Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

    The Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new variant of backdoor dubbed TONESHELL in a cyber attack detected in mid-2025 targeting an unspecified entity in Asia. The findings come from Kaspersky, which observed the new backdoor variant in cyber espionage campaigns mounted by…

    Read More Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL BackdoorContinue

  • Blog

    SBOMs in 2026: Some Love, Some Hate, Much Ambivalence

    With a new year upon us, software and cybersecurity experts disagree on the utility of software bill of materials — in theory, SBOMs are great, but in practice, they’re a mess.

    Read More SBOMs in 2026: Some Love, Some Hate, Much AmbivalenceContinue

  • Blog

    5 Threats That Defined Security in 2025

    2025 included a number of monumental threats, from the global attacks of Salt Typhoon to dangerous vulnerabilities like React2Shell.

    Read More 5 Threats That Defined Security in 2025Continue

  • Blog

    ⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More

    Last week’s cyber news in 2025 was not about one big incident. It was about many small cracks opening at the same time. Tools people trust every day behave in unexpected ways. Old flaws resurfaced. New ones were used almost immediately. A common theme ran through it all in 2025. Attackers moved faster than fixes….

    Read More ⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & MoreContinue

  • Blog

    27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials

    Cybersecurity researchers have disclosed details of what has been described as a “sustained and targeted” spear-phishing campaign that has published over two dozen packages to the npm registry to facilitate credential theft. The activity, which involved uploading 27 npm packages from six different npm aliases, has primarily targeted sales and commercial personnel at critical

    Read More 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login CredentialsContinue

  • Blog

    MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

    A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially susceptible instances identified across the world. The vulnerability in question is CVE-2025-14847 (CVSS score: 8.7), which allows an unauthenticated attacker to remotely leak sensitive data from the MongoDB server memory. It has been codenamed MongoBleed. “A…

    Read More MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation WorldwideContinue

  • Blog

    Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

    In December 2024, the popular Ultralytics AI library was compromised, installing malicious code that hijacked system resources for cryptocurrency mining. In August 2025, malicious Nx packages leaked 2,349 GitHub, cloud, and AI credentials. Throughout 2024, ChatGPT vulnerabilities allowed unauthorized extraction of user data from AI memory. The result: 23.77 million secrets were leaked through AI

    Read More Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack VectorsContinue

  • Blog

    New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

    A high-severity security flaw has been disclosed in MongoDB that could allow unauthenticated users to read uninitialized heap memory. The vulnerability, tracked as CVE-2025-14847 (CVSS score: 8.7), has been described as a case of improper handling of length parameter inconsistency, which arises when a program fails to appropriately tackle scenarios where a length field is…

    Read More New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized MemoryContinue

  • Blog

    Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

    Trust Wallet is urging users to update its Google Chrome extension to the latest version following what it described as a “security incident” that led to the loss of approximately $7 million. The issue, the multi‑chain, non‑custodial cryptocurrency wallet service said, impacts version 2.68. The extension has about one million users, according to the Chrome…

    Read More Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious CodeContinue

  • Blog

    Mentorship and Diversity: Shaping the Next Generation of Cyber Experts

    Patricia Voight, CISO at Webster Bank, shares her expertise on advancing cybersecurity careers, combating financial crimes, and championing diversity in a rapidly changing industry.

    Read More Mentorship and Diversity: Shaping the Next Generation of Cyber ExpertsContinue

Page navigation

Previous PagePrevious 1 … 70 71 72 73 74 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us