Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

    A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That’s according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, 2026. “No exploitation of FortiGate

    Read More AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 CountriesContinue

  • Blog

    Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

    Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user’s software codebase for vulnerabilities and suggest patches. The capability, called Claude Code Security, is currently available in a limited research preview to Enterprise and Team customers. “It scans codebases for security vulnerabilities and…

    Read More Anthropic Launches Claude Code Security for AI-Powered Vulnerability ScanningContinue

  • Blog

    CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below – CVE-2025-49113 (CVSS score: 9.9) – A deserialization of untrusted data vulnerability that allows remote code

    Read More CISA Adds Two Actively Exploited Roundcube Flaws to KEV CatalogContinue

  • Blog

    EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

    With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readiness. EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI…

    Read More EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and SecurityContinue

  • Blog

    Attackers Use New Tool to Scan for React2Shell Exposure

    Researchers say threat actors wielded the sophisticated — and unfortunately named — toolkit to target high-value networks for React2Shell exploitation.

    Read More Attackers Use New Tool to Scan for React2Shell ExposureContinue

  • Blog

    ‘God-Like’ Attack Machines: AI Agents Ignore Security Policies

    Microsoft Copilot recently summarized and leaked user emails; but any AI agent will go above and beyond to complete assigned tasks, even breaking through their carefully designed guardrails.

    Read More ‘God-Like’ Attack Machines: AI Agents Ignore Security PoliciesContinue

  • Blog

    Lessons From AI Hacking: Every Model, Every Layer Is Risky

    After two years of finding flaws in AI infrastructure, two Wiz researchers advise security pros to worry less about prompt injection and more about vulnerabilities.

    Read More Lessons From AI Hacking: Every Model, Every Layer Is RiskyContinue

  • Blog

    BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

    Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of malicious actions, including deploying VShell and  The vulnerability, tracked as CVE-2026-1731 (CVSS score: 9.9), allows attackers to execute operating system commands in the context of the

    Read More BeyondTrust Flaw Used for Web Shells, Backdoors, and Data ExfiltrationContinue

  • Blog

    Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

    In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI agent that has become exceedingly popular in the past few months. “On February 17, 2026, at 3:26 AM PT, an unauthorized party used a compromised npm publish token to…

    Read More Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer SystemsContinue

  • Blog

    Latin America’s Cyber Maturity Lags Threat Landscape

    The slower pace of upgrades has the unintended impact of creating a haven for attackers, especially for initial access brokers and ransomware gangs.

    Read More Latin America’s Cyber Maturity Lags Threat LandscapeContinue

Page navigation

1 2 3 … 392 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us