Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities are listed below – CVE-2024-1708 (CVSS score: 8.4) – A path traversal vulnerability inĀ  ConnectWise ScreenConnect

    Read More CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEVContinue

  • Blog

    LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

    In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI’s LiteLLM Python package has come under active exploitation in the wild within 36 hours of the bug becoming public knowledge. The vulnerability, tracked as CVE-2026-42208 (CVSS score: 9.3), is an SQL injection that could…

    Read More LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of DisclosureContinue

  • Blog

    BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures

    The North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives.

    Read More BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack LuresContinue

  • Blog

    NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later

    Chris Inglis was the head civilian in charge at the NSA when the Snowden leak exploded. He gets candid about mistakes the organization made, and what CISOs need to know about spotting potential threats, media disclosures, and “enculturation.”

    Read More NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years LaterContinue

  • Blog

    Feuding Ransomware Groups Leak Each Other’s Data

    When 0APT and KryBit attacked each other, they exposed infrastructure and operational data, giving defenders rare insight into ransomware operations.

    Read More Feuding Ransomware Groups Leak Each Other’s DataContinue

  • Blog

    Vidar Rises to Top of Chaotic Infostealer Market

    The malware has filled the gap created by last year’s law enforcement takedowns of Lumma and Rhadamanthys.

    Read More Vidar Rises to Top of Chaotic Infostealer MarketContinue

  • Blog

    Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

    Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single “git push” command. The flaw, tracked as CVE-2026-3854 (CVSS score: 8.7), is a case of command injection that could allow an attacker with push access…

    Read More Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git PushContinue

  • Blog

    Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

    A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players with a new stealer called LofyStealer (aka GrabBot). “The malware disguises itself as a Minecraft hack called ‘Slinky,’” Brazil-based cybersecurity company ZenoX said in a technical report. “It uses the official game icon to…

    Read More Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer CampaignContinue

  • Blog

    Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain

    Attackers continue to scale a campaign to seed Open VSX with seemingly benign VS Code extensions that spread self-propagating malware.

    Read More Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply ChainContinue

  • Blog

    VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

    Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, and ESXi variants that renders recovery impossible even for the threat actors. The fact that VECT’s locker permanently destroys large files rather than…

    Read More VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXiContinue

Page navigation

1 2 3 … 451 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us