Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    US Treasury Tracks $4.5B in Ransom Payments since 2013

    The US Treasury’s Financial Crimes Enforcement Network shared data showing how dramatically ransomware attacks have changed over time.

    Read More US Treasury Tracks $4.5B in Ransom Payments since 2013Continue

  • Blog

    Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT

    Cybersecurity researchers are calling attention to a new campaign dubbed JS#SMUGGLER that has been observed leveraging compromised websites as a distribution vector for a remote access trojan named NetSupport RAT. The attack chain, analyzed by Securonix, involves three main moving parts: An obfuscated JavaScript loader injected into a website, an HTML Application (HTA) that runs…

    Read More Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RATContinue

  • Blog

    ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More

    It’s been a week of chaos in code and calm in headlines. A bug that broke the internet’s favorite framework, hackers chasing AI tools, fake apps stealing cash, and record-breaking cyberattacks — all within days. If you blink, you’ll miss how fast the threat map is changing. New flaws are being found, published, and exploited…

    Read More ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & MoreContinue

  • Blog

    How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?

    The holiday season compresses risk into a short, high-stakes window. Systems run hot, teams run lean, and attackers time automated campaigns to get maximum return. Multiple industry threat reports show that bot-driven fraud, credential stuffing and account takeover attempts intensify around peak shopping events, especially the weeks around Black Friday and Christmas.  Why holiday peaks

    Read More How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?Continue

  • Blog

    ‘Broadside’ Mirai Variant Targets Maritime Logistics Sector

    ‘Broadside’ is targeting a critical flaw in DVR systems to conduct command injection attacks, which can hijack devices to achieve persistence and move laterally.

    Read More ‘Broadside’ Mirai Variant Targets Maritime Logistics SectorContinue

  • Blog

    Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features

    Cybersecurity researchers have disclosed details of two new Android malware families dubbed FvncBot and SeedSnatcher, as another upgraded version of ClayRat has been spotted in the wild. The findings come from Intel 471, CYFIRMA, and Zimperium, respectively. FvncBot, which masquerades as a security app developed by mBank, targets mobile banking users in Poland. What’s notable…

    Read More Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft FeaturesContinue

  • Blog

    Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks

    A critical security flaw in the Sneeit Framework plugin for WordPress is being actively exploited in the wild, per data from Wordfence. The remote code execution vulnerability in question is CVE-2025-6389 (CVSS score: 9.8), which affects all versions of the plugin prior to and including 8.3. It has been patched in version 8.4, released on…

    Read More Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet AttacksContinue

  • Blog

    MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign

    The Iranian hacking group known as MuddyWater has been observed leveraging a new backdoor dubbed UDPGangster that uses the User Datagram Protocol (UDP) for command-and-control (C2) purposes. The cyber espionage activity targeted users in Turkey, Israel, and Azerbaijan, according to a report from Fortinet FortiGuard Labs. “This malware enables remote control of compromised systems by…

    Read More MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan CampaignContinue

  • Blog

    Inside Shanya, a packer-as-a-service fueling modern attacks

    The ransomware scene gains another would-be EDR killer

    Read More Inside Shanya, a packer-as-a-service fueling modern attacksContinue

  • Blog

    Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks

    Over 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments (IDEs) that combine prompt injection primitives with legitimate features to achieve data exfiltration and remote code execution. The security shortcomings have been collectively named IDEsaster by security researcher Ari Marzouk (MaccariTA). They affect popular

    Read More Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE AttacksContinue

Page navigation

Previous PagePrevious 1 … 86 87 88 89 90 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us