Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Europe’s GCVE Raises Concerns Over Fragmentation in Vulnerability Databases

    GCVE would enhance global collaboration, flexibility, and efficiency in tracking security flaws. Duplicate entries and a decentralization policy may create more chaos for defenders.

    Read More Europe’s GCVE Raises Concerns Over Fragmentation in Vulnerability DatabasesContinue

  • Blog

    Healthy Security Cultures Thrive on Risk Reporting

    The signs of an effective security culture are shifting as companies call on CISOs and security teams to raise their hands unabashedly.

    Read More Healthy Security Cultures Thrive on Risk ReportingContinue

  • Blog

    CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows – CVE-2025-68645 (CVSS score: 8.8) – A PHP remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that…

    Read More CISA Updates KEV Catalog with Four Actively Exploited Software VulnerabilitiesContinue

  • Blog

    Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls

    Fortinet has officially confirmed that it’s working to completely plug a FortiCloud SSO authentication bypass vulnerability following reports of fresh exploitation activity on fully-patched firewalls. “In the last 24 hours, we have identified a number of cases where the exploit was to a device that had been fully upgraded to the latest release at the…

    Read More Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate FirewallsContinue

  • Blog

    TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order

    TikTok on Friday officially announced that it formed a joint venture that will allow the hugely popular video-sharing application to continue operating in the U.S. The new venture, named TikTok USDS Joint Venture LLC, has been established in compliance with the Executive Order signed by U.S. President Donald Trump in September 2025, the platform said….

    Read More TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive OrderContinue

  • Blog

    Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access

    Cybersecurity researchers have disclosed details of a new dual-vector campaign that leverages stolen credentials to deploy legitimate Remote Monitoring and Management (RMM) software for persistent remote access to compromised hosts. “Instead of deploying custom viruses, attackers are bypassing security perimeters by weaponizing the necessary IT tools that administrators trust,” KnowBe4 Threat

    Read More Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent AccessContinue

  • Blog

    Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms

    Microsoft has warned of a multi‑stage adversary‑in‑the‑middle (AitM) phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector. “The campaign abused SharePoint file‑sharing services to deliver phishing payloads and relied on inbox rule creation to maintain persistence and evade user awareness,” the Microsoft Defender Security Research Team said.

    Read More Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy FirmsContinue

  • Blog

    Risky Chinese Electric Buses Spark Aussie Gov’t Review

    Deployed across Australia and Europe, China’s electric buses are vulnerable to cybercriminals and sport a virtual kill switch the Chinese state could activate.

    Read More Risky Chinese Electric Buses Spark Aussie Gov’t ReviewContinue

  • Blog

    Fortinet Firewalls Hit With Malicious Configuration Changes

    Automated infections of potentially fully patched FortiGate devices are allowing threat actors to steal firewall configuration files.

    Read More Fortinet Firewalls Hit With Malicious Configuration ChangesContinue

  • Blog

    From a Whisper to a Scream: Europe Frets About Overreliance on US Tech

    Concern is growing across Europe about relying on US cybersecurity companies, and Greenland takeover talk is eroding trust across the EU even further.

    Read More From a Whisper to a Scream: Europe Frets About Overreliance on US TechContinue

Page navigation

Previous PagePrevious 1 … 50 51 52 53 54 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us