Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access

    The Russian state-sponsored hacking group known as Turla has transformed its custom backdoor Kazuar into a modular peer-to-peer (P2P) botnet that’s engineered for stealth and persistent access to compromised hosts. Turla, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA), is assessed to be affiliated with Center 16 of Russia’s Federal Security Service (FSB)

    Read More Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent AccessContinue

  • Blog

    Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

    Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could be chained to achieve data theft, privilege escalation, and persistence. The vulnerabilities, collectively dubbed Claw Chain by Cyera, can permit an attacker to establish a foothold, expose sensitive data, and plant backdoors. A brief description of the flaws is below –

    Read More Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and PersistenceContinue

  • Blog

    Cyber Pioneers Ponder Past as Prologue

    Robert “RSnake” Hansen, Katie Moussouris, Rich Mogull, Richard Stiennon, and Bruce Schneier reflect on how their favorite columns penned for Dark Reading over the past 20 years have stood the test of time.

    Read More Cyber Pioneers Ponder Past as PrologueContinue

  • Blog

    What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface

    In Your Biggest Security Risk Isn’t Malware — It’s What You Already Trust, we made a simple argument: the most dangerous activity inside most organizations no longer looks like an attack. It looks like administration. PowerShell, WMIC, netsh, Certutil, MSBuild — the same trusted utilities your IT team uses every day are also the preferred…

    Read More What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack SurfaceContinue

  • Blog

    TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates

    OpenAI has disclosed that two of its employee devices in its corporate environment were impacted via the Mini Shai-Hulud supply chain attack on TanStack, but noted that no user data, production systems, or intellectual property were compromised or modified in an unauthorized manner. “Upon identification of the malicious activity, we worked quickly to investigate, contain,…

    Read More TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS UpdatesContinue

  • Blog

    On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

    Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. The vulnerability, tracked as CVE-2026-42897 (CVSS score: 8.1), has been described as a spoofing bug stemming from a cross-site scripting flaw. An anonymous researcher has been credited with discovering and reporting…

    Read More On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted EmailContinue

  • Blog

    CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

    The U.S.Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a newly disclosed vulnerability impacting Cisco Catalyst SD-WAN Controller to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to remediate the issue by May 17, 2026. The vulnerability is a critical authentication bypass tracked as CVE-2026-20182. It’s

    Read More CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access ExploitsContinue

  • Blog

    Taiwan Incident Highlights Cybersecurity Gaps in Rail Systems

    A Taiwanese student experimenting with software-defined radio technology shut down three bullet trains for nearly an hour, leading to an anti-terrorism response.

    Read More Taiwan Incident Highlights Cybersecurity Gaps in Rail SystemsContinue

  • Blog

    SecurityScorecard Snags Driftnet to Level Up Threat Intelligence

    The new acquisition looks to boost visibility into third-party ecosystems that are becoming a bigger concern as vectors for supply-chain attacks.

    Read More SecurityScorecard Snags Driftnet to Level Up Threat IntelligenceContinue

  • Blog

    Maximum Severity Cisco SD-WAN Bug Exploited in the Wild

    This is the second time this year a threat actor has leveraged a CVSS 10.0 vulnerability in Cisco’s network control system.

    Read More Maximum Severity Cisco SD-WAN Bug Exploited in the WildContinue

Page navigation

1 2 3 … 466 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us