Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States

    Cybersecurity researchers are warning of a “widespread and ongoing” SMS phishing campaign that’s been targeting toll road users in the United States for financial theft since mid-October 2024. “The toll road smishing attacks are being carried out by multiple financially motivated threat actors using the smishing kit developed by ‘Wang Duo Yu,’” Cisco Talos researchers…

    Read More Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 StatesContinue

  • Blog

    If Boards Don’t Fix OT Security, Regulators Will

    Around the world, governments are setting higher-bar regulations with clear corporate accountability for breaches on the belief organizations won’t drive up security maturity for operational technology unless they’re made to.

    Read More If Boards Don’t Fix OT Security, Regulators WillContinue

  • Blog

    Apple Zero-Days Under ‘Sophisticated Attack,’ but Details Lacking

    The technology giant said two zero-day vulnerabilities were used in attacks on iOS devices against “specific targeted individuals,” which suggests spyware or nation-state threat activity.

    Read More Apple Zero-Days Under ‘Sophisticated Attack,’ but Details LackingContinue

  • Blog

    Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader

    A new multi-stage attack has been observed delivering malware families like Agent Tesla variants, Remcos RAT, and XLoader. “Attackers increasingly rely on such complex delivery mechanisms to evade detection, bypass traditional sandboxes, and ensure successful payload delivery and execution,” Palo Alto Networks Unit 42 researcher Saqib Khanzada said in a technical write-up of the campaign….

    Read More Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoaderContinue

  • Blog

    [Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach

    Your employees didn’t mean to expose sensitive data. They just wanted to move faster. So they used ChatGPT to summarize a deal. Uploaded a spreadsheet to an AI-enhanced tool. Integrated a chatbot into Salesforce. No big deal—until it is. If this sounds familiar, you’re not alone. Most security teams are already behind in detecting how…

    Read More [Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent BreachContinue

  • Blog

    Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT

    Cybersecurity researchers are warning of continued risks posed by a distributed denial-of-service (DDoS) malware known as XorDDoS, with 71.3 percent of the attacks between November 2023 and February 2025 targeting the United States. “From 2020 to 2023, the XorDDoS trojan has increased significantly in prevalence,” Cisco Talos researcher Joey Chen said in a Thursday analysis. 

    Read More Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoTContinue

  • Blog

    CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a medium-severity security flaw impacting Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2025-24054 (CVSS score: 6.5), is a Windows New Technology LAN Manager (NTLM) hash disclosure

    Read More CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File DownloadContinue

  • Blog

    Moving CVEs past one-nation control

    A near-miss episode of attempted defunding spotlights a need for a better way

    Read More Moving CVEs past one-nation controlContinue

  • Blog

    Android Phones Pre-Downloaded With Malware Target User Crypto Wallets

    The threat actors lace pre-downloaded applications with malware to steal cryptocurrency by covertly swapping users’ wallet addresses with their own.

    Read More Android Phones Pre-Downloaded With Malware Target User Crypto WalletsContinue

  • Blog

    Dogged by Trump, Chris Krebs Resigns from SentinelOne

    The president revoked the former CISA director’s security clearance, half a decade after Krebs challenged right-wing election disinformation, prompting his eventual resignation.

    Read More Dogged by Trump, Chris Krebs Resigns from SentinelOneContinue

Page navigation

Previous PagePrevious 1 … 315 316 317 318 319 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us