Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

    Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution. The list of vulnerabilities is as follows – CVE-2025-66209 (CVSS score: 10.0) – A command injection vulnerability in the database backup functionality allows any authenticated

    Read More Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted InstancesContinue

  • Blog

    OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls

    Artificial intelligence (AI) company OpenAI on Wednesday announced the launch of ChatGPT Health, a dedicated space that allows users to have conversations with the chatbot about their health. To that end, the sandboxed experience offers users the optional ability to securely connect medical records and wellness apps, including Apple Health, Function, MyFitnessPal, Weight Watchers, AllTrails,

    Read More OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data ControlsContinue

  • Blog

    CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities are listed below – CVE-2009-0556 (CVSS score: 8.8) – A code injection vulnerability in Microsoft Office

    Read More CISA Flags Microsoft Office and HPE OneView Bugs as Actively ExploitedContinue

  • Blog

    Attackers Exploit Zero-Day in End-of-Life D-Link Routers

    Hackers are attacking a critical zero-day flaw in unsupported D-Link DSL routers to run arbitrary commands.

    Read More Attackers Exploit Zero-Day in End-of-Life D-Link RoutersContinue

  • Blog

    Phishers Exploit Office 365 Users Who Let Their Guard Down

    Microsoft said that Office 365 tenants with weak configurations and who don’t have strict anti-spoofing protection enabled are especially vulnerable.

    Read More Phishers Exploit Office 365 Users Who Let Their Guard DownContinue

  • Blog

    Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches

    A cybercrime gang known as Black Cat has been attributed to a search engine optimization (SEO) poisoning campaign that employs fraudulent sites advertising popular software to trick users into downloading a backdoor capable of stealing sensitive data. According to a report published by the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC)…

    Read More Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software SearchesContinue

  • Blog

    Lack of MFA is Common Thread in Vast Cloud Credential Heist

    An emerging threat actor that goes by “Zestix” used an assortment of infostealers to obtain credentials and breach file-sharing instances of approximately 50 enterprises.

    Read More Lack of MFA is Common Thread in Vast Cloud Credential HeistContinue

  • Blog

    DDoSia Powers Affiliate-Driven Hacktivist Attacks

    Pro-Russian group NoName057(16) uses a custom denial-of-service tool to mobilize volunteers and disrupt government, media, and institutional sites tied to Ukraine and the West.

    Read More DDoSia Powers Affiliate-Driven Hacktivist AttacksContinue

  • Blog

    Cyberattacks Likely Part of Military Operation in Venezuela

    Cyber’s role in the US raid on Venezuela remains a question, though President Trump alluded to “certain expertise” in shutting down the power grid in Caracas.

    Read More Cyberattacks Likely Part of Military Operation in VenezuelaContinue

  • Blog

    Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control

    Cybersecurity researchers have disclosed details of yet another maximum-severity security flaw in n8n, a popular workflow automation platform, that allows an unauthenticated remote attacker to gain complete control over susceptible instances. The vulnerability, tracked as CVE-2026-21858 (CVSS score: 10.0), has been codenamed Ni8mare by Cyera Research Labs. Security researcher Dor Attias has been

    Read More Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full ControlContinue

Page navigation

Previous PagePrevious 1 … 64 65 66 67 68 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us