Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins

    Threat actors are leveraging an artificial intelligence (AI) powered presentation platform named Gamma in phishing attacks to direct unsuspecting users to spoofed Microsoft login pages. “Attackers weaponize Gamma, a relatively new AI-based presentation tool, to deliver a link to a fraudulent Microsoft SharePoint login portal,” Abnormal Security researchers Hinman Baron and Piotr Wojtyla said in

    Read More Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint LoginsContinue

  • Blog

    Sophos India Volunteers Bring Color to Local Schools

    Sophos India volunteers transformed two rural schools with vibrant murals, enhancing learning spaces and strengthening community ties.

    Read More Sophos India Volunteers Bring Color to Local SchoolsContinue

  • Blog

    From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains

    Introduction Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies continue to expand their reliance on third-party vendors, cloud-based services, and global logistics networks, cybercriminals are exploiting vulnerabilities within these interconnected systems to launch attacks. By first infiltrating a third-party vendor with undetected

    Read More From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply ChainsContinue

  • Blog

    New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks

    Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as part of cyber attacks targeting telecommunications, finance, and retail sectors in South Korea, Hong Kong, Myanmar, Malaysia, and Egypt in 2024. “The controller could open a reverse shell,” Trend Micro researcher Fernando Mercês said in a technical report published…

    Read More New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server AttacksContinue

  • Blog

    Product Walkthrough: A Look Inside Wing Security’s Layered SaaS Identity Defense

    Intro: Why hack in when you can log in? SaaS applications are the backbone of modern organizations, powering productivity and operational efficiency. But every new app introduces critical security risks through app integrations and multiple users, creating easy access points for threat actors. As a result, SaaS breaches have increased, and according to a May…

    Read More Product Walkthrough: A Look Inside Wing Security’s Layered SaaS Identity DefenseContinue

  • Blog

    Sophos Annual Threat Report appendix: Most frequently encountered malware and abused software

    These are the tools of the trade Sophos detected in use by cybercriminals over 2024

    Read More Sophos Annual Threat Report appendix: Most frequently encountered malware and abused softwareContinue

  • Blog

    The Sophos Annual Threat Report: Cybercrime on Main Street 2025

    Ransomware remains the biggest threat, but old and misconfigured network devices are making it too easy

    Read More The Sophos Annual Threat Report: Cybercrime on Main Street 2025Continue

  • Blog

    Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users

    Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp and Telegram that contain cryptocurrency clipper functionality as part of a campaign since June 2024. While using malware-laced apps to steal financial information is not a new phenomenon, the new findings from Russian antivirus vendor Doctor Web point…

    Read More Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto UsersContinue

  • Blog

    U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on Alert

    The U.S. government funding for non-profit research giant MITRE to operate and maintain its Common Vulnerabilities and Exposures (CVE) program will expire Wednesday, an unprecedented development that could shake up one of the foundational pillars of the global cybersecurity ecosystem. The 25-year-old CVE program is a valuable tool for vulnerability management, offering a de facto…

    Read More U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on AlertContinue

  • Blog

    Accounting Firms Can’t Skimp on Cybersecurity

    Cybercriminals capitalize on tax preparation stress, technology sprawl, and lax communications. Accounting teams can’t afford to treat cybersecurity as an afterthought.

    Read More Accounting Firms Can’t Skimp on CybersecurityContinue

Page navigation

Previous PagePrevious 1 … 318 319 320 321 322 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us