Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

    Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender Foundation files to deliver an information stealer known as StealC V2. “This ongoing operation, active for at least six months, involves implanting malicious .blend files on platforms like CGTrader,” Morphisec researcher Shmuel Uzan said in a report shared with The Hacker News….

    Read More Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing MalwareContinue

  • Blog

    CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert warning of bad actors actively leveraging commercial spyware and remote access trojans (RATs) to target users of mobile messaging applications. “These cyber actors use sophisticated targeting and social engineering techniques to deliver spyware and gain unauthorized access to a victim’s messaging app,

    Read More CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp UsersContinue

  • Blog

    ShadowRay 2.0 Turns AI Clusters into Crypto Botnets

    A threat actor is leveraging a flaw in the Ray framework to hijack AI infrastructure worldwide and distribute a self-propagating cryptomining and data theft botnet.

    Read More ShadowRay 2.0 Turns AI Clusters into Crypto BotnetsContinue

  • Blog

    Critical Flaw in Oracle Identity Manager Under Exploitation

    The exploitation of CVE-2025-61757 follows a breach of Oracle Cloud earlier this year as well as a recent extortion campaign targeting Oracle E-Business Suite customers.

    Read More Critical Flaw in Oracle Identity Manager Under ExploitationContinue

  • Blog

    Infamous Shai-hulud Worm Resurfaces From the Depths

    This campaign introduces a new variant that executes malicious code during preinstall, significantly increasing potential exposure in build and runtime environments, researchers said.

    Read More Infamous Shai-hulud Worm Resurfaces From the DepthsContinue

  • Blog

    Vision Language Models Keep an Eye on Physical Security

    Advancements in vision language models expanded models reasoning capabilities to help protect employee safety.

    Read More Vision Language Models Keep an Eye on Physical SecurityContinue

  • Blog

    Introducing Sophos DNS Protection for Endpoints

    Join the early access program for this new product.

    Read More Introducing Sophos DNS Protection for EndpointsContinue

  • Blog

    New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

    Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects “allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags,” Oligo Security said in

    Read More New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure IntrusionsContinue

  • Blog

    Modernizing trust: How UADY transformed campus security with Sophos

    At the Autonomous University of Yucatán (UADY), technology has long been central to supporting academic excellence.  As the university expanded to serve more than 20,000 students across five campuses, its IT team faced increasing pressure on an aging cybersecurity infrastructure. Manual patching, limited firmware support, and rising costs made it harder to defend against evolving…

    Read More Modernizing trust: How UADY transformed campus security with SophosContinue

  • Blog

    The Sophos Central UAE region is now live!

    Expanding customer choice and bringing Sophos Central closer to customers and partners across the Middle East.

    Read More The Sophos Central UAE region is now live!Continue

Page navigation

Previous PagePrevious 1 … 97 98 99 100 101 … 416 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us