Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    APT41 Delivers ‘Zero-Detection’ Backdoor to Harvest Cloud Credentials

    The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.

    Read More APT41 Delivers ‘Zero-Detection’ Backdoor to Harvest Cloud CredentialsContinue

  • Blog

    FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

    The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims’ account credentials and attempt more than $20 million in fraud. In tandem, authorities detained the alleged developer, who has&

    Read More FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud AttemptsContinue

  • Blog

    ⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

    Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling in infrastructure that is finally coming to light. It is one of those mornings where the gap between a quiet shift and a…

    Read More ⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and MoreContinue

  • Blog

    Your MTTD Looks Great. Your Post-Alert Gap Doesn’t

    Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and browser. Palo Alto Networks’ Wendi Whitmorewarned that similar capabilities are weeks or months from proliferation. CrowdStrike’s 2026 Global Threat Report puts average eCrime breakout time at 29 minutes. Mandiant’s M-Trends 2026

    Read More Your MTTD Looks Great. Your Post-Alert Gap Doesn’tContinue

  • Blog

    North Korea’s APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware

    The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning the trust-building exercise into a delivery channel for a remote access trojan called RokRAT. “The threat actor used…

    Read More North Korea’s APT37 Uses Facebook Social Engineering to Deliver RokRAT MalwareContinue

  • Blog

    OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident

    OpenAI revealed a GitHub Actions workflow used to sign its macOS apps, which downloaded the malicious Axios library on March 31, but noted that no user data or internal system was compromised. “Out of an abundance of caution, we are taking steps to protect the process that certifies our macOS applications are legitimate OpenAI apps,” OpenAI said in a…

    Read More OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain IncidentContinue

  • Blog

    CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

    Unknown threat actors compromised CPUID (“cpuid[.]com”), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a remote access trojan called STX RAT. The incident lasted from approximately April 9, 15:00 UTC, to about April 10, 10:00 UTC, with

    Read More CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor DownloadsContinue

  • Blog

    Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

    Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful exploitation of the flaw could allow an attacker to run malicious code on affected installations. It has been described…

    Read More Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621Continue

  • Blog

    Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

    Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc. The tool was developed by Israeli company Cobwebs Technologies and is now sold by its successor Penlink after the two firms merged in July 2023

    Read More Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad DataContinue

  • Blog

    Medusa Ransomware Attack

    What is the Attack? Microsoft Threat Intelligence has identified Storm-1175, a financially motivated threat actor conducting high-tempo ransomware operations leveraging the Medusa ransomware variant. The group specializes in rapidly exploiting vulnerable web-facing systems, often weaponizing newly disclosed vulnerabilities (N-days) and even zero-days before public disclosure. Storm-1175 | Medusa ransomware operations | Microsoft Security Blog A…

    Read More Medusa Ransomware AttackContinue

Page navigation

1 2 3 … 438 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us