Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks

    GitHub has rolled out new controls for npm to improve the security of the software supply chain, giving maintainers the ability to explicitly approve a release prior to the packages becoming publicly available for installation. Called staged publishing, the feature is now generally available on npm. It mandates that a human maintainer pass a two-factor…

    Read More npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain AttacksContinue

  • Blog

    Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware

    A new “coordinated” supply chain attack campaign has impacted eight packages on Packagist including malicious code designed to run a Linux binary retrieved from a GitHub Releases URL. “Although the affected packages were all Composer packages, the malicious code was not added to composer.json,” Socket said. “Instead, it was inserted into package.json, targeting projects that…

    Read More Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux MalwareContinue

  • Blog

    Claude Mythos AI Finds 10,000 High-Severity Flaws in Widely Used Software

    Anthropic on Friday disclosed that Project Glasswing has helped uncover more than 10,000 high- or critical-severity vulnerabilities across some of the most “systemically” important software across the world since the cybersecurity initiative went live last month. Project Glasswing is an effort led by the artificial intelligence (AI) company, as part of which a small set…

    Read More Claude Mythos AI Finds 10,000 High-Severity Flaws in Widely Used SoftwareContinue

  • Blog

    Laravel-Lang PHP Packages Compromised to Deliver Cross-Platform Credential Stealer

    Cybersecurity researchers have flagged a fresh software supply chain attack campaign that has targeted multiple PHP packages belonging to Laravel-Lang to deliver a comprehensive credential-stealing framework. The affected packages include – laravel-lang/lang laravel-lang/http-statuses laravel-lang/attributes laravel-lang/actions “The timing and pattern of the newly published tags

    Read More Laravel-Lang PHP Packages Compromised to Deliver Cross-Platform Credential StealerContinue

  • Blog

    LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root

    A maximum-severity security vulnerability impacting LiteSpeed User-End cPanel Plugin has come under active exploitation in the wild. The flaw, tracked as CVE-2026-48172 (CVSS score: 10.0), relates to an instance of incorrect privilege assignment that an attacker could abuse to run arbitrary scripts with elevated permissions. “Any cPanel user (including an attacker or a compromised account)…

    Read More LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as RootContinue

  • Blog

    Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEV

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched critical security flaw impacting Drupal Core to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2026-9082 (CVSS score: 6.5), an SQL injection vulnerability affecting all supported versions of Drupal Core. “Drupal Core

    Read More Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEVContinue

  • Blog

    First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups

    Authorities in Europe and North America have announced the dismantling of a criminal virtual private network (VPN) service used by criminal actors to obscure the origins of ransomware attacks, data theft, scanning, and denial-of-service attacks. The disruption of First VPN Service was led by France and the Netherlands, with several other nations supporting the investigation…

    Read More First VPN Dismantled in Global Takedown Over Use by 25 Ransomware GroupsContinue

  • Blog

    Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware

    The Belarus-aligned threat actor known as Ghostwriter (aka UAC-0057 and UNC1151Ukraine’s National Security and Defense Council) has been observed using lures related to Prometheus, a Ukrainian online learning platform, to target government organizations in the country. The activity, per the Computer Emergency Response Team of Ukraine (CERT-UA), involves sending phishing emails to government

    Read More Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing MalwareContinue

  • Blog

    Akamai Joins Growing Chorus of Vendors Betting Big on Secure Enterprise Browsers

    When Akamai announced its LayerX acquisition, the company joined a growing list of vendors adding secure enterprise browsers to their product portfolios.

    Read More Akamai Joins Growing Chorus of Vendors Betting Big on Secure Enterprise BrowsersContinue

  • Blog

    Verizon DBIR: Healthcare Fends Off Increased Social Engineering Attacks

    Ransomware and vendor breaches persist, but the 2026 Data Breach Investigations Report (DBIR) highlights how evolving social engineering tactics make the sector more vulnerable.

    Read More Verizon DBIR: Healthcare Fends Off Increased Social Engineering AttacksContinue

Page navigation

1 2 3 … 474 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us