Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

    The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in 66% of cloud storage buckets. This data is vulnerable to ransomware attacks. The SANS Institute recently reported that these attacks can be performed by abusing the cloud provider’s storage security controls and default settings. “In just the past…

    Read More SANS Institute Warns of Novel Cloud-Native Ransomware AttacksContinue

  • Blog

    GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories

    Cybersecurity researchers are calling attention to an incident in which the popular GitHub Action tj-actions/changed-files was compromised to leak secrets from repositories using the continuous integration and continuous delivery (CI/CD) workflow. The incident involved the tj-actions/changed-files GitHub Action, which is used in over 23,000 repositories. It’s used to track and retrieve all

    Read More GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 RepositoriesContinue

  • Blog

    Intel’s Secure Data Tunnel Moves AI Training Models to Data Sources

    The chip maker’s Tiber Secure Federated AI service creates a secure tunnel between AI models on remote servers and data sources on origin systems.

    Read More Intel’s Secure Data Tunnel Moves AI Training Models to Data SourcesContinue

  • Blog

    Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal

    Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index (PyPI) repository with bogus libraries masquerading as “time” related utilities, but harboring hidden functionality to steal sensitive data such as cloud access tokens. Software supply chain security firm ReversingLabs said it discovered two sets of packages totaling 20 of them….

    Read More Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before RemovalContinue

  • Blog

    Threat Actor Impersonates Booking.com in Phishing Scheme

    Microsoft detailed a sophisticated campaign that relies on a social engineering technique, “ClickFix,” in which a phisher uses security verification like captcha to give the target a false sense of safety.

    Read More Threat Actor Impersonates Booking.com in Phishing SchemeContinue

  • Blog

    Man-in-the-Middle Vulns Provide New Research Opportunities for Car Security

    A pair of researchers plan on detailing effective tools to dig into the effectiveness of vehicle cybersecurity without breaking the bank.

    Read More Man-in-the-Middle Vulns Provide New Research Opportunities for Car SecurityContinue

  • Blog

    Ransomware Developer Extradited, Admits Working for LockBit

    Law enforcement discovered admin credentials on the suspect’s computer for an online repository hosted on the Dark Web that stored source code for multiple versions of the LockBit builder.

    Read More Ransomware Developer Extradited, Admits Working for LockBitContinue

  • Blog

    Threat Actor Tied to LockBit Ransomware Targets Fortinet Users

    The Mora_001 group uses similar post-exploitation patterns and ransomware customization originated by LockBit.

    Read More Threat Actor Tied to LockBit Ransomware Targets Fortinet UsersContinue

  • Blog

    Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges

    A 51-year-old dual Russian and Israeli national who is alleged to be a developer of the LockBit ransomware group has been extradited to the United States, nearly three months after he was formally charged in connection with the e-crime scheme. Rostislav Panev was previously arrested in Israel in August 2024. He is said to have been…

    Read More Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime ChargesContinue

  • Blog

    CISA Cuts $10M in ISAC Funding & 100s of Employees

    President Trump has long complained about perceived threats to election security. Now his DHS has kneecapped the agencies designed to support it. Experts are worried about what comes next.

    Read More CISA Cuts $10M in ISAC Funding & 100s of EmployeesContinue

Page navigation

Previous PagePrevious 1 … 354 355 356 357 358 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us