Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

    A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. “The attacker targeted Windows Servers with WSUS enabled, exploiting CVE-2025-59287 for initial access,” AhnLab Security Intelligence Center (ASEC) said in a report published last week. “They then used PowerCat, an open-source

    Read More ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System AccessContinue

  • Blog

    China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

    The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information technology (IT) sector between 2024 and 2025 while staying undetected for extended periods of time. “In the period from 2024 to 2025, the Russian IT sector, especially companies working as contractors and integrators of solutions…

    Read More China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud ServicesContinue

  • Blog

    Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks

    Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2. “This browser-native, fileless framework leverages push notifications, fake alerts, and link redirects to target victims across operating systems,” Blackfog researcher Brenda Robb said in a Thursday report….

    Read More Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing AttacksContinue

  • Blog

    CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is CVE-2025-61757 (CVSS score: 9.8), a case of missing authentication for a critical function that can result in pre-authenticated

    Read More CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day VulnerabilityContinue

  • Blog

    Deja Vu: Salesforce Customers Hacked Again, Via Gainsight

    In a repeat of similar attacks during the summer, threat actors affiliated with the ShinyHunters extortion group used a third-party application to steal organizations’ Salesforce data.

    Read More Deja Vu: Salesforce Customers Hacked Again, Via GainsightContinue

  • Blog

    LINE Messaging Bugs Open Asian Users to Cyber Espionage

    In a potential gift to geopolitical adversaries, the encrypted messaging app uses a leaky custom protocol that allows message replays, impersonation attacks, and sensitive information exposure from chats.

    Read More LINE Messaging Bugs Open Asian Users to Cyber EspionageContinue

  • Blog

    Cloudflare’s One-Stop-Shop Convenience Takes Down Global Digital Economy

    Even the most advanced systems like Cloudflare can fall victim to software issues and become a global point of failure, Dr. David Utzke argues, adding that the recent outage should be a warning for enterprises.

    Read More Cloudflare’s One-Stop-Shop Convenience Takes Down Global Digital EconomyContinue

  • Blog

    Hack the Hackers: 6 Laws for Staying Ahead of the Attackers

    A new security framework responds to a shift in attackers’ tactics, one that allows them to infiltrate enterprises ‘silently’ through their own policies.

    Read More Hack the Hackers: 6 Laws for Staying Ahead of the AttackersContinue

  • Blog

    Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation

    Grafana has released security updates to address a maximum severity security flaw that could allow privilege escalation or user impersonation under certain configurations. The vulnerability, tracked as CVE-2025-41115, carries a CVSS score of 10.0. It resides in the System for Cross-domain Identity Management (SCIM) component that allows automated user provisioning and management. First

    Read More Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege EscalationContinue

  • Blog

    With AI Reshaping Entry-Level Cyber, What Happens to the Security Talent Pipeline?

    Automation is rewriting early-career cybersecurity work, raising urgent questions about how the next generation of security professionals will gain real-world expertise.

    Read More With AI Reshaping Entry-Level Cyber, What Happens to the Security Talent Pipeline?Continue

Page navigation

Previous PagePrevious 1 … 4 5 6 7 8 … 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us