Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    CVE Program Cuts Send the Cyber Sector Into Panic Mode

    After threatening to slash support for the CVE program, CISA threw MITRE a lifeline at the last minute — extending its government contract for another 11 months. After that, it looks like it’s up to the private sector to find the cash to keep it going.

    Read More CVE Program Cuts Send the Cyber Sector Into Panic ModeContinue

  • Blog

    Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

    The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in Myanmar with previously unreported tooling, highlighting continued effort by the threat actors to increase the sophistication and effectiveness of their malware. This includes updated versions of a known backdoor called TONESHELL, as well as a…

    Read More Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL UpdatesContinue

  • Blog

    Cybersecurity by Design: When Humans Meet Technology

    If security tools are challenging to use, people will look for workarounds to get around the restrictions.

    Read More Cybersecurity by Design: When Humans Meet TechnologyContinue

  • Blog

    State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns

    Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering tactic to deploy malware over a three-month period from late 2024 through the beginning of 2025. The phishing campaigns adopting the strategy have been attributed to clusters tracked as TA427 (aka Kimsuky), TA450 (aka MuddyWater,

    Read More State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware CampaignsContinue

  • Blog

    Artificial Intelligence – What’s all the fuss?

    Talking about AI: Definitions Artificial Intelligence (AI) — AI refers to the simulation of human intelligence in machines, enabling them to perform tasks that typically require human intelligence, such as decision-making and problem-solving. AI is the broadest concept in this field, encompassing various technologies and methodologies, including Machine Learning (ML) and Deep Learning. Machine

    Read More Artificial Intelligence – What’s all the fuss?Continue

  • Blog

    Blockchain Offers Security Benefits – But Don’t Neglect Your Passwords

    Blockchain is best known for its use in cryptocurrencies like Bitcoin, but it also holds significant applications for online authentication. As businesses in varying sectors increasingly embrace blockchain-based security tools, could the technology one day replace passwords? How blockchain works  Blockchain is a secure way to maintain, encrypt, and exchange digital records of transactions.

    Read More Blockchain Offers Security Benefits – But Don’t Neglect Your PasswordsContinue

  • Blog

    Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution

    A critical security vulnerability has been disclosed in the Erlang/Open Telecom Platform (OTP) SSH implementation that could permit an attacker to execute arbitrary code sans any authentication under certain conditions. The vulnerability, tracked as CVE-2025-32433, has been given the maximum CVSS score of 10.0. “The vulnerability allows an attacker with network access to an Erlang/OTP…

    Read More Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code ExecutionContinue

  • Blog

    Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers

    Microsoft is calling attention to an ongoing malvertising campaign that makes use of Node.js to deliver malicious payloads capable of information theft and data exfiltration. The activity, first detected in October 2024, uses lures related to cryptocurrency trading to trick users into installing a rogue installer from fraudulent websites that masquerade as legitimate software like…

    Read More Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView InstallersContinue

  • Blog

    Middle East, North Africa Security Spending to Top $3B

    Gartner projects IT security spending in the MENA region will continue to increase in 2025, with security services accounting for the most growth.

    Read More Middle East, North Africa Security Spending to Top $3BContinue

  • Blog

    CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting SonicWall Secure Mobile Access (SMA) 100 Series gateways to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The high-severity vulnerability, tracked as CVE-2021-20035 (CVSS score: 7.2), relates to a case of operating system command injection

    Read More CISA Flags Actively Exploited Vulnerability in SonicWall SMA DevicesContinue

Page navigation

Previous PagePrevious 1 … 316 317 318 319 320 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us