Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    WhatsApp compromise leads to Astaroth deployment

    Another campaign targeting WhatsApp users in Brazil spreads like a worm and employs multiple payloads for credential theft, session hijacking, and persistence

    Read More WhatsApp compromise leads to Astaroth deploymentContinue

  • Blog

    ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

    Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in the Ray open-source artificial intelligence (AI) framework to turn infected clusters with NVIDIA GPUs into a self-replicating cryptocurrency mining botnet. The activity, codenamed ShadowRay 2.0, is an evolution of a prior wave that was observed between September 2023 and March 2024. The…

    Read More ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining BotnetContinue

  • Blog

    ‘Matrix Push’ C2 Tool Hijacks Browser Notifications

    Have you ever given two seconds of thought to a browser notification? No? That’s what hackers bent on phishing are counting on.

    Read More ‘Matrix Push’ C2 Tool Hijacks Browser NotificationsContinue

  • Blog

    Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows

    Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that’s targeting Windows users. Active since mid-2025, the threat is designed to execute arbitrary JavaScript code retrieved from a command-and-control (C2) server, Kaspersky researcher Lisandro Ubiedo said in an analysis published today. There are currently no details on how the botnet malware is propagated;

    Read More Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on WindowsContinue

  • Blog

    WhatsApp ‘Eternidade’ Trojan Self-Propagates Through Brazil

    The infostealer specifically targets Brazilian Portuguese speakers and combines malware designed to phish banking credentials and steal data, a worm, and some uniquely Brazilian quirks.

    Read More WhatsApp ‘Eternidade’ Trojan Self-Propagates Through BrazilContinue

  • Blog

    ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

    This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we’ve seen arrests, spies at work, and big power moves online. Hackers are getting caught. Spies are getting better at their jobs. Even simple things like browser add-ons and smart home gadgets are being used…

    Read More ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware WavesContinue

  • Blog

    CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

    CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication portals and impersonation pages. The campaign, internally dubbed HackOnChat, abuses WhatsApp’s familiar web interface, using social engineering tactics to trick users into compromising their accounts. Investigators identified thousands of malicious URLs

    Read More CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChatContinue

  • Blog

    New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

    Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device takeover to conduct financial fraud. “A key differentiator is its ability to bypass encrypted messaging,” ThreatFabric said in a report shared with The Hacker News. “By capturing content directly from the device screen after decryption,…

    Read More New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks DevicesContinue

  • Blog

    Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

    Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting. The development is a sign that the lines between state-sponsored cyber attacks and kinetic warfare are increasingly blurring, necessitating the need for a new category…

    Read More Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike AttemptContinue

  • Blog

    TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

    Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef. The end goal of the attacks is to establish persistence and deliver JavaScript malware that facilitates remote access and control, per a new report from Acronis Threat Research Unit (TRU)….

    Read More TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global CampaignContinue

Page navigation

Previous PagePrevious 1 … 6 7 8 9 10 … 322 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us