Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Hand CVE Over to the Private Sector

    How MITRE has mismanaged the world’s vulnerability database for decades and wasted millions along the way.

    Read More Hand CVE Over to the Private SectorContinue

  • Blog

    CTEM in Practice: Prioritization, Validation, and Outcomes That Matter

    Cybersecurity teams increasingly want to move beyond looking at threats and vulnerabilities in isolation. It’s not only about what could go wrong (vulnerabilities) or who might attack (threats), but where they intersect in your actual environment to create real, exploitable exposure. Which exposures truly matter? Can attackers exploit them? Are our defenses effective? Continuous Threat…

    Read More CTEM in Practice: Prioritization, Validation, and Outcomes That MatterContinue

  • Blog

    Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas

    A critical security flaw has been disclosed in Grist‑Core, an open-source, self-hosted version of the Grist relational spreadsheet-database, that could result in remote code execution. The vulnerability, tracked as CVE-2026-24002 (CVSS score: 9.1), has been codenamed Cellbreak by Cyera Research Labs. “One malicious formula can turn a spreadsheet into a Remote Code Execution (RCE) beachhead,”

    Read More Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet FormulasContinue

  • Blog

    China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023

    Cybersecurity researchers have discovered a JScript-based command-and-control (C2) framework called PeckBirdy that has been put to use by China-aligned APT actors since 2023 to target multiple environments. The flexible framework has been put to use against Chinese gambling industries and malicious activities targeting Asian government entities and private organizations, according to Trend Micro

    Read More China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023Continue

  • Blog

    Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation

    Microsoft on Monday issued out-of-band security patches for a high-severity Microsoft Office zero-day vulnerability exploited in attacks. The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in Microsoft Office. “Reliance on untrusted inputs in a security decision in Microsoft Office allows…

    Read More Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active ExploitationContinue

  • Blog

    Beyond MFA: Building true resilience against identity-based attacks

    Categories: Sophos Insights Tags: Identity Security, MFA, Sophos ITDR

    Read More Beyond MFA: Building true resilience against identity-based attacksContinue

  • Blog

    Sandworm Blamed for Wiper Attack on Poland Power Grid

    Researchers attributed the failed attempt to the infamous Russian APT Sandworm, which is notorious for wiper attacks on critical infrastructure organizations.

    Read More Sandworm Blamed for Wiper Attack on Poland Power GridContinue

  • Blog

    Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware

    Cybersecurity researchers have discovered an ongoing campaign that’s targeting Indian users with a multi-stage backdoor as part of a suspected cyber espionage campaign. The activity, per the eSentire Threat Response Unit (TRU), involves using phishing emails impersonating the Income Tax Department of India to trick victims into downloading a malicious archive, ultimately granting the threat

    Read More Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon MalwareContinue

  • Blog

    DPRK’s Konni Targets Blockchain Developers With AI-Generated Backdoor

    The North Korean threat group is using a new PowerShell backdoor to compromise development environments and target cryptocurrency holdings, according to researchers.

    Read More DPRK’s Konni Targets Blockchain Developers With AI-Generated BackdoorContinue

  • Blog

    Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code

    Cybersecurity researchers have discovered two malicious Microsoft Visual Studio Code (VS Code) extensions that are advertised as artificial intelligence (AI)-powered coding assistants, but also harbor covert functionality to siphon developer data to China-based servers. The extensions, which have 1.5 million combined installs and are still available for download from the official Visual Studio

    Read More Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source CodeContinue

Page navigation

Previous PagePrevious 1 … 48 49 50 51 52 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us