Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Big Breach or Nada de Nada? Mexican Gov’t Faces Leak Allegations

    A hacktivist group claims a 2.3-terabyte data breach exposes the information of 36 million Mexicans, but no sensitive accounts are at risk, says government.

    Read More Big Breach or Nada de Nada? Mexican Gov’t Faces Leak AllegationsContinue

  • Blog

    Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

    An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge: Identity Lives Outside the Identity Stack Identity and access management tools were built to govern users and directories. Modern enterprises run on applications. Over time, identity logic has moved into application code, APIs, service accounts, and custom authentication

    Read More Orchid Security Introduces Continuous Identity Observability for Enterprise ApplicationsContinue

  • Blog

    Google Looker Bugs Allow Cross-Tenant RCE, Data Exfil

    Attackers could even have used one vulnerable Lookout user to gain access to other GCP tenants’ environments.

    Read More Google Looker Bugs Allow Cross-Tenant RCE, Data ExfilContinue

  • Blog

    The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

    Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when pressure is high, and information is incomplete. I have seen IR teams recover from sophisticated intrusions with limited telemetry. I have also seen teams lose control of investigations they should…

    Read More The First 90 Seconds: How Early Decisions Shape Incident Response InvestigationsContinue

  • Blog

    Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

    Microsoft has warned that information-stealing attacks are “rapidly expanding” beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale. The tech giant’s Defender Security Research Team said it observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since

    Read More Microsoft Warns Python Infostealers Target macOS via Fake Ads and InstallersContinue

  • Blog

    Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

    The Eclipse Foundation, which maintains the Open VSX Registry, has announced plans to enforce security checks before Microsoft Visual Studio Code (VS Code) extensions are published to the open-source repository to combat supply chain threats. The move marks a shift from a reactive to a proactive approach to ensure that malicious extensions don’t end up…

    Read More Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX ExtensionsContinue

  • Blog

    CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog, flagging it as actively exploited in attacks. The vulnerability, tracked as CVE-2025-40551 (CVSS score: 9.8), is a untrusted data deserialization vulnerability that could pave the way for…

    Read More CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV CatalogContinue

  • Blog

    Malicious use of virtual machine infrastructure

    Bulletproof hosting providers are abusing the legitimate ISPsystem infrastructure to supply virtual machines to cybercriminals Categories: Threat Research Tags: virtual machine, cybercrime, Ransomware, ISPs

    Read More Malicious use of virtual machine infrastructureContinue

  • Blog

    Russian Hackers Weaponize Microsoft Office Bug in Just 3 Days

    APT28’s attacks rely on specially crafted Microsoft Rich Text Format (RTF) documents to kick off a multistage infection chain to deliver malicious payloads.

    Read More Russian Hackers Weaponize Microsoft Office Bug in Just 3 DaysContinue

  • Blog

    GlassWorm Malware Returns to Shatter Developer Ecosystems

    The self-replicating malware has poisoned a fresh set of Open VSX software components, leaving potential downstream victims with infostealer infections.

    Read More GlassWorm Malware Returns to Shatter Developer EcosystemsContinue

Page navigation

Previous PagePrevious 1 … 39 40 41 42 43 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us