Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect Orders

    Cybersecurity researchers have disclosed a malicious package uploaded to the Python Package Index (PyPI) repository that’s designed to reroute trading orders placed on the MEXC cryptocurrency exchange to a malicious server and steal tokens. The package, ccxt-mexc-futures, purports to be an extension built on top of a popular Python library named ccxt (short for CryptoCurrency…

    Read More Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect OrdersContinue

  • Blog

    Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds

    Everybody knows browser extensions are embedded into nearly every user’s daily workflow, from spell checkers to GenAI tools. What most IT and security people don’t know is that browser extensions’ excessive permissions are a growing risk to organizations. LayerX today announced the release of the Enterprise Browser Extension Security Report 2025, This report is the…

    Read More Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report FindsContinue

  • Blog

    Crypto Developers Targeted by Python Malware Disguised as Coding Challenges

    The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has been linked to a malicious campaign that targets developers to deliver new stealer malware under the guise of a coding assignment. The activity has been attributed by Palo Alto Networks Unit 42 to a hacking group it tracks…

    Read More Crypto Developers Targeted by Python Malware Disguised as Coding ChallengesContinue

  • Blog

    Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability

    A recently disclosed security flaw in Gladinet CentreStack also impacts its Triofox remote access and collaboration solution, according to Huntress, with seven different organizations compromised to date. Tracked as CVE-2025-30406 (CVSS score: 9.0), the vulnerability refers to the use of a hard-coded cryptographic key that could expose internet-accessible servers to remote code execution attacks

    Read More Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE VulnerabilityContinue

  • Blog

    Meta Resumes E.U. AI Training Using Public User Data After Regulator Approval

    Meta has announced that it will begin to train its artificial intelligence (AI) models using public data shared by adults across its platforms in the European Union, nearly a year after it paused its efforts due to data protection concerns from Irish regulators. “This training will better support millions of people and businesses in Europe,…

    Read More Meta Resumes E.U. AI Training Using Public User Data After Regulator ApprovalContinue

  • Blog

    AI Code Tools Widely Hallucinate Packages

    The hallucination problem is not just pervasive, it is persistent as well, according to new research.

    Read More AI Code Tools Widely Hallucinate PackagesContinue

  • Blog

    Threat Intel Firm Offers Crypto in Exchange for Dark Web Accounts

    Prodaft is currently buying accounts from five Dark Web forums and offers to pay extra for administrator or moderator accounts. The idea is to infiltrate forums to boost its threat intelligence.

    Read More Threat Intel Firm Offers Crypto in Exchange for Dark Web AccountsContinue

  • Blog

    Fortinet Zero-Day Bug May Lead to Arbitrary Code Execution

    A threat actor posted about the zero-day exploit on the same day that Fortinet published a warning about known vulnerabilities under active exploitation.

    Read More Fortinet Zero-Day Bug May Lead to Arbitrary Code ExecutionContinue

  • Blog

    Chinese APTs Exploit EDR ‘Visibility Gap’ for Cyber Espionage

    Blind spots in network visibility, including in firewalls, IoT devices, and the cloud, are being exploited by Chinese state-backed threat actors with increasing success, according to new threat intelligence. Here’s how experts say you can get eyes on it all.

    Read More Chinese APTs Exploit EDR ‘Visibility Gap’ for Cyber EspionageContinue

  • Blog

    ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading

    Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and pharmaceutical sectors. “The threat actor leverages fear-based lures delivered via phishing emails, designed to pressure recipients into clicking a malicious link,” Morphisec Labs researcher Nadav Lorber said in a report shared with The

    Read More ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-LoadingContinue

Page navigation

Previous PagePrevious 1 … 320 321 322 323 324 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us