Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now

    cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege escalation, code execution, and denial-of-service. The list of vulnerabilities is as follows – CVE-2026-29201 (CVSS score: 4.3) – An insufficient input validation of the feature file name in the “feature::LOADFEATUREFILE” adminbin call that…

    Read More cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch NowContinue

  • Blog

    ShinyHunters Claims Second Attack Against Instructure

    The edtech company is struggling to wrest control from its hackers. PII belonging to hundreds of millions of people is on the line.

    Read More ShinyHunters Claims Second Attack Against InstructureContinue

  • Blog

    TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms

    Threat hunters have flagged a previously undocumented Brazilian banking trojan dubbed TCLBANKER that’s capable of targeting 59 banking, fintech, and cryptocurrency platforms. The activity is being tracked by Elastic Security Labs under the moniker REF3076. The malware family is assessed to be a major update of the Maverick, which is known to leverage a worm…

    Read More TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook WormsContinue

  • Blog

    Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

    Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone number, only to trick users into joining a subscription that provided fake data and incurred financial loss. The 28 apps have collectively racked up more than 7.3 million downloads,…

    Read More Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store DownloadsContinue

  • Blog

    Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

    A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers’ systems to establish a silent foothold as well as facilitate a broad range of post-compromise functionality, such as credential harvesting, keylogging, file manipulation, clipboard monitoring, and network tunneling. “QLNX targets developers and DevOps credentials across the software supply chain,”

    Read More Quasar Linux RAT Steals Developer Credentials for Software Supply Chain CompromiseContinue

  • Blog

    One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

    The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not just anecdotal, but rather backed by a recent report investigating more than 25 million security alerts, including informational and low-severity, across live enterprise environments.  The dataset behind these findings includes 10 million monitored

    Read More One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity RiskContinue

  • Blog

    New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

    Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that’s being advertised on the Rehub Russian cybercrime forum for $1,600 by a threat actor called “darkworm.” The backdoor is designed as a Pluggable Authentication Module (PAM)-based post-exploitation toolkit that enables persistent SSH access by means of a magic password and specific TCP…

    Read More New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH CredentialsContinue

  • Blog

    Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

    Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel. Dubbed Dirty Frag, it has been described as a successor to Copy Fail (CVE-2026-31431, CVSS score: 7.8), a recently disclosed LPE flaw impacting the Linux kernel that has since come under active exploitation in the wild. The vulnerability was…

    Read More Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major DistributionsContinue

  • Blog

    Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

    Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel. Dubbed Dirty Frag, it has been described as a successor to Copy Fail (CVE-2026-31431, CVSS score: 7.8), a recently disclosed LPE flaw impacting the Linux kernel that has since come under active exploitation in the wild. The vulnerability was…

    Read More Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major DistributionsContinue

  • Blog

    After Replacing TeamPCP Malware, ‘PCPJack’ Steals Cloud Secrets

    PCPJack makes innovative use of parquet files for stealthy, pre-validated target discovery as it canvasses multiple cloud environments.

    Read More After Replacing TeamPCP Malware, ‘PCPJack’ Steals Cloud SecretsContinue

Page navigation

1 2 3 … 460 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us