Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    ‘Cookie Bite’ Entra ID Attack Exposes Microsoft 365

    A proof-of-concept (PoC) attack vector exploits two Azure authentication tokens from within a browser, giving threat actors persistent access to key cloud services, including Microsoft 365 applications.

    Read More ‘Cookie Bite’ Entra ID Attack Exposes Microsoft 365Continue

  • Blog

    Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

    Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a previously undocumented technique to mine cryptocurrency. The activity cluster, per Darktrace and Cado Security, represents a shift from other cryptojacking campaigns that directly deploy miners like XMRig to illicitly profit off the compute resources. This involves deploying a malware strain

    Read More Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat SignalsContinue

  • Blog

    GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

    Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate their privileges in the Cloud Composer workflow orchestration service that’s based on Apache Airflow. “This vulnerability lets attackers with edit permissions in Cloud Composer to escalate their access to the default Cloud Build service account,…

    Read More GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI PackagesContinue

  • Blog

    DeepSeek Breach Opens Floodgates to Dark Web

    The incident should serve as a critical wake-up call. The stakes are simply too high to treat AI security as an afterthought — especially when the Dark Web stands ready to capitalize on every vulnerability.

    Read More DeepSeek Breach Opens Floodgates to Dark WebContinue

  • Blog

    5 Major Concerns With Employees Using The Browser

    As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints, browsers remain mostly unmonitored, despite being responsible for more than 70% of modern malware attacks. Keep Aware’s recent State of Browser Security report highlights major concerns security leaders face with employees using the web browser…

    Read More 5 Major Concerns With Employees Using The BrowserContinue

  • Blog

    Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

    In what has been described as an “extremely sophisticated phishing attack,” threat actors have leveraged an uncommon approach that allowed bogus emails to be sent via Google’s infrastructure and redirect message recipients to fraudulent sites that harvest their credentials. “The first thing to note is that this is a valid, signed email – it really…

    Read More Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal CredentialsContinue

  • Blog

    Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach

    Microsoft on Monday announced that it has moved the Microsoft Account (MSA) signing service to Azure confidential virtual machines (VMs) and that it’s also in the process of migrating the Entra ID signing service as well. The disclosure comes about seven months after the tech giant said it completed updates to Microsoft Entra ID and…

    Read More Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 BreachContinue

  • Blog

    Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware

    The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised multiple organizations in an unnamed Southeast Asian country between August 2024 and February 2025. “Targets included a government ministry, an air traffic control organization, a telecoms operator, and a construction company,” the Symantec Threat Hunter Team said in…

    Read More Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded MalwareContinue

  • Blog

    Erlang/OTP RCE (CVE-2025-32433)

    What is the Vulnerability? A critical SSH vulnerability has recently been identified in the Erlang/Open Telecom Platform (OTP). The vulnerability, tracked as CVE-2025-32433, has been assigned a CVSS score of 10.0. It is unauthenticated, remotely exploitable, and requires low complexity to execute.Erlang/OTP is commonly found in IoT devices and telecommunications platforms, and is prominently used…

    Read More Erlang/OTP RCE (CVE-2025-32433)Continue

  • Blog

    ‘Fog’ Hackers Troll Victims With DOGE Ransom Notes

    Since January, threat actors distributing the malware have notched up more than 100 victims.

    Read More ‘Fog’ Hackers Troll Victims With DOGE Ransom NotesContinue

Page navigation

Previous PagePrevious 1 … 312 313 314 315 316 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us