

    Phishers Take Advantage of Iberian Blackout Before It’s Even Over

    Opportunistic threat actors targeted Portuguese and Spanish speakers by spoofing Portugal’s national airline in a campaign offering compensation for delayed or disrupted flights.

    Read More Phishers Take Advantage of Iberian Blackout Before It’s Even OverContinue

  • Blog

    DHS Boss Noem Vows to Get CISA Back ‘On Mission’

    Secretary Noem asks the cybersecurity community to get in touch with CISA to help reshape the agency to focus on finding efficiencies.

    Read More DHS Boss Noem Vows to Get CISA Back ‘On Mission’Continue

  • Blog

    DARPA Highlights Critical Infrastructure Security Challenges

    Leaders at federal research organizations DARPA, ARPA-I, and ARPA-H discussed the myriad obstacles in addressing critical infrastructure security at RSAC Conference 2025.

    Read More DARPA Highlights Critical Infrastructure Security ChallengesContinue

Page navigation

Previous PagePrevious 1 … 303 304 305 306 307 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us