Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Wargame Exercise Demonstrates How Social Media Manipulation Works

    In an educational game called “Capture the Narrative,” students created bots to sway a fictional election, simulating influence in real-world political scenarios.

    Read More Wargame Exercise Demonstrates How Social Media Manipulation WorksContinue

  • Blog

    New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released

    Two high-severity security vulnerabilities have been disclosed in Composer, a package manager for PHP, that, if successfully exploited, could result in arbitrary command execution. The vulnerabilities have been described as command injection flaws affecting the Perforce VCS (version control software) driver. Details of the two flaws are below – CVE-2026-40176 (CVSS

    Read More New PHP Composer Flaws Enable Arbitrary Command Execution — Patches ReleasedContinue

  • Blog

    AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud

    Cybersecurity researchers have unmasked a novel ad fraud scheme that has been found to leverage search engine poisoning (SEO) techniques and artificial intelligence (AI)-generated content to push deceptive news stories into Google’s Discover feed and trick users into enabling persistent browser notifications that lead to scareware and financial scams. The campaign, which has been

    Read More AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad FraudContinue

  • Blog

    Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security

    Google has announced the integration of a Rust-based Domain Name System (DNS) parser into the modem firmware as part of its ongoing efforts to beef up the security of Pixel devices and push memory-safe code at a more foundational level. “The new Rust-based DNS parser significantly reduces our security risk by mitigating an entire class of…

    Read More Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance SecurityContinue

  • Blog

    Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads

    A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on Meta. “Mirax integrates advanced Remote Access Trojan (RAT) capabilities, allowing threat actors to fully interact with compromised devices in real

    Read More Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta AdsContinue

  • Blog

    Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

    OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while raw alert volume grew by 52% year-over-year, prioritized critical risk grew by nearly 400%. The surge in AI-assisted development is creating a “velocity gap” where the density of high-impact vulnerabilities is scaling faster than

    Read More Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)Continue

  • Blog

    108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

    Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page visited. According to Socket, the extensions are…

    Read More 108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 UsersContinue

  • Blog

    ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

    A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0520 (aka CNVD-2020-26585), which carries a CVSS score of 9.4 out of 10.0. It relates to a case of unrestricted file upload that stems from improper validation of

    Read More ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched ServersContinue

  • Blog

    CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2026-21643 (CVSS score: 9.1) –  An SQL injection vulnerability in  Fortinet FortiClient EMS that could allow an unauthenticated attacker to

    Read More CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe SoftwareContinue

  • Blog

    CSA: CISOs Should Prepare for Post-Mythos Exploit Storm

    Security experts warn of an “AI vulnerability storm” triggered by the introduction of Anthropic’s Claude Mythos in a new paper from the Cloud Security Alliance (CSA).

    Read More CSA: CISOs Should Prepare for Post-Mythos Exploit StormContinue

Page navigation

1 2 3 … 439 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us