Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

    Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim’s OpenClaw (formerly Clawdbot and Moltbot) configuration environment. “This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the ‘souls’ and identities of personal AI [

    Read More Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway TokensContinue

  • Blog

    Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers

    A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. “The attacks range in severity from integrity violations to the complete compromise of all vaults in an organization,” researchers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, and Kenneth G. Paterson said.

    Read More Study Uncovers 25 Password Recovery Attacks in Major Cloud Password ManagersContinue

  • Blog

    260K+ Chrome Users Duped by Fake AI Browser Extensions

    30 copycat apps tricked users, and Google itself, into thinking they’re legitimate AI tools.

    Read More 260K+ Chrome Users Duped by Fake AI Browser ExtensionsContinue

  • Blog

    Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware

    This week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons, cloud setups, or workflows that people already trust and rarely question. Another signal: attackers are mixing old and new methods. Legacy botnet tactics, modern cloud abuse, AI assistance, and supply-chain exposure are being…

    Read More Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI MalwareContinue

  • Blog

    Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud

    Presentation of the KTU Consortium Mission ‘A Safe and Inclusive Digital Society’ at the Innovation Agency event ‘Innovation Breakfast: How Mission-Oriented Science and Innovation Programmes Will Address Societal Challenges’. Technologies are evolving fast, reshaping economies, governance, and daily life. Yet, as innovation accelerates, so do digital risks. Technological change is no longer

    Read More Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber FraudContinue

  • Blog

    New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft

    Cybersecurity researchers have disclosed details of a new mobile spyware platform dubbed ZeroDayRAT that’s being advertised on Telegram as a way to grab sensitive data and facilitate real-time surveillance on Android and iOS devices. “The developer runs dedicated channels for sales, customer support, and regular updates, giving buyers a single point of access to a…

    Read More New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data TheftContinue

  • Blog

    New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released

    Google on Friday released security updates for its Chrome browser to address a security flaw that it said has been exploited in the wild. The high-severity vulnerability, tracked as CVE-2026-2441 (CVSS score: 8.8), has been described as a use-after-free bug in CSS. Security researcher Shaheen Fazim has been credited with discovering and reporting the shortcoming…

    Read More New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch ReleasedContinue

  • Blog

    Operation DoppelBrand: Weaponizing Fortune 500 Brands

    The GS7 cyberthreat group targets US financial institutions with near-perfect imitations of corporate portals to steal credentials and gain remote access.

    Read More Operation DoppelBrand: Weaponizing Fortune 500 BrandsContinue

  • Blog

    Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging

    Microsoft has disclosed details of a new version of the ClickFix social engineering tactic in which the attackers trick unsuspecting users into running commands that carry out a Domain Name System (DNS) lookup to retrieve the next-stage payload. Specifically, the attack relies on using the “nslookup” (short for nameserver lookup) command to execute a custom…

    Read More Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware StagingContinue

  • Blog

    Zscaler-SquareX Deal Boosts Zero Trust, Secure Browsing Capabilities

    Zscaler’s acquisition of SquareX comes as competitors like CrowdStrike and Palo Alto Networks are also investing in secure browser technologies.

    Read More Zscaler-SquareX Deal Boosts Zero Trust, Secure Browsing CapabilitiesContinue

Page navigation

1 2 3 … 386 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us