Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Venezuelan Oil Company Downplays Alleged US Cyberattack

    But media reports described the attack as causing major disruption to PDVSA, the state-owned oil and natural gas company.

    Read More Venezuelan Oil Company Downplays Alleged US CyberattackContinue

  • Blog

    Russia Hits Critical Orgs Via Misconfigured Edge Devices

    Amazon detailed a long-running campaign by Russia against critical infrastructure organizations, particularly in the energy sector.

    Read More Russia Hits Critical Orgs Via Misconfigured Edge DevicesContinue

  • Blog

    Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

    An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency mining. The activity, first detected by Amazon’s GuardDuty managed threat detection service and its automated security monitoring systems on November 2, 2025, employs never-before-seen persistence techniques to hamper

    Read More Compromised IAM Credentials Power a Large AWS Crypto Mining CampaignContinue

  • Blog

    Browser Extension Harvests 8M Users’ AI Chatbot Data

    Urban VPN Proxy, which claims to protect users’ privacy, collects data from conversations with ChatGPT, Claude, Gemini, Copilot and other AI assistants.

    Read More Browser Extension Harvests 8M Users’ AI Chatbot DataContinue

  • Blog

    Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

    Cybersecurity researchers have discovered a new malicious NuGet package that typosquats and impersonates the popular .NET tracing library and its author to sneak in a cryptocurrency wallet stealer. The malicious package, named “Tracer.Fody.NLog,” remained on the repository for nearly six years. It was published by a user named “csnemess” on February 26, 2020. It masquerades…

    Read More Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet DataContinue

  • Blog

    Enterprises Gear Up for 2026’s IT Transformation

    Experts predict big changes are coming for IT infrastructure in 2026 driven by AI adoption, hybrid cloud strategies, and evolving security demands.

    Read More Enterprises Gear Up for 2026’s IT TransformationContinue

  • Blog

    Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

    Amazon’s threat intelligence team has disclosed details of a “years-long” Russian state-sponsored campaign that targeted Western critical infrastructure between 2021 and 2025. Targets of the campaign included energy sector organizations across Western nations, critical infrastructure providers in North America and Europe, and entities with cloud-hosted network infrastructure. The activity has

    Read More Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud InfrastructureContinue

  • Blog

    Why Data Security and Privacy Need to Start in Code

    AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now facing rapid growth in both the number of applications and the pace of change within those applications. Security and privacy teams are under significant pressure as the surface area they must cover is expanding quickly while their…

    Read More Why Data Security and Privacy Need to Start in CodeContinue

  • Blog

    Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass

    Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices, less than a week after public disclosure. Cybersecurity company Arctic Wolf said it observed active intrusions involving malicious single sign-on (SSO) logins on FortiGate appliances on December 12, 2025. The attacks exploit two critical authentication bypasses (CVE-2025-59718 and CVE-2025-59719

    Read More Fortinet FortiGate Under Active Attack Through SAML SSO Authentication BypassContinue

  • Blog

    React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

    The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo Alto Networks Unit 42 and NTT Security. “KSwapDoor is a professionally engineered remote access tool designed with stealth in mind,” Justin Moore, senior manager of threat intel research at Palo…

    Read More React2Shell Vulnerability Actively Exploited to Deploy Linux BackdoorsContinue

Page navigation

Previous PagePrevious 1 … 78 79 80 81 82 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us