Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Police Disrupt ‘Cryptomixer,’ Seize Millions in Crypto

    Multiple European law enforcement agencies recently disrupted Cryptomixer, a service allegedly used by cybercriminals to launder ill-gotten gains from ransomware and other cyber activities.

    Read More Police Disrupt ‘Cryptomixer,’ Seize Millions in CryptoContinue

  • Blog

    India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud

    India’s telecommunications ministry has reportedly asked major mobile device manufacturers to preload a government-backed cybersecurity app named Sanchar Saathi on all new phones within 90 days. According to a report from Reuters, the app cannot be deleted or disabled from users’ devices. Sanchar Saathi, available on the web and via mobile apps for Android and…

    Read More India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom FraudContinue

  • Blog

    ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware

    A threat actor known as ShadyPanda has been linked to a seven-year-long browser extension campaign that has amassed over 4.3 million installations over time. Five of these extensions started off as legitimate programs before malicious changes were introduced in mid-2024, according to a report from Koi Security, attracting 300,000 installs. These extensions have since been…

    Read More ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into SpywareContinue

  • Blog

    ⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More

    Hackers aren’t kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email, chat, phones, and “trusted” partners — and turn them against us. One bad download can leak your keys. One weak vendor can expose many customers at once. One guest invite, one link…

    Read More ⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & MoreContinue

  • Blog

    Webinar: The “Agentic” Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams

    The AI browser wars are coming to a desktop near you, and you need to start worrying about their security challenges. For the last two decades, whether you used Chrome, Edge, or Firefox, the fundamental paradigm remained the same: a passive window through which a human user viewed and interacted with the internet. That era…

    Read More Webinar: The “Agentic” Trojan Horse: Why the New AI Browsers War is a Nightmare for Security TeamsContinue

  • Blog

    Shai-hulud 2.0 Variant Threatens Cloud Ecosystem

    The latest attack from the self-replicating, npm-package poisoning worm can also steal credentials and secrets from AWS, Google Cloud Platform, and Azure.

    Read More Shai-hulud 2.0 Variant Threatens Cloud EcosystemContinue

  • Blog

    New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control

    A new Android malware named Albiriox has been advertised under a malware-as-a-service (MaaS) model to offer a “full spectrum” of features to facilitate on-device fraud (ODF), screen manipulation, and real-time interaction with infected devices. The malware embeds a hard-coded list comprising over 400 applications spanning banking, financial technology, payment processors, cryptocurrency

    Read More New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen ControlContinue

  • Blog

    Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets

    The threat actor known as Tomiris has been attributed to attacks targeting foreign ministries, intergovernmental organizations, and government entities in Russia with an aim to establish remote access and deploy additional tools. “These attacks highlight a notable shift in Tomiris’s tactics, namely the increased use of implants that leverage public services (e.g., Telegram and Discord)…

    Read More Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government TargetsContinue

  • Blog

    CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include a security flaw impacting OpenPLC ScadaBR, citing evidence of active exploitation. The vulnerability in question is CVE-2021-26829 (CVSS score: 5.4), a cross-site scripting (XSS) flaw that affects Windows and Linux versions of the software via

    Read More CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEVContinue

  • Blog

    Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages

    Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain compromise on the Python Package Index (PyPI) via a domain takeover attack. Software supply chain security company ReversingLabs said it found the “vulnerability” in bootstrap files provided by a build and deployment automation tool named…

    Read More Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI PackagesContinue

Page navigation

Previous PagePrevious 1 … 93 94 95 96 97 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us