Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Threat Actors Use ‘Spam Bombing’ Technique to Hide Malicious Motives

    Darktrace researchers detailed “spam bombing,” a technique in which threat actors bombard targets with spam emails as a pretense for activity like social engineering campaigns.

    Read More Threat Actors Use ‘Spam Bombing’ Technique to Hide Malicious MotivesContinue

  • Blog

    Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addresses

    Threat actors are continuing to upload malicious packages to the npm registry so as to tamper with already-installed local versions of legitimate libraries to execute malicious code in what’s seen as a sneakier attempt to stage a software supply chain attack. The newly discovered package, named pdf-to-office, masquerades as a utility for converting PDF files…

    Read More Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto AddressesContinue

  • Blog

    PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading Party

    Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a much larger extent of the ongoing Play Praetor campaign. What started with 6000+ URLs of a very specific banking attack has now grown to 16,000+ with multiple variants. This research is ongoing, and much more is expected to be discovered in the coming…

    Read More PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading PartyContinue

  • Blog

    The Identities Behind AI Agents: A Deep Dive Into AI & NHI

    AI agents have rapidly evolved from experimental technology to essential business tools. The OWASP framework explicitly recognizes that Non-Human Identities play a key role in agentic AI security. Their analysis highlights how these autonomous software entities can make decisions, chain complex actions together, and operate continuously without human intervention. They’re no longer just tools,

    Read More The Identities Behind AI Agents: A Deep Dive Into AI & NHIContinue

  • Blog

    Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraine

    The Russia-linked threat actor known as Gamaredon (aka Shuckworm) has been attributed to a cyber attack targeting a foreign military mission based in Ukraine with an aim to deliver an updated version of a known malware called GammaSteel. The group targeted the military mission of a Western country, per the Symantec Threat Hunter team, with…

    Read More Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in UkraineContinue

  • Blog

    Europol Arrests Five SmokeLoader Clients Linked by Seized Database Evidence

    Law enforcement authorities have announced that they tracked down the customers of the SmokeLoader malware and detained at least five individuals. “In a coordinated series of actions, customers of the Smokeloader pay-per-install botnet, operated by the actor known as ‘Superstar,’ faced consequences such as arrests, house searches, arrest warrants or ‘knock and talks,’” Europol said…

    Read More Europol Arrests Five SmokeLoader Clients Linked by Seized Database EvidenceContinue

  • Blog

    AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam, Bypassing CAPTCHA Protections

    Cybersecurity researchers have disclosed details of an artificial intelligence (AI) powered platform called AkiraBot that’s used to spam website chats, comment sections, and contact forms to promote dubious search engine optimization (SEO) services such as Akira and ServicewrapGO. “AkiraBot has targeted more than 400,000 websites and successfully spammed at least 80,000 websites since September

    Read More AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam, Bypassing CAPTCHA ProtectionsContinue

  • Blog

    Google Merges Security Offerings Into a Cohesive Suite

    Google Unified Security brings together threat detection, AI-powered security, secure browser features, and Mandiant services, the company said at its Cloud Next conference.

    Read More Google Merges Security Offerings Into a Cohesive SuiteContinue

  • Blog

    Advanced Preparation Was Key to a Secure Paris Olympics

    The security teams associated with the 2024 Olympic Games in Paris focused on in-depth penetration testing, crisis management exercises, and collaboration to defend against potential cyberattacks.

    Read More Advanced Preparation Was Key to a Secure Paris OlympicsContinue

  • Blog

    US Comptroller Cyber ‘Incident’ Compromises Org’s Emails

    A review of the emails involved in the breach is still ongoing, but what has been discovered is enough for the Treasury Department to label it a “major cyber incident.”

    Read More US Comptroller Cyber ‘Incident’ Compromises Org’s EmailsContinue

Page navigation

Previous PagePrevious 1 … 324 325 326 327 328 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us