Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

    The U.S. Justice Department (DoJ) on Monday announced the seizure of a web domain and database that it said was used to further a criminal scheme designed to target and defraud Americans by means of bank account takeover fraud. The domain in question, web3adspanels[.]org, was used as a backend web panel to host and manipulate…

    Read More U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover SchemeContinue

  • Blog

    Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances

    A critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in arbitrary code execution under certain circumstances. The vulnerability, tracked as CVE-2025-68613, carries a CVSS score of 9.9 out of a maximum of 10.0. The package has about 57,000 weekly downloads, according to statistics on npm….

    Read More Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of InstancesContinue

  • Blog

    FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks

    The U.S. Federal Communications Commission (FCC) on Monday announced a ban on all drones and critical components made in a foreign country, citing national security concerns. To that end, the agency has added to its Covered List Uncrewed aircraft systems (UAS) and UAS critical components produced in a foreign country, and all communications and video…

    Read More FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security RisksContinue

  • Blog

    Threat Actors Exploit Zero-Day in WatchGuard Firebox Devices

    With attacks on the critical firewall vulnerability, WatchGuard joins a list of edge device vendors that have been targeted in recent weeks.

    Read More Threat Actors Exploit Zero-Day in WatchGuard Firebox DevicesContinue

  • Blog

    Uzbek Users Under Attack by Android SMS Stealers

    Telegram users in Uzbekistan are being targeted with Android SMS stealer malware, and what’s worse, the attackers are improving their methods.

    Read More Uzbek Users Under Attack by Android SMS StealersContinue

  • Blog

    Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

    Cybersecurity researchers have disclosed details of a new malicious package on the npm repository that works as a fully functional WhatsApp API, but also contains the ability to intercept every message and link the attacker’s device to a victim’s WhatsApp account. The package, named “lotusbail,” has been downloaded over 56,000 times since it was first…

    Read More Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login TokensContinue

  • Blog

    ⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

    Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They’re going after the everyday tools we trust most — firewalls, browser add-ons, and even smart TVs — turning small cracks into serious breaches. The real danger now isn’t just one major attack, but hundreds of quiet ones using…

    Read More ⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & MoreContinue

  • Blog

    How to Browse the Web More Sustainably With a Green Browser

    As the internet becomes an essential part of daily life, its environmental footprint continues to grow.  Data centers, constant connectivity, and resource-heavy browsing habits all contribute to energy consumption and digital waste. While individual users may not see this impact directly, the collective effect of everyday browsing is significant. Choosing a browser designed with

    Read More How to Browse the Web More Sustainably With a Green BrowserContinue

  • Blog

    Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale

    Threat actors have been observed leveraging malicious dropper apps masquerading as legitimate applications to deliver an Android SMS stealer dubbed Wonderland in mobile attacks targeting users in Uzbekistan. “Previously, users received ‘pure’ Trojan APKs that acted as malware immediately upon installation,” Group-IB said in an analysis published last week. “Now, adversaries increasingly deploy

    Read More Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at ScaleContinue

  • Blog

    Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

    Threat hunters have discerned new activity associated with an Iranian threat actor known as Infy (aka Prince of Persia), nearly five years after the hacking group was observed targeting victims in Sweden, the Netherlands, and Turkey. “The scale of Prince of Persia’s activity is more significant than we originally anticipated,” Tomer Bar, vice president of…

    Read More Iranian Infy APT Resurfaces with New Malware Activity After Years of SilenceContinue

Page navigation

Previous PagePrevious 1 … 73 74 75 76 77 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us