Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    CISOs Rise to Prominence: Security Leaders Join the Executive Suite

    Security professionals are moving on up the executive ranks as enterprises face rising regulatory and compliance standards.

    Read More CISOs Rise to Prominence: Security Leaders Join the Executive SuiteContinue

  • Blog

    Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts

    Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions that masquerade as human resources (HR) and enterprise resource planning (ERP) platforms like Workday, NetSuite, and SuccessFactors to take control of victim accounts. “The extensions work in concert to steal authentication tokens, block incident response capabilities, and enable complete account

    Read More Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack AccountsContinue

  • Blog

    AI System Reduces Attack Reconstruction Time From Weeks to Hours

    Pacific Northwest National Labs’ expert cybersecurity system, ALOHA, can recreate attacks and test them against organizations’ infrastructure to bolster defense.

    Read More AI System Reduces Attack Reconstruction Time From Weeks to HoursContinue

  • Blog

    Your Digital Footprint Can Lead Right to Your Front Door

    You lock your doors at night. You avoid sketchy phone calls. You’re careful about what you post on social media. But what about the information about you that’s already out there—without your permission? Your name. Home address. Phone number. Past jobs. Family members. Old usernames. It’s all still online, and it’s a lot easier to…

    Read More Your Digital Footprint Can Lead Right to Your Front DoorContinue

  • Blog

    LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing

    Security experts have disclosed details of a new campaign that has targeted U.S. government and policy entities using politically themed lures to deliver a backdoor known as LOTUSLITE. The targeted malware campaign leverages decoys related to the recent geopolitical developments between the U.S. and Venezuela to distribute a ZIP archive (“US now deciding what’s next…

    Read More LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear PhishingContinue

  • Blog

    China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure

    A threat actor likely aligned with China has been observed targeting critical infrastructure sectors in North America since at least last year. Cisco Talos, which is tracking the activity under the name UAT-8837, assessed it to be a China-nexus advanced persistent threat (APT) actor with medium confidence based on tactical overlaps with other campaigns mounted…

    Read More China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical InfrastructureContinue

  • Blog

    Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

    Cisco on Thursday released security updates for a maximum-severity security flaw impacting Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager, nearly a month after the company disclosed that it had been exploited as a zero-day by a China-nexus advanced persistent threat (APT) actor codenamed UAT-9686. The vulnerability, tracked…

    Read More Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email GatewaysContinue

  • Blog

    TamperedChef serves bad ads, with infostealers as the main course

    Sophos X-Ops explores a malvertising campaign that leverages Google Ads to distribute an infostealer Categories: Threat Research Tags: TamperedChef, EvilAI, infostealer, Sophos X-Ops

    Read More TamperedChef serves bad ads, with infostealers as the main courseContinue

  • Blog

    Predator Spyware Sample Indicates ‘Vendor-Controlled’ C2

    Researchers detailed how Intellexa, Predator’s owner, uses failed deployments and thwarted infections to strengthen its commercial spyware and generate more effective attacks.

    Read More Predator Spyware Sample Indicates ‘Vendor-Controlled’ C2Continue

  • Blog

    AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

    A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider’s own GitHub repositories, including its AWS JavaScript SDK, putting every AWS environment at risk. The vulnerability has been codenamed CodeBreach by cloud security company Wiz. The issue was fixed by AWS in September 2025 following responsible…

    Read More AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain AttacksContinue

Page navigation

Previous PagePrevious 1 … 56 57 58 59 60 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us