Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

    Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild. The vulnerability, tracked as CVE-2026-0300, has been described as a case of unauthenticated remote code execution. It carries a CVSS score of 9.3 if the User-ID Authentication Portal is configured to…

    Read More Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code ExecutionContinue

  • Blog

    Middle East Cyber Battle Field Broadens — Especially in UAE

    As the war with Iran continues, breach attempts targeting the United Arab Emirates tripled in a few weeks — many targeting critical infrastructure.

    Read More Middle East Cyber Battle Field Broadens — Especially in UAEContinue

  • Blog

    Trellix Source Code Breach Highlights Growing Supply Chain Threats

    Info is scant, but such breaches can reveal where a security product’s controls are located and how detections are designed, giving attackers a leg up.

    Read More Trellix Source Code Breach Highlights Growing Supply Chain ThreatsContinue

  • Blog

    Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE

    The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to remote code execution (RCE). The vulnerability, tracked as CVE-2026-23918 (CVSS score: 8.8), has been described as a case of “double free and possible RCE” in the HTTP/2 protocol…

    Read More Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCEContinue

  • Blog

    DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

    A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. “These installers are distributed from the legitimate website of DAEMON Tools and are signed with digital certificates belonging to DAEMON Tools developers,” Kaspersky researchers  Igor Kuznetsov, Georgy Kucherin, Leonid

    Read More DAEMON Tools Supply Chain Attack Compromises Official Installers with MalwareContinue

  • Blog

    Microsoft Edge Stores Passwords in Process Memory, Posing Enterprise Risk

    A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and thus use them to engage in further malicious activity.

    Read More Microsoft Edge Stores Passwords in Process Memory, Posing Enterprise RiskContinue

  • Blog

    China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions

    A sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025. The activity is being tracked by Cisco Talos under the moniker UAT-8302, with post-exploitation involving the deployment of custom-made malware families that have…

    Read More China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across RegionsContinue

  • Blog

    The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed

    Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic cleanup, and in most organizations, no one watching it. Your perimeter controls don’t see it. Your MFA doesn’t stop it. And when an attacker gets…

    Read More The Back Door Attackers Know About — and Most Security Teams Still Haven’t ClosedContinue

  • Blog

    How the Story of a USB Penetration Test Went Viral

    Two decades ago Dark Reading posted its first blockbuster — a column by a pen tester who sprinkled rigged thumb drives around a credit union parking lot and let curious employees do the rest. This episode looks back at the history-making piece with its author Steve Stasiukonis, Dark Reading senior editor Becky Bracken, and Dark…

    Read More How the Story of a USB Penetration Test Went ViralContinue

  • Blog

    MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks

    Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck. The vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), a code injection flaw that could result in arbitrary code execution. “MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated…

    Read More MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution AttacksContinue

Page navigation

1 2 3 … 457 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us