Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    2 Android Zero-Day Bugs Under Active Exploit

    Neither security issue requires user interaction; and one of the vulnerabilities was used to unlock a student activist’s device in an attempt to install spyware.

    Read More 2 Android Zero-Day Bugs Under Active ExploitContinue

  • Blog

    Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings

    Threat actors have been observed distributing malicious payloads such as cryptocurrency miner and clipper malware via SourceForge, a popular software hosting service, under the guise of cracked versions of legitimate applications like Microsoft Office. “One such project, officepackage, on the main website sourceforge.net, appears harmless enough, containing Microsoft Office add-ins copied from a

    Read More Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software ListingsContinue

  • Blog

    Sophos Firewall v21.5 early access is now available

    Say hello to great new features and enhancements in v21.5.

    Read More Sophos Firewall v21.5 early access is now availableContinue

  • Blog

    Dangerous, Windows-Hijacking Neptune RAT Scurries Into Telegram, YouTube

    The malware’s creators insist a new open source version of Neptune is for educational use by pen testers, but a raft of sophisticated backdoor and evasion capabilities says otherwise.

    Read More Dangerous, Windows-Hijacking Neptune RAT Scurries Into Telegram, YouTubeContinue

  • Blog

    How Democratized Development Creates a Security Nightmare

    No-code and low-code platforms offer undeniable benefits. But when security is an afterthought, organizations risk deploying vulnerable applications that expose sensitive data and critical systems.

    Read More How Democratized Development Creates a Security NightmareContinue

  • Blog

    Agentic AI in the SOC – Dawn of Autonomous Alert Triage

    Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, burnout, and attrition. While artificial intelligence has emerged as a go-to solution, the term “AI” often blurs crucial distinctions. Not all AI is built equal, especially in the SOC. Many

    Read More Agentic AI in the SOC – Dawn of Autonomous Alert TriageContinue

  • Blog

    UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine

    The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed a new set of cyber attacks targeting Ukrainian institutions with information-stealing malware. The activity is aimed at military formations, law enforcement agencies, and local self-government bodies, particularly those located near Ukraine’s eastern border, the agency said. The attacks involve distributing phishing emails

    Read More UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting UkraineContinue

  • Blog

    CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation

    A recently disclosed critical security flaw impacting CrushFTP has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog after reports emerged of active exploitation in the wild. The vulnerability is a case of authentication bypass that could permit an unauthenticated attacker to take over susceptible instances….

    Read More CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active ExploitationContinue

  • Blog

    Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities

    Google has shipped patches for 62 vulnerabilities, two of which it said have been exploited in the wild. The two high-severity vulnerabilities are listed below – CVE-2024-53150 (CVSS score: 7.8) – An out-of-bounds flaw in the USB sub-component of Kernel that could result in information disclosure CVE-2024-53197 (CVSS score: 7.8) – A privilege escalation flaw…

    Read More Google Releases Android Update to Patch Two Actively Exploited VulnerabilitiesContinue

  • Blog

    Experts Optimistic about Secure by Design Progress

    Secure by Design is an important step to reduce the number of vulnerabilities present originally, but is it progressing fast enough? Security experts Chris Wysopal and Jason Healey say things are improving for the better.

    Read More Experts Optimistic about Secure by Design ProgressContinue

Page navigation

Previous PagePrevious 1 … 327 328 329 330 331 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us