Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign

    Cybersecurity researchers have uncovered a coordinated campaign that leveraged 131 rebranded clones of a WhatsApp Web automation extension for Google Chrome to spam Brazilian users at scale. The 131 spamware extensions share the same codebase, design patterns, and infrastructure, according to supply chain security company Socket. The browser add-ons collectively have about 20,905 active users….

    Read More 131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam CampaignContinue

  • Blog

    MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems

    China on Sunday accused the U.S. National Security Agency (NSA) of carrying out a “premeditated” cyber attack targeting the National Time Service Center (NTSC), as it described the U.S. as a “hacker empire” and the “greatest source of chaos in cyberspace.” The Ministry of State Security (MSS), in a WeChat post, said it uncovered “irrefutable…

    Read More MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time SystemsContinue

  • Blog

    Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide

    Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its customers to carry out a broad spectrum of crimes ranging from phishing to investment fraud. The coordinated law enforcement effort, dubbed Operation SIMCARTEL, saw 26 searches carried out, resulting in the arrest of seven suspects…

    Read More Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts WorldwideContinue

  • Blog

    New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs

    Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a previously undocumented .NET malware dubbed CAPI Backdoor. According to Seqrite Labs, the attack chain involves distributing phishing emails containing a ZIP archive as a way to trigger the infection. The cybersecurity company’s analysis is…

    Read More New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPsContinue

  • Blog

    Cyber Academy Founder Champions Digital Safety for All

    Aliyu Ibrahim Usman, founder of the Cyber Cadet Academy in Nigeria, shares his passion for raising cybersecurity awareness in the wake of mounting security concerns worldwide.

    Read More Cyber Academy Founder Champions Digital Safety for AllContinue

  • Blog

    Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

    The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to target Japan and Malaysia with another remote access trojan (RAT) tracked as HoldingHands RAT (aka Gh0stBins). “The campaign relied on phishing emails with PDFs that contained embedded malicious links,” Pei Han Liao,…

    Read More Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RATContinue

  • Blog

    F5 Data Breach Attack

    What is the Attack? A sophisticated nation-state actor gained long-term access to F5’s corporate networks and exfiltrated files from BIG-IP product development and engineering knowledge-management systems, including portions of BIG-IP source code and information about previously undisclosed vulnerabilities. F5 has released security updates and advisories covering affected products. The stolen data could accelerate exploit development…

    Read More F5 Data Breach AttackContinue

  • Blog

    Microsoft Disrupts Ransomware Campaign Abusing Azure Certificates

    Microsoft revoked more than 200 digital certificates that threat actors used to sign fake Teams binaries that set the stage for Rhysida ransomware attacks.

    Read More Microsoft Disrupts Ransomware Campaign Abusing Azure CertificatesContinue

  • Blog

    AI Agent Security: Whose Responsibility Is It?

    The shared responsibility model of data security, familiar from cloud deployments, is key to agentic services, but cybersecurity teams and corporate users often struggle with awareness and managing that risk.

    Read More AI Agent Security: Whose Responsibility Is It?Continue

  • Blog

    AI Chat Data Is History’s Most Thorough Record of Enterprise Secrets, Secure it Wisely

    AI interactions are becoming one of the most revealing records of human thinking; and we’re only beginning to understand what that means for law enforcement, accountability, and privacy.

    Read More AI Chat Data Is History’s Most Thorough Record of Enterprise Secrets, Secure it WiselyContinue

Page navigation

Previous PagePrevious 1 … 37 38 39 40 41 … 323 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us