Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations

    Winter is coming – so it must be time for Sophos X-Ops’ report on this year’s MITRE ATT&CK Enterprise Evaluations

    Read More Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 EvaluationsContinue

  • Blog

    VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

    The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new ransomware-as-a-service (RaaS) offering called VolkLocker that suffers from implementation lapses in test artifacts, allowing users to decrypt files without paying an extortion fee. According to SentinelOne, VolkLocker (aka CyberVolk 2.x) emerged in August 2025 and is capable of targeting both Windows

    Read More VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free DecryptionContinue

  • Blog

    CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild. CVE-2018-4063 (CVSS score: 8.8/9.9) refers to an unrestricted file upload vulnerability that could be exploited to achieve remote code

    Read More CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE AttacksContinue

  • Blog

    Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

    Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security flaws that it said have been exploited in the wild, one of which is the same flaw that was patched by Google in Chrome earlier this week. The vulnerabilities are listed below –…

    Read More Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the WildContinue

  • Blog

    The CISO-COO Partnership: Protecting Operational Excellence

    Digital transformation has made cybersecurity preparation part of operational resilience for most organizations. This calls for a new relationship between CISO and COO.

    Read More The CISO-COO Partnership: Protecting Operational ExcellenceContinue

  • Blog

    React2Shell Exploits Flood the Internet as Attacks Continue

    As exploitation activity against CVE-2025-55182 ramps up, researchers are finding some proof-of-concept exploits contain bypasses for web application firewall (WAF) rules.

    Read More React2Shell Exploits Flood the Internet as Attacks ContinueContinue

  • Blog

    Vibe Coding: Innovation Demands Vigilance

    Unmanaged coding is indeed an alluring idea, but can introduce a host of significant cybersecurity dangers, Constantine warns.

    Read More Vibe Coding: Innovation Demands VigilanceContinue

  • Blog

    Microsoft Will Bundle Security Copilot with M365 Enterprise Licenses

    The move aims to expand the use of Security Copilot and comes with the launch of 12 new agents from Microsoft at the company’s Ignite conference last week.

    Read More Microsoft Will Bundle Security Copilot with M365 Enterprise LicensesContinue

  • Blog

    Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

    Cybersecurity researchers are calling attention to a new campaign that’s leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based Remote Access Trojan (RAT) dubbed PyStoreRAT. “These repositories, often themed as development utilities or OSINT tools, contain only a few lines of code responsible for silently downloading a remote HTA file and executing

    Read More Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware PayloadsContinue

  • Blog

    Supply Chain Attacks Targeting GitHub Actions Increased in 2025

    At this week’s Black Hat Europe conference, two researchers urged developers to adopt a shared responsibility model for open source software and not leave it all up to GitHub to handle.

    Read More Supply Chain Attacks Targeting GitHub Actions Increased in 2025Continue

Page navigation

Previous PagePrevious 1 … 80 81 82 83 84 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us