Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

    A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence (AI)-driven vulnerability has been codenamed RoguePilot by Orca Security. It has since been patched by Microsoft following responsible disclosure. “Attackers can craft hidden instructions inside a

    Read More RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKENContinue

  • Blog

    UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

    A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor’s targeting beyond Ukraine and into entities supporting the war-torn nation. The activity, which targeted an unnamed entity involved in regional

    Read More UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS MalwareContinue

  • Blog

    As Cybersecurity Firms Chase AI, VC Market Skyrockets

    Investments in cybersecurity startups took off in 2025, as venture capital firms focused not just on AI-native tech, but talent as well.

    Read More As Cybersecurity Firms Chase AI, VC Market SkyrocketsContinue

  • Blog

    Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem

    Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded. In modern enterprises, identity risk is created by a compound of factors: control posture, hygiene, business context, and intent. Any one of…

    Read More Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math ProblemContinue

  • Blog

    Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

    The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team. Broadcom’s threat intelligence division said it also identified the same threat actors mounting an…

    Read More Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare AttacksContinue

  • Blog

    UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

    The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies last week. “The group used several

    Read More UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake BackdoorsContinue

  • Blog

    Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

    Anthropic on Monday said it identified “industrial-scale campaigns” mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude’s capabilities to improve their own models. The distillation attacks generated over 16 million exchanges with its large language model (LLM) through about 24,000 fraudulent accounts in violation of its terms

    Read More Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy ModelContinue

  • Blog

    Spitting Cash: ATM Jackpotting Attacks Surged in 2025

    The attacks cost banks more than $20 million in losses last year, as criminals used many of the same tools and tactics they have wielded for more than a decade.

    Read More Spitting Cash: ATM Jackpotting Attacks Surged in 2025Continue

  • Blog

    More Than Dashboards: AI Decisions Must Be Provable

    AI systems have to be able to show a record of what happened and how.

    Read More More Than Dashboards: AI Decisions Must Be ProvableContinue

  • Blog

    Iran’s MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

    The long-active Iranian threat group debuted various attack strains and payloads in attacks against organizations in the Middle East and Africa.

    Read More Iran’s MuddyWater Targets Orgs With Fresh Malware as Tensions MountContinue

Page navigation

1 2 3 … 394 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us