Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

    The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency. Versions 1.14.1 and 0.30.4 of Axios have been found to inject “plain-crypto-js” version 4.2.1 as a fake dependency. According to StepSecurity, the two versions were published using the compromised…

    Read More Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm AccountContinue

  • Blog

    AI-Powered ‘DeepLoad’ Malware Steals Credentials, Evades Detection

    The massive amount of junk code that hides the malware’s logic from security scans was almost certainly generated by AI, researchers say.

    Read More AI-Powered ‘DeepLoad’ Malware Steals Credentials, Evades DetectionContinue

  • Blog

    AI-Driven Code Surge Is Forcing a Rethink of AppSec

    In a conversation with Dark Reading’s Terry Sweeney, Black Duck CEO Jason Schmitt explains how AI is reshaping application security and why it must evolve to keep pace.

    Read More AI-Driven Code Surge Is Forcing a Rethink of AppSecContinue

  • Blog

    Fortinet BIG-IP Vulnerability Reclassified as RCE, Under Exploitation

    CVE-2025-53521 was initially disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information has revealed the bug is actually much more dangerous.

    Read More Fortinet BIG-IP Vulnerability Reclassified as RCE, Under ExploitationContinue

  • Blog

    OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

    A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without user knowledge or consent, according to new findings from Check Point. “A single malicious prompt could turn an otherwise ordinary conversation into a covert exfiltration channel, leaking user messages, uploaded files, and other sensitive content,” the cybersecurity company said in

    Read More OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token VulnerabilityContinue

  • Blog

    Manufacturing and Healthcare Share Struggles with Passwords

    The two key economic sectors struggle with security for a reason: Many insiders view access management as a roadblock, while attackers see it as a way in.

    Read More Manufacturing and Healthcare Share Struggles with PasswordsContinue

  • Blog

    DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

    A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute a previously undocumented malware loader referred to as DeepLoad. “It likely uses AI-assisted obfuscation and process injection to evade static scanning, while credential theft starts immediately and captures passwords and sessions even if the primary loader is blocked,” ReliaQuest researchers…

    Read More DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser CredentialsContinue

  • Blog

    Storm Brews Over Critical, No-Click Telegram Flaw

    The vulnerability, which is allegedly triggered by a corrupted sticker in the messaging app, received a 9.8 CVSS score, but Telegram denies it exists.

    Read More Storm Brews Over Critical, No-Click Telegram FlawContinue

  • Blog

    ⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

    Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods are showing up in new places, and research that stopped being theoretical right around the time defenders stopped paying attention. There’s a bit of everything this week. Persistence plays, legal wins, influence…

    Read More ⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and MoreContinue

  • Blog

    3 SOC Process Fixes That Unlock Tier 1 Productivity

    What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone. They come from fragmented workflows, manual triage steps, and limited visibility early in the investigation. Fixing those process gaps can help Tier 1 move faster, reduce unnecessary…

    Read More 3 SOC Process Fixes That Unlock Tier 1 ProductivityContinue

Page navigation

Previous PagePrevious 1 … 32 33 34 35 36 … 458 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us