Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Bogus ‘BianLian’ Gang Sends Snail-Mail Extortion Letters

    The letters mimic typical ransom notes and threaten to delete or leak compromised data if payments aren’t made, though none of the organizations that received them had active ransomware attacks.

    Read More Bogus ‘BianLian’ Gang Sends Snail-Mail Extortion LettersContinue

  • Blog

    China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

    The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain as a means to obtain initial access to corporate networks. That’s according to new findings from the Microsoft Threat Intelligence team, which said the Silk…

    Read More China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial AccessContinue

  • Blog

    Why Security Leaders Are Opting for Consulting Gigs

    Many CISOs are weighing the benefits of going virtual as a consultant. Can the pendulum swing in the other direction?

    Read More Why Security Leaders Are Opting for Consulting GigsContinue

  • Blog

    Defending against USB drive attacks with Wazuh

    USB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of USB devices to deliver malware and circumvent traditional network security measures. These attacks lead to data breaches, financial losses, and operational disruptions, with lasting impacts on an organization’s reputation. An example is the Stuxnet worm discovered in 2010, a malware…

    Read More Defending against USB drive attacks with WazuhContinue

  • Blog

    Black Basta Pivots to Cactus Ransomware Group

    The future of the formerly fearsome cybercriminal group remains uncertain as key members have moved to a new affiliation, in fresh attacks that use novel persistence malware BackConnect.

    Read More Black Basta Pivots to Cactus Ransomware GroupContinue

  • Blog

    Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

    The threat actor known as Dark Caracal has been attributed to a campaign that deployed a remote access trojan called Poco RAT in attacks targeting Spanish-speaking targets in Latin America in 2024. The findings come from Russian cybersecurity company Positive Technologies, which described the malware as loaded with a “full suite of espionage features.” “It…

    Read More Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin AmericaContinue

  • Blog

    Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud

    Google has announced the rollout of artificial intelligence (AI)-powered scam detection features to secure Android device users and their personal information. “These features specifically target conversational scams, which can often appear initially harmless before evolving into harmful situations,” Google said. “And more phone calling scammers are using spoofing techniques to hide their real

    Read More Google Rolls Out AI Scam Detection for Android to Combat Conversational FraudContinue

  • Blog

    Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

    The threat actor known as Lotus Panda has been observed targeting government, manufacturing, telecommunications, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan with updated versions of a known backdoor called Sagerunex. “Lotus Blossom has been using the Sagerunex backdoor since at least 2016 and is increasingly employing long-term persistence command shells and…

    Read More Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor VariantsContinue

  • Blog

    Identity: The New Cybersecurity Battleground

    The rapid adoption of cloud services, SaaS applications, and the shift to remote work have fundamentally reshaped how enterprises operate. These technological advances have created a world of opportunity but also brought about complexities that pose significant security threats. At the core of these vulnerabilities lies Identity—the gateway to enterprise security and the number one…

    Read More Identity: The New Cybersecurity BattlegroundContinue

  • Blog

    Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

    Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems. “The threat actor has published at least seven packages impersonating widely used Go libraries, including one (github[.]com/shallowmulti/hypert) that appears to target financial-sector developers

    Read More Seven Malicious Go Packages Found Deploying Malware on Linux and macOS SystemsContinue

Page navigation

Previous PagePrevious 1 … 365 366 367 368 369 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us