Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign

    Cybersecurity researchers have shed light on the inner workings of a botnet malware called PolarEdge. PolarEdge was first documented by Sekoia in February 2025, attributing it to a campaign targeting routers from Cisco, ASUS, QNAP, and Synology with the goal of corralling them into a network for an as-yet-undetermined purpose. The TLS-based ELF implant, at…

    Read More PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet CampaignContinue

  • Blog

    Streaming Fraud Campaigns Rely on AI Tools, Bots

    Fraudsters are using generative AI to generate fake music and boost the popularity of the fake content.

    Read More Streaming Fraud Campaigns Rely on AI Tools, BotsContinue

  • Blog

    Securing AI to Benefit from AI

    Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It can help teams cut through alert fatigue, spot patterns faster, and bring a level of scale that human analysts alone can’t match. But realizing that potential depends on securing the systems that make it possible. Every…

    Read More Securing AI to Benefit from AIContinue

  • Blog

    ‘PassiveNeuron’ Cyber Spies Target Orgs with Custom Malware

    A persistent cyber espionage campaign focused on SQL servers is targeting government, industrial and financial sectors across Asia, Africa, and Latin America.

    Read More ‘PassiveNeuron’ Cyber Spies Target Orgs with Custom MalwareContinue

  • Blog

    Announcing the latest evolution of our Security Operations portfolio

    New innovations in identity protection, expanded security services, and advancements in AI, and threat detection and response to strengthen cybersecurity outcomes

    Read More Announcing the latest evolution of our Security Operations portfolioContinue

  • Blog

    Introducing Sophos Identity Threat Detection and Response (ITDR)

    Neutralize identity-based threats before they can impact your business.

    Read More Introducing Sophos Identity Threat Detection and Response (ITDR)Continue

  • Blog

    Getting salty with LLMs: SophosAI unveils new defense against jailbreaking at CAMLIS 2025

    On October 22-24, SophosAI will present research on ‘LLM salting’ (a novel countermeasure against jailbreaks) and command line classification at CAMLIS 2025

    Read More Getting salty with LLMs: SophosAI unveils new defense against jailbreaking at CAMLIS 2025Continue

  • Blog

    Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers

    A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025, suggesting an increased “operations tempo” from the threat actor. The findings come from Google Threat Intelligence Group (GTIG), which said the state-sponsored hacking crew has rapidly refined and retooled its malware arsenal merely five days…

    Read More Google Identifies Three New Russian Malware Families Created by COLDRIVER HackersContinue

  • Blog

    Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network

    A European telecommunications organization is said to have been targeted by a threat actor that aligns with a China-nexus cyber espionage group known as Salt Typhoon. The organization, per Darktrace, was targeted in the first week of July 2025, with the attackers exploiting a Citrix NetScaler Gateway appliance to obtain initial access. Salt Typhoon, also…

    Read More Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom NetworkContinue

  • Blog

    ColdRiver Drops Fresh Malware on Targets

    The Russia-backed threat actor’s latest cyber spying campaign is a classic example of how quickly sophisticated hacking groups can pivot when exposed.

    Read More ColdRiver Drops Fresh Malware on TargetsContinue

Page navigation

Previous PagePrevious 1 … 35 36 37 38 39 … 323 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us