Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

    Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data and ensuring continued access to infected machines. The campaigns are characterized by the use of malware families like Geta RAT, Ares RAT, and DeskRAT, which…

    Read More APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian EntitiesContinue

  • Blog

    AI Rising: Do We Know Enough About the Data Populating It?

    Organizations remain reluctant to address the fact that AI can dangerously expose business operations as well as personal data.

    Read More AI Rising: Do We Know Enough About the Data Populating It?Continue

  • Blog

    Top Cyber Industry Defenses Spike CO2 Emissions

    Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks.

    Read More Top Cyber Industry Defenses Spike CO2 EmissionsContinue

  • Blog

    Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

    It’s Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services. Microsoft issued fixes for 59 flaws, including six actively exploited zero-days in various Windows components that could be abused to bypass security features, escalate privileges, and trigger a denial-of-service (DoS) condition. Elsewhere

    Read More Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network PlatformsContinue

  • Blog

    Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

    Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as OWASP Juice Shop, DVWA, Hackazon, and bWAPP are designed to be insecure by default, making them useful for learning how common attack techniques work in controlled environments. The issue is not the applications themselves, but how they…

    Read More Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud EnvironmentsContinue

  • Blog

    Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

    Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said have been exploited in the wild. Of the 59 flaws, five are rated Critical, 52 are rated Important, and two are rated Moderate in severity. Twenty-five of the patched vulnerabilities have been classified…

    Read More Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-DaysContinue

  • Blog

    SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

    Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. “The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of

    Read More SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel ExploitsContinue

  • Blog

    North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

    The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. “The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported…

    Read More North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency OrganizationsContinue

  • Blog

    Asia Fumbles With Throttling Back Telnet Traffic in Region

    Only Taiwan made the top 10 list of governments, effectively blocking the threat-ridden protocol, but overall the region lagged in curbing Telnet traffic.

    Read More Asia Fumbles With Throttling Back Telnet Traffic in RegionContinue

  • Blog

    SolarWinds WHD Attacks Highlight Risks of Exposed Apps

    Organizations that have exposed their instances of Web Help Desk to the public Internet have inadvertently made them prime targets for attackers.

    Read More SolarWinds WHD Attacks Highlight Risks of Exposed AppsContinue

Page navigation

1 2 3 … 383 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us