Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware

    At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea’s software, IT, financial, semiconductor manufacturing, and telecommunications industries, according to a report from Kaspersky published today. The earliest evidence of compromise was first detected in

    Read More Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle MalwareContinue

  • Blog

    Navigating Regulatory Shifts & AI Risks

    By proactively embracing emerging trends around encryption, AI security, and platform consolidation, organizations can turn compliance burdens into competitive advantage.

    Read More Navigating Regulatory Shifts & AI RisksContinue

  • Blog

    Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

    Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a “major blind spot in Linux runtime security tools,” ARMO said. “This mechanism allows a user application to perform various actions without using system calls,” the company said…

    Read More Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection ToolsContinue

  • Blog

    159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

    As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter of 2025, up from 151 in Q4 2024. “We continue to see vulnerabilities being exploited at a fast pace with 28.3% of vulnerabilities being exploited within 1-day of their CVE disclosure,” VulnCheck said in a report shared…

    Read More 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of DisclosureContinue

  • Blog

    Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

    The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with generative artificial intelligence (GenAI) capabilities. “This addition lowers the technical barrier for creating phishing pages, enabling less tech-savvy criminals to deploy customized scams in minutes,” Netcraft said in a new report shared with The Hacker News. “

    Read More Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for CybercriminalsContinue

  • Blog

    Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign

    The Evolving Healthcare Cybersecurity Landscape  Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted and the convergence of IT and medical systems creating an expanded attack surface, traditional security approaches are proving inadequate. According to recent statistics, the healthcare sector

    Read More Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network RedesignContinue

  • Blog

    Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely

    A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution on affected installations. The vulnerability, tracked as CVE-2025-34028, carries a CVSS score of 9.0 out of a maximum of 10.0. “A critical security vulnerability has been identified in the Command Center installation, allowing remote attackers to execute…

    Read More Critical Commvault Command Center Flaw Enables Attackers to Execute Code RemotelyContinue

  • Blog

    WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads

    WhatsApp has introduced an extra layer of privacy called Advanced Chat Privacy that allows users to block participants from sharing the contents of a conversation in traditional chats and groups. “This new setting available in both chats and groups helps prevent others from taking content outside of WhatsApp for when you may want extra privacy,”…

    Read More WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-DownloadsContinue

  • Blog

    ‘Industrial-Scale’ Asian Scam Centers Expand Globally

    The convergence of cybercrime, financial fraud, and organized crime poses a significant threat, especially where these syndicates excel at operating under the radar.

    Read More ‘Industrial-Scale’ Asian Scam Centers Expand GloballyContinue

  • Blog

    Microsoft Claims Steady Progress Revamping Security Culture

    In the latest Secure Future Initiative Progress Report, Microsoft described efforts to rebuild its security culture, including making security a core priority for employees during performance reviews and launching a new “Secure by Design UX Toolkit.”

    Read More Microsoft Claims Steady Progress Revamping Security CultureContinue

Page navigation

Previous PagePrevious 1 … 309 310 311 312 313 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us