Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking

    A critical security vulnerability has been disclosed in AMI’s MegaRAC Baseboard Management Controller (BMC) software that could allow an attacker to bypass authentication and carry out post-exploitation actions. The vulnerability, tracked as CVE-2024-54085, carries a CVSS v4 score of 10.0, indicating maximum severity. “A local or remote attacker can exploit the vulnerability by accessing the

    Read More New Critical AMI BMC Vulnerability Enables Remote Server Takeover and BrickingContinue

  • Blog

    New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads

    Cybersecurity researchers have warned about a large-scale ad fraud campaign that has leveraged hundreds of malicious apps published on the Google Play Store to serve full-screen ads and conduct phishing attacks. “The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks,” Bitdefender said…

    Read More New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive AdsContinue

  • Blog

    How to Improve Okta Security in Four Steps

    While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this

    Read More How to Improve Okta Security in Four StepsContinue

  • Blog

    China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

    Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace threat actor that targeted a diplomatic organization in the European Union with a backdoor known as ANEL. The attack, detected by ESET in late August 2024, singled out a Central European diplomatic institute with lures related to Word…

    Read More China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage OperationContinue

  • Blog

    BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse

    At least four different threat actors have been identified as involved in an updated version of a massive ad fraud and residential proxy scheme called BADBOX, painting a picture of an interconnected cybercrime ecosystem. This includes SalesTracker Group, MoYu Group, Lemon Group, and LongTV, according to new findings from the HUMAN Satori Threat Intelligence and…

    Read More BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy AbuseContinue

  • Blog

    Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets

    Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data. The malware contains capabilities to “steal information from the target system, such as credentials stored in the browser, digital wallet…

    Read More Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto WalletsContinue

  • Blog

    OAuth Attacks Target Microsoft 365, GitHub

    In a cyber twist, attackers behind two of the campaigns are using the apps to redirect users to phishing and malware distribution sites.

    Read More OAuth Attacks Target Microsoft 365, GitHubContinue

  • Blog

    ClickFix Attack Compromises 100+ Car Dealership Sites

    The ClickFix attack tactic seems to be gaining traction among threat actors.

    Read More ClickFix Attack Compromises 100+ Car Dealership SitesContinue

  • Blog

    Lexmark Expands Print Security Services Worldwide

    Post Content

    Read More Lexmark Expands Print Security Services WorldwideContinue

  • Blog

    Varonis Acquires Cyral to Reinvent Database Activity Monitoring

    Post Content

    Read More Varonis Acquires Cyral to Reinvent Database Activity MonitoringContinue

Page navigation

Previous PagePrevious 1 … 352 353 354 355 356 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us