Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

    Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran’s nuclear program by destroying uranium enrichment centrifuges. According to a new report published by SentinelOne, the previously undocumented cyber sabotage framework dates back to 2005, primarily targeting high-precision calculation software to tamper

    Read More Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering SoftwareContinue

  • Blog

    CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is below – CVE-2024-57726 (CVSS score: 9.9) – A missing authorization vulnerability in

    Read More CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal DeadlineContinue

  • Blog

    FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency’s Cisco Firepower device running Adaptive Security Appliance (ASA) software was compromised in September 2025 with malware called FIRESTARTER. FIRESTARTER, per CISA and the U.K.’s National Cyber Security Centre (NCSC), is assessed to be a backdoor designed for remote access…

    Read More FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security PatchesContinue

  • Blog

    US Busts Myanmar Ring Targeting US Citizens in Financial Fraud

    Some 29 people were charged, including a Cambodian senator, and authorities seized more than 500 Web domains tied to fake investment sites.

    Read More US Busts Myanmar Ring Targeting US Citizens in Financial FraudContinue

  • Blog

    Glasswing Secured the Code. The Rest of Your Stack Is Still on You

    Forgotten integrations, shadow IT, SaaS, and now shadow AI and agents are everywhere, and attackers don’t need sophisticated AI models to take advantage.

    Read More Glasswing Secured the Code. The Rest of Your Stack Is Still on YouContinue

  • Blog

    NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

    The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national posed as a U.S. researcher as part of a spear-phishing campaign to obtain sensitive information from the space agency, as well as from government entities, universities, and private companies, in violation of export control…

    Read More NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense SoftwareContinue

  • Blog

    AI Phishing Is No. 1 With a Bullet for Cyberattackers

    In the last six months, companies have seen a significant influx of AI-powered phishing, as cyberattackers progress from small campaigns to 1-to-1 personalized attacks.

    Read More AI Phishing Is No. 1 With a Bullet for CyberattackersContinue

  • Blog

    North Korea’s Lazarus Targets macOS Users via ClickFix

    Lazarus continues leveraging ClickFix for initial access and data theft, in this case, against Mac-centric organizations and their high-value leaders.

    Read More North Korea’s Lazarus Targets macOS Users via ClickFixContinue

  • Blog

    Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine

    The AI Agent Authority Gap – From Ungoverned to Delegation As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is often framed too narrowly. The issue is not simply that agents are new actors. It is that agents are delegated actors. They do not emerge…

    Read More Bridging the AI Agent Authority Gap: Continuous Observability as the Decision EngineContinue

  • Blog

    26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases

    Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an attempt to steal recovery phrases and private keys since at least fall 2025. “Once launched, these apps redirect users to browser pages designed to look similar to the App Store and distribute trojanized versions…

    Read More 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed PhrasesContinue

Page navigation

1 2 3 … 449 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us