Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Max Severity Bug in Apache Roller Enabled Persistent Access

    The remediated flaw gave adversaries a way to maintain access to the app through password resets.

    Read More Max Severity Bug in Apache Roller Enabled Persistent AccessContinue

  • Blog

    With AI’s Help, Bad Bots Are Taking Over the Web

    Bad bots are becoming increasingly difficult to detect as they more easily mimic human behaviors and utilize evasion techniques, researchers say.

    Read More With AI’s Help, Bad Bots Are Taking Over the WebContinue

  • Blog

    AI-Powered Presentation Tool Leveraged in Phishing Attacks

    Researchers at Abnormal Security said threat actors are using a legitimate presentation and graphic design tool named “Gamma” in phishing attacks.

    Read More AI-Powered Presentation Tool Leveraged in Phishing AttacksContinue

  • Blog

    Hertz Falls Victim to Cleo Zero-Day Attacks

    Customer data such as birth dates, credit card numbers and driver’s license information were stolen when threat actors exploited zero-day vulnerabilities in Cleo-managed file transfer products.

    Read More Hertz Falls Victim to Cleo Zero-Day AttacksContinue

  • Blog

    Wave of Wine-Inspired Phishing Attacks Targets EU Diplomats

    Russia-backed APT29’s latest campaign once again uses malicious invites to wine-tasting events as its lure, but this time targets a different set of vintages — errr, victims — and delivers a novel backdoor, GrapeLoader.

    Read More Wave of Wine-Inspired Phishing Attacks Targets EU DiplomatsContinue

  • Blog

    Sophos Firewall v21.5: NDR Essentials

    How to make the most of the new features in Sophos Firewall v21.5

    Read More Sophos Firewall v21.5: NDR EssentialsContinue

  • Blog

    Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool

    The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a variant of a known malware dubbed SNOWLIGHT and a new open-source tool called VShell to infect Linux systems. “Threat actors are increasingly using open source tools in their arsenals for cost-effectiveness and obfuscation to save money and, in…

    Read More Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell ToolContinue

  • Blog

    Are We Prioritizing the Wrong Security Metrics?

    True security isn’t about meeting deadlines — it’s about mitigating risk in a way that aligns with business objectives while protecting against real-world threats.

    Read More Are We Prioritizing the Wrong Security Metrics?Continue

  • Blog

    China-Backed Threat Actor ‘UNC5174’ Using Open Source Tools in Stealthy Attacks

    Sysdig researchers detailed an ongoing campaign from China-backed threat actor UNC5174, which is using open source hacking tools to stay under the radar.

    Read More China-Backed Threat Actor ‘UNC5174’ Using Open Source Tools in Stealthy AttacksContinue

  • Blog

    Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence

    A critical security vulnerability has been disclosed in the Apache Roller open-source, Java-based blogging server software that could allow malicious actors to retain unauthorized access even after a password change. The flaw, assigned the CVE identifier CVE-2025-24859, carries a CVSS score of 10.0, indicating maximum severity. It affects all versions of Roller up to and…

    Read More Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session PersistenceContinue

Page navigation

Previous PagePrevious 1 … 319 320 321 322 323 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us