Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

    Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution. Exim is an open-source Mail Transfer Agent (MTA) designed for Unix-like systems to receive, route, and deliver email. The vulnerability, tracked as CVE-2026-45185, aka Dead.Letter, has been described as a use-after-free

    Read More New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code ExecutionContinue

  • Blog

    RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded

    RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been described as a “major malicious attack.” “We’re dealing with a major malicious attack on Ruby Gems right now,” Maciej Mensfeld, senior product manager for software supply chain security at Mend.io, said in a post on…

    Read More RubyGems Suspends New Signups After Hundreds of Malicious Packages Are UploadedContinue

  • Blog

    Hugging Face Packages Weaponized With a Single File Tweak

    A tokenizer library file present in Hugging Face AI models can be manipulated to hijack the model’s outputs and exfiltrate data.

    Read More Hugging Face Packages Weaponized With a Single File TweakContinue

  • Blog

    New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

    Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for command-and-control (C2). The new variant, observed by ThreatFabric between January and February 2026, has been observed actively targeting banking and cryptocurrency wallet users in France, Italy, and Austria. “TrickMo relies on a runtime-loaded APK  (dex.module),

    Read More New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network PivotsContinue

  • Blog

    20 Leaders Who Built the CISO Era: 2 Decades of Change

    As part of Dark Reading’s 20th anniversary special coverage, we profile the CISOs, founders, researchers, criminals, and policymakers who rewrote the enterprise risk playbook.

    Read More 20 Leaders Who Built the CISO Era: 2 Decades of ChangeContinue

  • Blog

    Webinar: What the Riskiest SOC Alerts Go Unanswered – and How Radiant Security Can Help

    Why do the Riskiest SOC Alerts Go Unanswered? Security operations teams are drowning in alerts. But the real problem isn’t always alert volume; it’s the blind spots. The most dangerous alerts are the ones no one is investigating. A recent report from The Hacker News examined why certain high-risk alert categories – WAF, DLP, OT/IoT,…

    Read More Webinar: What the Riskiest SOC Alerts Go Unanswered – and How Radiant Security Can HelpContinue

  • Blog

    Why Agentic AI Is Security’s Next Blind Spot

    Agentic AI is already running in production environments across many organizations today. It is executing tasks, consuming data, and taking actions — most likely without meaningful involvement from the security team. The industry conversation has largely framed this as a question of policy: allow it, restrict it, or monitor it? However, that framing misses the…

    Read More Why Agentic AI Is Security’s Next Blind SpotContinue

  • Blog

    Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

    TeamPCP, the threat actor behind the recent supply chain attack spree, has been linked to the compromise of the npm and PyPI packages from TanStack, UiPath, Mistral AI, OpenSearch, and Guardrails AI as part of a fresh Mini Shai-Hulud campaign. The affected npm packages have been modified to include an obfuscated JavaScript file (“router_init.js”) that’s designed…

    Read More Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More PackagesContinue

  • Blog

    Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak

    American educational technology company Instructure, the parent company of Canvas, said it reached an “agreement” with a decentralized cybercrime extortion group after it breached its network and threatened to leak stolen information from thousands of schools and universities. In an update shared on Monday, the Utah-based firm said it “reached an agreement with the unauthorized…

    Read More Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas LeakContinue

  • Blog

    OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation

    OpenAI has launched Daybreak, a new cybersecurity initiative that brings together frontier artificial intelligence (AI) model capabilities and Codex Security to help organizations identify and patch vulnerabilities before attackers find a way in using the same issues. “Daybreak combines the intelligence of OpenAI models, the extensibility of Codex as an agentic harness, and our partners…

    Read More OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch ValidationContinue

Page navigation

1 2 3 … 463 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us