Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

    Certain motherboard models from vendors like ASRock, ASUSTeK Computer, GIGABYTE, and MSI are affected by a security vulnerability that leaves them susceptible to early-boot direct memory access (DMA) attacks across architectures that implement a Unified Extensible Firmware Interface (UEFI) and input–output memory management unit (IOMMU). UEFI and IOMMU are designed to enforce a security

    Read More New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI MotherboardsContinue

  • Blog

    Cisco AsyncOS Zero-day

    What is the Attack? Cisco has confirmed the active exploitation of a critical zero-day vulnerability in AsyncOS, tracked as CVE-2025-20393, affecting Cisco Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances. The vulnerability allows unauthenticated remote attackers to execute arbitrary operating system commands with root-level privileges, leading to full device compromise. At…

    Read More Cisco AsyncOS Zero-dayContinue

  • Blog

    SonicWall Edge Access Devices Hit by Zero-Day Attacks

    In the latest attacks against the vendor’s SMA1000 devices, threat actors have chained a new zero-day flaw with a critical vulnerability disclosed earlier this year.

    Read More SonicWall Edge Access Devices Hit by Zero-Day AttacksContinue

  • Blog

    I am not a robot: ClickFix used to deploy StealC and Qilin

    The fake human verification process led to infostealer and ransomware infections

    Read More I am not a robot: ClickFix used to deploy StealC and QilinContinue

  • Blog

    China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

    A previously undocumented China-aligned threat cluster dubbed LongNosedGoblin has been attributed to a series of cyber attacks targeting governmental entities in Southeast Asia and Japan. The end goal of these attacks is cyber espionage, Slovak cybersecurity company ESET said in a report published today. The threat activity cluster has been assessed to be active since…

    Read More China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage MalwareContinue

  • Blog

    HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

    Hewlett Packard Enterprise (HPE) has resolved a maximum-severity security flaw in OneView Software that, if successfully exploited, could result in remote code execution. The critical vulnerability, assigned the CVE identifier CVE-2025-37164, carries a CVSS score of 10.0. HPE OneView is an IT infrastructure management software that streamlines IT operations and controls all systems via a

    Read More HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code ExecutionContinue

  • Blog

    ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

    This week’s ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in tactics are stacking up fast, and each one hints at where the next big breach could come from. From shifting infrastructures to clever social hooks, the week’s activity shows just how fluid the threat…

    Read More ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More StoriesContinue

  • Blog

    Dormant Iran APT is Still Alive, Spying on Dissidents

    “Prince of Persia” has rewritten the rules of persistence with advanced operational security and cryptographic communication with its command-and-control server.

    Read More Dormant Iran APT is Still Alive, Spying on DissidentsContinue

  • Blog

    The Case for Dynamic AI-SaaS Security as Copilots Scale

    Within the past year, artificial intelligence copilots and agents have quietly permeated the SaaS applications businesses use every day. Tools like Zoom, Slack, Microsoft 365, Salesforce, and ServiceNow now come with built-in AI assistants or agent-like features. Virtually every major SaaS vendor has rushed to embed AI into their offerings. The result is an explosion…

    Read More The Case for Dynamic AI-SaaS Security as Copilots ScaleContinue

  • Blog

    Cisco ASA and FTD Firewall RCE

    Critical zero-day vulnerabilities affecting Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure Firewall Threat Defense (FTD) software have been actively exploited in the wild. The campaign is widespread and involves exploiting zero-day vulnerabilities to gain unauthenticated remote code execution on ASAs, as well as manipulating read-only memory (ROM) to persist through reboot and…

    Read More Cisco ASA and FTD Firewall RCEContinue

Page navigation

Previous PagePrevious 1 … 75 76 77 78 79 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us