Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Security Expert Troy Hunt Lured in by Mailchimp Phish

    Hunt quickly took to his blog to notify the public of the breach and provide further details on how this could have happened.

    Read More Security Expert Troy Hunt Lured in by Mailchimp PhishContinue

  • Blog

    Cybersecurity Gaps Leave Doors Wide Open

    Attackers don’t always need to resort to sophisticated gambits to break and enter; organizations often make it easy for them to walk right in.

    Read More Cybersecurity Gaps Leave Doors Wide OpenContinue

  • Blog

    New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations

    The Chinese threat actor known as FamousSparrow has been linked to a cyber attack targeting a trade group in the United States and a research institute in Mexico to deliver its flagship backdoor SparrowDoor and ShadowPad. The activity, observed in July 2024, marks the first time the hacking crew has deployed ShadowPad, a malware widely…

    Read More New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican OrganizationsContinue

  • Blog

    Beyond STIX: Next-Level Cyber-Threat Intelligence

    While industry experts continue to analyze, interpret, and act on threat data, the complexity of cyber threats necessitates solutions that can quickly convert expert knowledge into machine-readable formats.

    Read More Beyond STIX: Next-Level Cyber-Threat IntelligenceContinue

  • Blog

    ‘Lucid’ Phishing-as-a-Service Exploits Faults in iMessage, Android RCS

    Cybercriminals in China have figured out how to undermine the strengths of mobile messaging protocols.

    Read More ‘Lucid’ Phishing-as-a-Service Exploits Faults in iMessage, Android RCSContinue

  • Blog

    EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware

    The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families, including backdoors and information stealers such as Rhadamanthys and StealC. “In this attack, the threat actor manipulates .msc files and the Multilingual User Interface Path (MUIPath) to download and execute…

    Read More EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC MalwareContinue

  • Blog

    RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment

    The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor’s tradecraft. The activity, observed by Romanian cybersecurity company Bitdefender, involves the deployment of a never-before-seen ransomware strain dubbed QWCrypt. RedCurl, also called Earth Kapre and Red Wolf, has a history of…

    Read More RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt DeploymentContinue

  • Blog

    New Testing Framework Helps Evaluate Sandboxes

    The Anti-Malware Testing Standards Organization published a Sandbox Evaluation Framework to set a standard among various sandbox offerings that help protect organizations from rising threats.

    Read More New Testing Framework Helps Evaluate SandboxesContinue

  • Blog

    Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks

    Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the open-source ecosystem. The packages in question are ethers-provider2 and ethers-providerz, with the former downloaded 73 times to date since it was published on

    Read More Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell AttacksContinue

  • Blog

    Google Hastily Patches Chrome Zero-Day Exploited by APT

    Researchers at Kaspersky discovered cyber-espionage activity that used the vulnerability in a one-click phishing attack to deliver malware.

    Read More Google Hastily Patches Chrome Zero-Day Exploited by APTContinue

Page navigation

Previous PagePrevious 1 … 341 342 343 344 345 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us