Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Protests Don’t Impede Iranian Spying on Expats, Syrians, Israelis

    Iranian threat actors have been stealing credentials from people of interest across the Middle East, using spear-phishing and social engineering.

    Read More Protests Don’t Impede Iranian Spying on Expats, Syrians, IsraelisContinue

  • Blog

    Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

    A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands. The flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is the result of inadequate sanitization that bypasses safeguards put in place to address CVE-2025-68613 (CVSS score: 9.9), another critical…

    Read More Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious WorkflowsContinue

  • Blog

    Hackers Exploit React2Shell to Hijack Web Traffic via Compromised NGINX Servers

    Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker’s infrastructure. Datadog Security Labs said it observed threat actors associated with the recent React2Shell (CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINX

    Read More Hackers Exploit React2Shell to Hijack Web Traffic via Compromised NGINX ServersContinue

  • Blog

    Ransomware Gang Goes Full ‘Godfather’ With Cartel

    Since its launch in 2023, DragonForce has pushed a cartel model, emphasizing cooperation and coordination among ransomware gangs.

    Read More Ransomware Gang Goes Full ‘Godfather’ With CartelContinue

  • Blog

    CISA Makes Unpublicized Ransomware Updates to KEV Catalog

    A third of the “flipped” CVEs affected network edge devices, leading one researcher to conclude, “Ransomware operators are building playbooks around your perimeter.”

    Read More CISA Makes Unpublicized Ransomware Updates to KEV CatalogContinue

  • Blog

    Attackers Use Windows Screensavers to Drop Malware, RMM Tools

    By tapping the unusual .scr file type, attackers leverage “executables that don’t always receive executable-level controls,” one researcher noted.

    Read More Attackers Use Windows Screensavers to Drop Malware, RMM ToolsContinue

  • Blog

    Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

    Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall trust in artificial intelligence (AI) systems. The tech giant’s AI Security team said the scanner leverages three observable signals that can be used to reliably flag the presence of backdoors…

    Read More Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language ModelsContinue

  • Blog

    DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

    Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of “disciplined tradecraft and clever abuse of legitimate system features” to bypass traditional detection mechanisms and deploy a remote access trojan (RAT) known as AsyncRAT. “The attack leverages IPFS-hosted VHD files, extreme script obfuscation, runtime decryption, and in-memory

    Read More DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing FilesContinue

  • Blog

    China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

    Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research is tracking the previously undocumented activity cluster under the moniker Amaranth-Dragon, which it said shares links to the APT 41 ecosystem. Targeted countries include Cambodia,

    Read More China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage CampaignsContinue

  • Blog

    Extra Extra! Announcing DR Global: Latin America

    Dark Reading has something new hitting the newsstand: a content section purpose-built for Latin American readers, featuring news, analysis, features, and multimedia.

    Read More Extra Extra! Announcing DR Global: Latin AmericaContinue

Page navigation

Previous PagePrevious 1 … 38 39 40 41 42 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us