Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    New Android Trojan ‘Herodotus’ Outsmarts Anti-Fraud Systems by Typing Like a Human

    Cybersecurity researchers have disclosed details of a new Android banking trojan called Herodotus that has been observed in active campaigns targeting Italy and Brazil to conduct device takeover (DTO) attacks. “Herodotus is designed to perform device takeover while making first attempts to mimic human behaviour and bypass behaviour biometrics detection,” ThreatFabric said in a report…

    Read More New Android Trojan ‘Herodotus’ Outsmarts Anti-Fraud Systems by Typing Like a HumanContinue

  • Blog

    Researchers Expose GhostCall and GhostHire: BlueNoroff’s New Malware Chains

    Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as part of twin campaigns tracked as GhostCall and GhostHire. According to Kaspersky, the campaigns are part of a broader operation called SnatchCrypto that has been underway since at least 2017. The activity is attributed to a Lazarus Group sub-cluster…

    Read More Researchers Expose GhostCall and GhostHire: BlueNoroff’s New Malware ChainsContinue

  • Blog

    North Korea’s BlueNoroff Expands Scope of Crypto Heists

    Two campaigns targeting fintech execs and Web3 developers show the APT going cross-platform in financially motivated campaigns that use fake business collaboration and job recruitment lures.

    Read More North Korea’s BlueNoroff Expands Scope of Crypto HeistsContinue

  • Blog

    Why Early Threat Detection Is a Must for Long-Term Business Growth

    In cybersecurity, speed isn’t just a win — it’s a multiplier. The faster you learn about emerging threats, the faster you adapt your defenses, the less damage you suffer, and the more confidently your business keeps scaling. Early threat detection isn’t about preventing a breach someday: it’s about protecting the revenue you’re supposed to earn…

    Read More Why Early Threat Detection Is a Must for Long-Term Business GrowthContinue

  • Blog

    Is Your Google Workspace as Secure as You Think it is?

    The New Reality for Lean Security Teams If you’re the first security or IT hire at a fast-growing startup, you’ve likely inherited a mandate that’s both simple and maddeningly complex: secure the business without slowing it down. Most organizations using Google Workspace start with an environment built for collaboration, not resilience. Shared drives, permissive settings,…

    Read More Is Your Google Workspace as Secure as You Think it is?Continue

  • Blog

    Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware

    The zero-day exploitation of a now-patched security flaw in Google Chrome led to the distribution of an espionage-related tool from Italian information technology and services provider Memento Labs, according to new findings from Kaspersky. The vulnerability in question is CVE-2025-2783 (CVSS score: 8.3), a case of sandbox escape which the company disclosed in March 2025…

    Read More Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent SpywareContinue

  • Blog

    SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats

    A European embassy located in the Indian capital of New Delhi, as well as multiple organizations in Sri Lanka, Pakistan, and Bangladesh, have emerged as the target of a new campaign orchestrated by a threat actor known as SideWinder in September 2025. The activity “reveals a notable evolution in SideWinder’s TTPs, particularly the adoption of…

    Read More SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian DiplomatsContinue

  • Blog

    ‘Jingle Thief’ Highlights Retail Cyber Threats

    A Morocco-based gift card fraud campaign is a sign of what retailers can expect this holiday season.

    Read More ‘Jingle Thief’ Highlights Retail Cyber ThreatsContinue

  • Blog

    Memento Spyware Tied to Chrome Zero-Day Attacks

    While investigating the cyberattacks, researchers uncovered a new spyware product from Memento Labs, the successor to the infamous Hacking Team.

    Read More Memento Spyware Tied to Chrome Zero-Day AttacksContinue

  • Blog

    CISOs Finally Get a Seat at the Board’s Table — But There’s a Catch

    AI’s explosive growth has lifted cybersecurity to the top of the board’s agenda. Here’s how CISOs can seize the moment, according to Diana Kelley.

    Read More CISOs Finally Get a Seat at the Board’s Table — But There’s a CatchContinue

Page navigation

Previous PagePrevious 1 … 29 30 31 32 33 … 323 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us