Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

    Cybersecurity researchers have disclosed a surge in “mass scanning, credential brute-forcing, and exploitation attempts” originating from IP addresses associated with a Russian bulletproof hosting service provider named Proton66. The activity, detected since January 8, 2025, targeted organizations worldwide, according to a two-part analysis published by Trustwave SpiderLabs last week.  “Net

    Read More Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware DeliveryContinue

  • Blog

    APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

    The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that’s targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. “While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed…

    Read More APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting LuresContinue

  • Blog

    Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

    Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as a popular Telegram bot library but harbor SSH backdoors and data exfiltration capabilities. The packages in question are listed below – node-telegram-utils (132 downloads) node-telegram-bots-api (82 downloads) node-telegram-util (73 downloads) According to supply chain

    Read More Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux SystemsContinue

  • Blog

    ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware

    ASUS has disclosed a critical security flaw impacting routers with AiCloud enabled that could permit remote attackers to perform unauthorized execution of functions on susceptible devices. The vulnerability, tracked as CVE-2025-2492, has a CVSS score of 9.2 out of a maximum of 10.0. “An improper authentication control vulnerability exists in certain ASUS router firmware series,”

    Read More ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update FirmwareContinue

  • Blog

    Could Ransomware Survive Without Cryptocurrency?

    Threat actors would be at least temporarily derailed, experts say. But the real issue ladders back to organizations’ weak cyber hygiene.

    Read More Could Ransomware Survive Without Cryptocurrency?Continue

  • Blog

    AWWA Supports Introduction of Collaborative Cybersecurity Legislation

    Post Content

    Read More AWWA Supports Introduction of Collaborative Cybersecurity LegislationContinue

  • Blog

    Organizations Fix Less Than Half of All Exploitable Vulnerabilities, With Just 21% of GenAI App Flaws Resolved

    Post Content

    Read More Organizations Fix Less Than Half of All Exploitable Vulnerabilities, With Just 21% of GenAI App Flaws ResolvedContinue

  • Blog

    Attackers and Defenders Lean on AI in Identity Fraud Battle

    Identity verification, insurance claims, and financial services are all seeing surges in AI-enabled fraud, but organizations are taking advantage of AI systems to fight fire with fire.

    Read More Attackers and Defenders Lean on AI in Identity Fraud BattleContinue

  • Blog

    Chinese APT Mustang Panda Debuts 4 New Attack Tools

    The notorious nation-state-backed threat actor has added two new keyloggers, a lateral movement tool, and an endpoint detection and response (EDR) evasion driver to its arsenal.

    Read More Chinese APT Mustang Panda Debuts 4 New Attack ToolsContinue

  • Blog

    CISA Weighs In on Alleged Oracle Cloud Breach

    The agency is recommending that organizations and individuals implement its recommendations to prevent the misuse of stolen data, though Oracle has yet to publicly do the same for its customers.

    Read More CISA Weighs In on Alleged Oracle Cloud BreachContinue

Page navigation

Previous PagePrevious 1 … 314 315 316 317 318 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us