Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

    A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, a solution for interactive malware analysis and threat intelligence, has uncovered one of North Korea’s most persistent infiltration schemes: a network of remote IT workers tied to Lazarus Group’s Famous Chollima division. For the first time,…

    Read More Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on CameraContinue

  • Blog

    GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

    The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open VSX with 24 extensions impersonating popular developer tools and frameworks like Flutter, React, Tailwind, Vim, and Vue. GlassWorm was first documented in October 2025, detailing its use of the Solana blockchain for command-and-control (C2)…

    Read More GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer ToolsContinue

  • Blog

    Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

    Cybersecurity researchers have disclosed details of an npm package that attempts to influence artificial intelligence (AI)-driven security scanners. The package in question is eslint-plugin-unicorn-ts-2, which masquerades as a TypeScript extension of the popular ESLint plugin. It was uploaded to the registry by a user named “hamburgerisland” in February 2024. The package has been downloaded

    Read More Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security ToolsContinue

  • Blog

    Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

    Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors have emerged as the target of a new set of attacks undertaken by Iranian nation-state actors that have delivered a previously undocumented backdoor called MuddyViper. The activity has been attributed by ESET to a hacking group known as MuddyWater (aka Mango

    Read More Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted AttacksContinue

  • Blog

    DPRK’s ‘Contagious Interview’ Spawns Malicious Npm Package Factory

    North Korean attackers have delivered more than 197 malicious packages with 31K-plus downloads since Oct. 10, as part of ongoing state-sponsored activity to compromise software developers.

    Read More DPRK’s ‘Contagious Interview’ Spawns Malicious Npm Package FactoryContinue

  • Blog

    SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

    Vulnerability management is a core component of every cybersecurity strategy. However, businesses often use thousands of software without realising it (when was the last time you checked?), and keeping track of all the vulnerability alerts, notifications, and updates can be a burden on resources and often leads to missed vulnerabilities.  Taking into account that nearly…

    Read More SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track VulnerabilitiesContinue

  • Blog

    UNC1549 Critical Infrastructure Espionage Attack

    A suspected Iran-linked espionage group tracked as UNC1549 is actively targeting aerospace, defense, and telecommunications organizations across Europe and other regions. The threat actor employs a combination of highly tailored spear-phishing, credential theft from third-party services, and the abuse of virtual desktop infrastructure such as Citrix, VMware, and Azure VDI to gain initial access and…

    Read More UNC1549 Critical Infrastructure Espionage AttackContinue

  • Blog

    Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild

    Google on Monday released monthly security updates for the Android operating system, including two vulnerabilities that it said have been exploited in the wild. The patch addresses a total of 107 security flaws spanning different components, including Framework, System, Kernel, as well as those from Arm, Imagination Technologies, MediaTek, Qualcomm, and Unison. The two high-severity…

    Read More Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the WildContinue

  • Blog

    Tomiris Unleashes ‘Havoc’ With New Tools, Tactics

    The Russian-speaking group is targeting government and diplomatic entities in CIS member states and Central Asia in its latest cyber-espionage campaign.

    Read More Tomiris Unleashes ‘Havoc’ With New Tools, TacticsContinue

  • Blog

    CodeRED Emergency Alert Platform Shut Down Following Cyberattack

    The Inc ransomware gang took responsibility for the attack earlier this month and claimed it stole sensitive subscriber data.

    Read More CodeRED Emergency Alert Platform Shut Down Following CyberattackContinue

Page navigation

Previous PagePrevious 1 … 92 93 94 95 96 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us