Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    North Korean Group Targets South With Military ID Deepfakes

    The North Korea-linked group Kimsuky used ChatGPT to create deepfakes of military ID documents in an attempt to compromise South Korean targets.

    Read More North Korean Group Targets South With Military ID DeepfakesContinue

  • Blog

    Critical Bugs in Chaos Mesh Enable Cluster Takeover

    “Chaotic Deputy” is a set of four vulnerabilities in the chaos engineering platform that many organizations use to test the resilience of their Kubernetes environments.

    Read More Critical Bugs in Chaos Mesh Enable Cluster TakeoverContinue

  • Blog

    Self-Replicating ‘Shai-hulud’ Worm Targets NPM Packages

    The newly emerged worm has spread across hundreds of open source software packages, stealing credentials and infecting other components without much direct attacker input.

    Read More Self-Replicating ‘Shai-hulud’ Worm Targets NPM PackagesContinue

  • Blog

    ‘Vane Viper’ Threat Group Tied to PropellerAds, Commercial Entities

    Researchers say the commercial adtech platform and several other companies form the infrastructure of a massive cybercrime operation.

    Read More ‘Vane Viper’ Threat Group Tied to PropellerAds, Commercial EntitiesContinue

  • Blog

    Sophos supports Objective-See Foundation to advance macOS security and inclusive cybersecurity education

    Dedicated to building a stronger, more inclusive Apple security community through open-source security tools Sophos is proud to be a gold friend of the Objective-See Foundation, supporting its mission to expand access to cybersecurity education and foster innovative community-driven macOS security research. As macOS becomes a bigger target for cybercriminals, organizations like Objective-See are critical…

    Read More Sophos supports Objective-See Foundation to advance macOS security and inclusive cybersecurity educationContinue

  • Blog

    Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover

    Cybersecurity researchers have disclosed multiple critical security vulnerabilities in Chaos Mesh that, if successfully exploited, could lead to cluster takeover in Kubernetes environments. “Attackers need only minimal in-cluster network access to exploit these vulnerabilities, execute the platform’s fault injections (such as shutting down pods or disrupting network communications), and perform

    Read More Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster TakeoverContinue

  • Blog

    Not all Endpoint protection is created equal

    When people ask us, “Aren’t all endpoint solutions the same these days?” — our answer is simple: No. They’re not.

    Read More Not all Endpoint protection is created equalContinue

  • Blog

    SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids

    A massive ad fraud and click fraud operation dubbed SlopAds ran a cluster of 224 apps, collectively attracting 38 million downloads across 228 countries and territories. “These apps deliver their fraud payload using steganography and create hidden WebViews to navigate to threat actor-owned cashout sites, generating fraudulent ad impressions and clicks,” HUMAN’s Satori Threat Intelligence…

    Read More SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad BidsContinue

  • Blog

    New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

    Cybersecurity researchers have warned of a new campaign that’s leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware. “The observed campaign uses a highly convincing, multilingual phishing site (e.g., fake Facebook Security page), with anti-analysis techniques and advanced obfuscation to evade detection,” Acronis security researcher Eliad

    Read More New FileFix Variant Delivers StealC Malware Through Multilingual Phishing SiteContinue

  • Blog

    Innovative FileFix Phishing Attack Proves Plenty Potent

    Highly deceptive FileFix uses code obfuscation and steganography and has been translated into at least 16 languages to power a global campaign.

    Read More Innovative FileFix Phishing Attack Proves Plenty PotentContinue

Page navigation

1 2 3 … 253 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us