Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

    An ongoing phishing campaign is targeting French-speaking corporate environments with fake resumes that lead to the deployment of cryptocurrency miners and information stealers. “The campaign uses highly obfuscated VBScript files disguised as resume/CV documents, delivered through phishing emails,” Securonix researchers Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee said in a report shared

    Read More Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto MinerContinue

  • Blog

    GitHub ‘OpenClaw Deployer’ Repo Delivers Trojan Instead

    An AI-assisted campaign is spreading more than 300 poisoned packages for diverse assets ranging from developer tools to game cheats.

    Read More GitHub ‘OpenClaw Deployer’ Repo Delivers Trojan InsteadContinue

  • Blog

    How a Large Bank Uses AI Digital Twins for Threat Hunting

    JPMorgan Chase uses digital fingerprints and digital twins to spot online attackers and malicious behaviors while also reducing pesky false alerts.

    Read More How a Large Bank Uses AI Digital Twins for Threat HuntingContinue

  • Blog

    Microsoft Proposes Better Identity, Guardrails for AI Agents

    Companies need better controls to manage key threats rising from the growth of agentic AI. These new features provide a starting point.

    Read More Microsoft Proposes Better Identity, Guardrails for AI AgentsContinue

  • Blog

    Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

    Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The activity is being tracked by ReversingLabs as the Ghost campaign. The list of identified packages, all published by a user named mikilanjillo, is below – react-performance-suite react-state-optimizer-core react-fast-utilsa ai-fast-auto-trader

    Read More Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and CredentialsContinue

  • Blog

    5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

    On February 25, 2026, Gartner published its inaugural Market Guide for Guardian Agents, marking an important milestone for this emerging category. For those unfamiliar with the various Gartner report types, “a Market Guide defines a market and explains what clients can expect it to do in the short term. With the focus on early, more…

    Read More 5 Learnings from the First-Ever Gartner Market Guide for Guardian AgentsContinue

  • Blog

    The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills

    Cybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On paper, this should make organizations more secure. But in practice, many teams struggle with the same basic problems they faced years ago: unclear risk priorities, misaligned tooling decisions, and difficulty explaining security issues in terms the business understands. These challenges do not

    Read More The Hidden Cost of Cybersecurity Specialization: Losing Foundational SkillsContinue

  • Blog

    TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

    Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack. The workflows, both maintained by the supply chain security company Checkmarx, are listed below – checkmarx/ast-github-action checkmarx/kics-github-action Cloud security

    Read More TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI CredentialsContinue

  • Blog

    U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage

    A 26-year-old Russian citizen has been sentenced in the U.S. to 6.75 years (81 months) in prison for his role in assisting major cybercrime groups, including the Yanluowang ransomware crew, in conducting numerous attacks against U.S. companies and other organizations. According to the U.S. Department of Justice (DoJ), Aleksei Olegovich Volkov facilitated dozens of ransomware…

    Read More U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware DamageContinue

  • Blog

    Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

    Citrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw that could be exploited to leak sensitive data from the application. The vulnerabilities are listed below – CVE-2026-3055 (CVSS score: 9.3) – Insufficient input validation leading to memory overread CVE-2026-4368 (CVSS score: 7.7) – Race condition…

    Read More Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data LeaksContinue

Page navigation

1 2 3 … 419 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us