Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    [Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

    How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore. Today’s attackers don’t need to “hack” in—they can trick their way in. Deepfakes, impersonation scams, and AI-powered social engineering are helping them bypass traditional defenses and slip through unnoticed. Once inside, they can take over accounts, move laterally, and cause…

    Read More [Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered ThreatsContinue

  • Blog

    Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

    A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called Spellbinder that can facilitate adversary-in-the-middle (AitM) attacks. “Spellbinder enables adversary-in-the-middle (AitM) attacks, through IPv6 stateless address autoconfiguration (SLAAC) spoofing, to move laterally in the compromised network, intercepting packets and

    Read More Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement ToolContinue

  • Blog

    Customer Account Takeovers: The Multi-Billion Dollar Problem You Don’t Know About

    Everyone has cybersecurity stories involving family members. Here’s a relatively common one. The conversation usually goes something like this:  “The strangest thing happened to my streaming account. I got locked out of my account, so I had to change my password. When I logged back in, all my shows were gone. Everything was in Spanish…

    Read More Customer Account Takeovers: The Multi-Billion Dollar Problem You Don’t Know AboutContinue

  • Blog

    Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks

    Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous Mantis that has deployed a remote access trojan called RomCom RAT since mid-2022. RomCom “employs advanced evasion techniques, including living-off-the-land (LOTL) tactics and encrypted command and control (C2) communications, while continuously evolving its infrastructure – leveraging

    Read More Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware AttacksContinue

  • Blog

    RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control

    Cybersecurity researchers have revealed that RansomHub’s online infrastructure has “inexplicably” gone offline as of April 1, 2025, prompting concerns among affiliates of the ransomware-as-a-service (RaaS) operation. Singaporean cybersecurity company Group-IB said that this may have caused affiliates to migrate to Qilin, given that “disclosures on its DLS [data leak site] have doubled since

    Read More RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed ControlContinue

  • Blog

    Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code

    Meta on Tuesday announced LlamaFirewall, an open-source framework designed to secure artificial intelligence (AI) systems against emerging cyber risks such as prompt injection, jailbreaks, and insecure code, among others. The framework, the company said, incorporates three guardrails, including PromptGuard 2, Agent Alignment Checks, and CodeShield. PromptGuard 2 is designed to detect direct

    Read More Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure CodeContinue

  • Blog

    Indian Court Orders Action to Block Proton Mail Over AI Deepfake Abuse Allegations

    A high court in the Indian state of Karnataka has ordered the blocking of end-to-end encrypted email provider Proton Mail across the country. The High Court of Karnataka, on April 29, said the ruling was in response to a legal complaint filed by M Moser Design Associated India Pvt Ltd in January 2025. The complaint…

    Read More Indian Court Orders Action to Block Proton Mail Over AI Deepfake Abuse AllegationsContinue

  • Blog

    Many Fuel Tank Monitoring Systems Vulnerable to Disruption

    Thousands of automatic tank gauge (ATG) devices are accessible over the Internet and are just “a packet away” from compromise, security researcher warns at 2025 RSAC Conference.

    Read More Many Fuel Tank Monitoring Systems Vulnerable to DisruptionContinue

  • Blog

    From Mission-Centric to People-Centric: Competitive Leadership in Cyber

    Making a case for empathy in cyber-leadership roles as a strategic business advantage.

    Read More From Mission-Centric to People-Centric: Competitive Leadership in CyberContinue

  • Blog

    Hacking in Space: Not as Tough as You Might Think

    Barbara Grofe, space asset security architect at Spartan Corp, discussed the realities of hacking in space, and the outlook is not pie-in-the-sky.

    Read More Hacking in Space: Not as Tough as You Might ThinkContinue

Page navigation

Previous PagePrevious 1 … 304 305 306 307 308 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us