Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

    A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows banking trojans like Casbaneiro (aka Metamorfo) via another malware called Horabot. The activity has been attributed to a Brazilian cybercrime threat actor tracked as Augmented Marauder and Water Saci. The e-crime group was first documented by Trend…

    Read More Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF LuresContinue

  • Blog

    Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

    Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The activity, beginning in late February 2026, leverages these scripts to initiate a multi-stage infection chain for establishing persistence and enabling remote access. It’s currently not known what lures the threat actors use to…

    Read More Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC BypassContinue

  • Blog

    New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

    Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said has been exploited in the wild. The high-severity vulnerability, CVE-2026-5281 (CVSS score: N/A), concerns a use-after-free bug in Dawn, an open-source and cross-platform implementation of the WebGPU standard. “Use-after-free in Dawn in Google…

    Read More New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch ReleasedContinue

  • Blog

    3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

    For years, cybersecurity has followed a familiar model: block malware, stop the attack. Now, attackers are moving on to what’s next. Threat actors now use malware less frequently in favor of what’s already inside your environment, including abusing trusted tools, native binaries, and legitimate admin utilities to move laterally, escalate privileges, and persist without raising…

    Read More 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)Continue

  • Blog

    Are We Training AI Too Late?

    Ask the Expert: Cybersecurity teams need to expand their field of view to include new, unique threat sources, rather than relying on past, proven threat actors.

    Read More Are We Training AI Too Late?Continue

  • Blog

    Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

    Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster tracked as UNC1069. “We have attributed the attack to a suspected North Korean threat actor we track as UNC1069,” John Hultquist, chief analyst at Google Threat Intelligence Group (GTIG), told The Hacker…

    Read More Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069Continue

  • Blog

    Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

    Anthropic on Tuesday confirmed that internal code for its popular artificial intelligence (AI) coding assistant, Claude Code, had been inadvertently released due to a human error. “No sensitive customer data or credentials were involved or exposed,” an Anthropic spokesperson said in a statement shared with CNBC News. “This was a release packaging issue caused by…

    Read More Claude Code Source Leaked via npm Packaging Error, Anthropic ConfirmsContinue

  • Blog

    Axios npm Supply Chain Compromise

    What is the Attack? A software supply chain attack targeted the widely used JavaScript library Axios after an attacker reportedly compromised a maintainer’s npm account and published malicious package versions 1.14.1 and 0.30.4. These versions introduced a concealed dependency, plain-crypto-js@4.2.1, which executed during installation and deployed a cross-platform remote access trojan (RAT). Axios is a…

    Read More Axios npm Supply Chain CompromiseContinue

  • Blog

    The Forgotten Endpoint: Security Risks of Dormant Devices

    Technology Talk: That forgotten notebook holds plenty of secrets to enterprise access.

    Read More The Forgotten Endpoint: Security Risks of Dormant DevicesContinue

  • Blog

    Axios NPM Package Compromised in Precision Attack

    The NPM package for Axios, a popular JavaScript HTTP client library, was briefly compromised this week, possibly by North Korean threat actors.

    Read More Axios NPM Package Compromised in Precision AttackContinue

Page navigation

Previous PagePrevious 1 … 30 31 32 33 34 … 458 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us