Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    SpotBugs Access Token Theft Identified as Root Cause of GitHub Supply Chain Attack

    The cascading supply chain attack that initially targeted Coinbase before becoming more widespread to single out users of the “tj-actions/changed-files” GitHub Action has been traced further back to the theft of a personal access token (PAT) related to SpotBugs. “The attackers obtained initial access by taking advantage of the GitHub Actions workflow of SpotBugs, a…

    Read More SpotBugs Access Token Theft Identified as Root Cause of GitHub Supply Chain AttackContinue

  • Blog

    Have We Reached a Distroless Tipping Point?

    There’s a virtuous cycle in technology that pushes the boundaries of what’s being built and how it’s being used. A new technology development emerges and captures the world’s attention. People start experimenting and discover novel applications, use cases, and approaches to maximize the innovation’s potential. These use cases generate significant value, fueling demand for the…

    Read More Have We Reached a Distroless Tipping Point?Continue

  • Blog

    Rafts of Security Bugs Could Rain Out Solar Grids

    At least three major energy solution and renewable energy companies have nearly 50 vulnerabilities — many of them “basic” mistakes — indicating a lack of developed cybersecurity safeguards.

    Read More Rafts of Security Bugs Could Rain Out Solar GridsContinue

  • Blog

    Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE Malware

    Ivanti has disclosed details of a now-patched critical security vulnerability impacting its Connect Secure that has come under active exploitation in the wild. The vulnerability, tracked as CVE-2025-22457 (CVSS score: 9.0), concerns a case of a stack-based buffer overflow that could be exploited to execute arbitrary code on affected systems. “A stack-based buffer overflow in…

    Read More Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE MalwareContinue

  • Blog

    OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers

    A novice cybercrime actor has been observed leveraging the services of a Russian bulletproof hosting (BPH) provider called Proton66 to facilitate their operations. The findings come from DomainTools, which detected the activity after it discovered a phony website named cybersecureprotect[.]com hosted on Proton66 that masqueraded as an antivirus service. The threat intelligence firm said it

    Read More OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting ServersContinue

  • Blog

    CERT-UA Reports Cyberattacks Targeting Ukrainian State Systems with WRECKSTEEL Malware

    The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that no less than three cyber attacks were recorded against state administration bodies and critical infrastructure facilities in the country with an aim to steal sensitive data. The campaign, the agency said, involved the use of compromised email accounts to send phishing messages containing links…

    Read More CERT-UA Reports Cyberattacks Targeting Ukrainian State Systems with WRECKSTEEL MalwareContinue

  • Blog

    Critical Flaw in Apache Parquet Allows Remote Attackers to Execute Arbitrary Code

    A maximum severity security vulnerability has been disclosed in Apache Parquet’s Java Library that, if successfully exploited, could allow a remote attacker to execute arbitrary code on susceptible instances. Apache Parquet is a free and open-source columnar data file format that’s designed for efficient data processing and retrieval, providing support for complex data, high-performance

    Read More Critical Flaw in Apache Parquet Allows Remote Attackers to Execute Arbitrary CodeContinue

  • Blog

    Kubernetes Ingress-nginx Controller RCE

    What is the Vulnerability?On March 24, researchers disclosed a set of five vulnerabilities, collectively known as “IngressNightmare,” affecting Ingress-nginx, one of the popular ingress controllers available for Kubernetes. Using Ingress-NGINX is one of the most common methods for exposing Kubernetes applications externally.CVE-2025-1974 is considered the most serious of the five and has been assigned a…

    Read More Kubernetes Ingress-nginx Controller RCEContinue

  • Blog

    Microsoft Boosts Email Sender Rules for Outlook

    The tech giant will enforce new email authentication protocols for Outlook users who send large volumes of email beginning on May 5.

    Read More Microsoft Boosts Email Sender Rules for OutlookContinue

  • Blog

    China-Linked Threat Group Exploits Ivanti Bug

    The vendor had originally assessed the flaw as low risk but now says it is a critical issue that enables remote code execution.

    Read More China-Linked Threat Group Exploits Ivanti BugContinue

Page navigation

Previous PagePrevious 1 … 330 331 332 333 334 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us