Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware

    The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware programs, indicating that the hacking group is actively refining its toolset. That’s according to new findings from Cisco Talos, which said recent campaigns undertaken by the hacking group have seen the…

    Read More North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS MalwareContinue

  • Blog

    Threat Intelligence Executive Report – Volume 2025, Number 5

    This issue of the Counter Threat Unit’s high-level bimonthly report discusses noteworthy updates in the threat landscape during July and August

    Read More Threat Intelligence Executive Report – Volume 2025, Number 5Continue

  • Blog

    Identity Security: Your First and Last Line of Defense

    The danger isn’t that AI agents have bad days — it’s that they never do. They execute faithfully, even when what they’re executing is a mistake. A single misstep in logic or access can turn flawless automation into a flawless catastrophe. This isn’t some dystopian fantasy—it’s Tuesday at the office now. We’ve entered a new…

    Read More Identity Security: Your First and Last Line of DefenseContinue

  • Blog

    Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices

    Cybersecurity researchers have disclosed details of a recently patched critical security flaw in WatchGuard Fireware that could allow unauthenticated attackers to execute arbitrary code. The vulnerability, tracked as CVE-2025-9242 (CVSS score: 9.3), is described as an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including

    Read More Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over DevicesContinue

  • Blog

    Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign

    Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently sign malicious binaries in ransomware attacks. The certificates were “used in fake Teams setup files to deliver the Oyster backdoor and ultimately deploy Rhysida ransomware,” the Microsoft Threat Intelligence team said in…

    Read More Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware CampaignContinue

  • Blog

    Cyberattackers Target LastPass, Top Password Managers

    Be aware: a rash of phishing campaigns are leveraging the anxiety and trust employees have in password vaults securing all of their credentials.

    Read More Cyberattackers Target LastPass, Top Password ManagersContinue

  • Blog

    Leaks in Microsoft VS Code Marketplace Put Supply Chain at Risk

    Researchers discovered more than 550 unique secrets exposed in Visual Studio Code marketplaces, prompting Microsoft to bolster security measures.

    Read More Leaks in Microsoft VS Code Marketplace Put Supply Chain at RiskContinue

  • Blog

    China Hackers Test AI-Optimized Attack Chains in Taiwan

    AI might help some threat actors in certain respects, but one group is proving that its use for cyberattacks has its limits.

    Read More China Hackers Test AI-Optimized Attack Chains in TaiwanContinue

  • Blog

    North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

    A threat actor with ties to the Democratic People’s Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method. The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat…

    Read More North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart ContractsContinue

  • Blog

    Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

    A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, targeting both Windows and Apple macOS systems. “UNC5142 is characterized by its use of compromised WordPress websites and ‘EtherHiding,’ a technique…

    Read More Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress SitesContinue

Page navigation

Previous PagePrevious 1 … 38 39 40 41 42 … 323 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us