Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools

    Government and telecommunications sectors in Southeast Asia have become the target of a “sophisticated” campaign undertaken by a new advanced persistent threat (APT) group called Earth Kurma since June 2024. The attacks, per Trend Micro, have leveraged custom malware, rootkits, and cloud storage services for data exfiltration. The Philippines, Vietnam, Thailand, and Malaysia are among…

    Read More Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft ToolsContinue

  • Blog

    WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors

    Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake security alert urging them to download a “critical patch” but deploy a backdoor instead. WordPress security company Patchstack described the activity as sophisticated and a variant of another campaign observed in December 2023 that employed a fake CVE ploy to…

    Read More WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site BackdoorsContinue

  • Blog

    Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised

    Threat actors have been observed exploiting two newly disclosed critical security flaws in Craft CMS in zero-day attacks to breach servers and gain unauthorized access. The attacks, first observed by Orange Cyberdefense SensePost on February 14, 2025, involve chaining the below vulnerabilities – CVE-2024-58136 (CVSS score: 9.0) – An improper protection of alternate path flaw…

    Read More Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely CompromisedContinue

  • Blog

    Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

    Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the past year. “The attack involves the use of AzureChecker.exe, a Command Line Interface (CLI) tool that is being used by a wide range of threat actors,” the Microsoft Threat Intelligence…

    Read More Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining ContainersContinue

  • Blog

    ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

    Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB has been assessed with medium confidence to be a financially motivated threat actor, scanning for vulnerable systems and deploying a custom malware called LAGTOY (aka…

    Read More ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double ExtortionContinue

  • Blog

    Mobile Applications: A Cesspool of Security Issues

    An analysis of more than a half-million mobile apps find encryption problems, privacy issues, and known vulnerabilities in third-party code. What can users and developers do?

    Read More Mobile Applications: A Cesspool of Security IssuesContinue

  • Blog

    North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

    North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. “In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread

    Read More North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview LuresContinue

  • Blog

    How Organizations Can Leverage Cyber Insurance Effectively

    By focusing on prevention, education, and risk transfer through insurance, organizations — especially SMEs — can protect themselves from the rapidly escalating threats of cyberattacks.

    Read More How Organizations Can Leverage Cyber Insurance EffectivelyContinue

  • Blog

    Vehicles Face 45% More Attacks, 4 Times More Hackers

    Two kinds of attacks are in high gear: ransomware attacks against OEMs and compromised electric vehicle chargers, according to data from Q1 2025.

    Read More Vehicles Face 45% More Attacks, 4 Times More HackersContinue

  • Blog

    Phishing Kit Darcula Gets Lethal AI Upgrade

    Recently added artificial intelligence capabilities on the Chinese-language Darcula phishing-as-a-service platform make phishing attacks easy for even the least technical hackers.

    Read More Phishing Kit Darcula Gets Lethal AI UpgradeContinue

Page navigation

Previous PagePrevious 1 … 307 308 309 310 311 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us