Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Is the Middle East’s Race to Digitize a Threat to Infrastructure?

    As the region continues with its ambitious road map, cybersecurity must be woven into every step of the process.

    Read More Is the Middle East’s Race to Digitize a Threat to Infrastructure?Continue

  • Blog

    GitHub Supply Chain Breach: Coinbase Attack Exposes 218 Repositories, Leaks CI/CD Secrets

    The supply chain attack involving the GitHub Action “tj-actions/changed-files” started as a highly-targeted attack against one of Coinbase’s open-source projects, before evolving into something more widespread in scope. “The payload was focused on exploiting the public CI/CD flow of one of their open source projects – agentkit, probably with the purpose of leveraging it for…

    Read More GitHub Supply Chain Breach: Coinbase Attack Exposes 218 Repositories, Leaks CI/CD SecretsContinue

  • Blog

    U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe

    The U.S. Treasury Department has announced that it’s removing sanctions against Tornado Cash, a cryptocurrency mixer service that has been accused of aiding the North Korea-linked Lazarus Group to launder their ill-gotten proceeds. “Based on the Administration’s review of the novel legal and policy issues raised by use of financial sanctions against financial and commercial…

    Read More U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering ProbeContinue

  • Blog

    What CISA’s Red Team Disarray Means for US Cyber Defenses

    DOGE is making wild moves at CISA, including bringing back fired probationary employees only to put them on paid leave, and reportedly gutting the agency’s red teams.

    Read More What CISA’s Red Team Disarray Means for US Cyber DefensesContinue

  • Blog

    Attackers Pivot to SEMrush Spoof to Steal Google Credentials

    The attackers are taking an indirect approach to targeting SEO professionals and their Google credentials, using a fake digital marketing website.

    Read More Attackers Pivot to SEMrush Spoof to Steal Google CredentialsContinue

  • Blog

    Nation-State ‘Paragon’ Spyware Infections Target Civil Society

    Law enforcement entities in democratic states have been deploying top-of-the-line messaging app spyware against journalists and aid workers.

    Read More Nation-State ‘Paragon’ Spyware Infections Target Civil SocietyContinue

  • Blog

    Why Cyber Quality Is the Key to Security

    The time to secure foundations, empower teams, and make cyber resilience the standard is now — because the cost of waiting is far greater than the investment in proactive security.

    Read More Why Cyber Quality Is the Key to SecurityContinue

  • Blog

    UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools

    Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023. “UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to conduct post-compromise activities to establish persistence in…

    Read More UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source ToolsContinue

  • Blog

    Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates

    The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed to disable anti-malware tools. Elastic Security Labs said it observed a Medusa ransomware attack that delivered the encryptor by means of a loader packed using…

    Read More Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen CertificatesContinue

  • Blog

    China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families

    The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a “global espionage campaign” that took place in 2022 targeting seven organizations. These entities include governments, catholic charities, non-governmental organizations (NGOs), and think tanks across Taiwan, Hungary, Turkey, Thailand, France, and the United States. The activity, which took place

    Read More China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware FamiliesContinue

Page navigation

Previous PagePrevious 1 … 346 347 348 349 350 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us