Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    5 Impactful AWS Vulnerabilities You’re Responsible For

    If you’re using AWS, it’s easy to assume your cloud security is handled – but that’s a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment remains the customer’s responsibility. Think of AWS security like protecting a building: AWS provides strong walls and a solid roof, but it’s up to the…

    Read More 5 Impactful AWS Vulnerabilities You’re Responsible ForContinue

  • Blog

    Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

    Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT. “The file names use Russian words related to the movement of troops in Ukraine as a lure,” Cisco Talos researcher Guilherme Venere said in a report published last week. “The PowerShell downloader contacts…

    Read More Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in UkraineContinue

  • Blog

    RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security flaw in Ivanti Connect Secure (ICS) appliances. “RESURGE contains capabilities of the SPAWNCHIMERA malware variant, including surviving reboots; however, RESURGE contains distinctive commands that

    Read More RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell FeaturesContinue

  • Blog

    New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

    Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and Turkey. “Crocodilus enters the scene not as a simple clone, but as a fully-fledged threat from the outset, equipped with modern techniques such as remote control, black screen overlays, and advanced data harvesting via accessibility…

    Read More New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto CredentialsContinue

  • Blog

    BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

    In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process. Resecurity said it identified a security vulnerability in the data leak site (DLS) operated by the e-crime group that made it…

    Read More BlackLock Ransomware Exposed After Researchers Exploit Leak Site VulnerabilityContinue

  • Blog

    GSA Plans FedRAMP Revamp

    The General Services Administration is planning to use automation to speed up the process to determine which cloud services federal agencies are allowed to buy.

    Read More GSA Plans FedRAMP RevampContinue

  • Blog

    Evilginx Tool (Still) Bypasses MFA

    Based on the open source NGINX Web server, the malicious tool allows threat actors to steal user credentials and session tokens.

    Read More Evilginx Tool (Still) Bypasses MFAContinue

  • Blog

    Oracle Still Denies Breach as Researchers Persist

    Evidence suggests an attacker gained access to the company’s cloud infrastructure environment, but Oracle insists that didn’t happen.

    Read More Oracle Still Denies Breach as Researchers PersistContinue

  • Blog

    Harmonic Security Raises $17.5M Series A to Accelerate Zero-Touch Data Protection to Market

    Post Content

    Read More Harmonic Security Raises $17.5M Series A to Accelerate Zero-Touch Data Protection to MarketContinue

  • Blog

    Traditional Data Loss Prevention Solutions Are Not Working for Most Organizations

    Post Content

    Read More Traditional Data Loss Prevention Solutions Are Not Working for Most OrganizationsContinue

Page navigation

Previous PagePrevious 1 … 337 338 339 340 341 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us