Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites

    Threat hunters have disclosed a new “widespread timing-based vulnerability class” that leverages a double-click sequence to facilitate clickjacking attacks and account takeovers in almost all major websites. The technique has been codenamed DoubleClickjacking by security researcher Paulos Yibelo. “Instead of relying on a single click, it takes advantage of a double-click sequence,” Yibelo said.

    Read More New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major WebsitesContinue

  • Blog

    Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics

    The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Tuesday leveled sanctions against two entities in Iran and Russia for their attempts to interfere with the November 2024 presidential election. The federal agency said the entities – a subordinate organization of Iran’s Islamic Revolutionary Guard Corps and a Moscow-based affiliate of Russia’s Main…

    Read More Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber TacticsContinue

  • Blog

    Cybersecurity Lags in Middle East Business Development

    The fast growing region has its own unique cyber issues — and it needs its own talent to fight them.

    Read More Cybersecurity Lags in Middle East Business DevelopmentContinue

  • Blog

    6 AI-Related Security Trends to Watch in 2025

    AI tools will enable significant productivity and efficiency benefits for organizations in the coming year, but they also will exacerbate privacy, governance, and security risks.

    Read More 6 AI-Related Security Trends to Watch in 2025Continue

  • Blog

    New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy

    The U.S. Department of Justice (DoJ) has issued a final rule carrying out Executive Order (EO) 14117, which prevents mass transfer of citizens’ personal data to countries of concern such as China (including Hong Kong and Macau), Cuba, Iran, North Korea, Russia, and Venezuela. “This final rule is a crucial step forward in addressing the…

    Read More New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect PrivacyContinue

  • Blog

    Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents

    The United States Treasury Department said it suffered a “major cybersecurity incident” that allowed suspected Chinese threat actors to remotely access some computers and unclassified documents.  “On December 8, 2024, Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to a key used by the vendor to…

    Read More Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and DocumentsContinue

  • Blog

    Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation

    Cybersecurity researchers have uncovered three security weaknesses in Microsoft’s Azure Data Factory Apache Airflow integration that, if successfully exploited, could have allowed an attacker to gain the ability to conduct various covert actions, including data exfiltration and malware deployment. “Exploiting these flaws could allow attackers to gain persistent access as shadow administrators

    Read More Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to ExploitationContinue

  • Blog

    PAN-OS Firewall Denial of Service (DoS) Vulnerability

    What is the Vulnerability?Attackers are exploiting, a Denial-of-Service vulnerability (CVE-2024-3393) in the DNS Security feature of Palo Alto Networks PAN-OS. This vulnerability allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall, causing it to crash and reboot, potentially leading to Denial of Service (DoS).CISA…

    Read More PAN-OS Firewall Denial of Service (DoS) VulnerabilityContinue

  • Blog

    US Treasury Department breached through remote support platform

    Chinese state-sponsored threat actors hacked the U.S. Treasury Department after breaching a remote support platform used by the federal agency. […]

    Read More US Treasury Department breached through remote support platformContinue

  • Blog

    Chinese State Hackers Breach US Treasury Department

    In what’s being called a ‘major cybersecurity incident,’ Beijing-backed adversaries broke into cyber vendor BeyondTrust to access US Department of Treasury workstations and steal unclassified data, according to a letter sent to lawmakers.

    Read More Chinese State Hackers Breach US Treasury DepartmentContinue

Page navigation

Previous PagePrevious 1 … 318 319 320 321 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us