Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

    Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. “Analysis of the recovered dropper, persistence triggers, and mining payload reveals a sophisticated, multi-stage infection prioritizing maximum cryptocurrency mining hashrate, often destabilizing the victim

    Read More Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic BombContinue

  • Blog

    ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

    Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public view. The details are different, but the pressure points are familiar. Across devices, cloud services, research labs, and even everyday apps, the line between normal…

    Read More ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & MoreContinue

  • Blog

    How Exposed Endpoints Increase Risk Across LLM Infrastructure

    As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming Interfaces (APIs) to support those models. Modern security risks are being introduced less from the models themselves and more from the infrastructure that serves, connects and automates the model. Each new LLM endpoint expands the…

    Read More How Exposed Endpoints Increase Risk Across LLM InfrastructureContinue

  • Blog

    Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

    Cybersecurity researchers have disclosed what they say is an active “Shai-Hulud-like” supply chain worm campaign that has leveraged a cluster of at least 19 malicious npm packages to enable credential harvesting and cryptocurrency key theft. The campaign has been codenamed SANDWORM_MODE by supply chain security company Socket. As with prior Shai-Hulud attack waves, the malicious…

    Read More Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API TokensContinue

  • Blog

    MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

    The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations and individuals mainly located across the Middle East and North Africa (MENA) region as part of a new campaign codenamed Operation Olalampo. The activity, first observed on January 26, 2026, has resulted in the deployment of new…

    Read More MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIPContinue

  • Blog

    AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

    A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That’s according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, 2026. “No exploitation of FortiGate

    Read More AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 CountriesContinue

  • Blog

    Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

    Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user’s software codebase for vulnerabilities and suggest patches. The capability, called Claude Code Security, is currently available in a limited research preview to Enterprise and Team customers. “It scans codebases for security vulnerabilities and…

    Read More Anthropic Launches Claude Code Security for AI-Powered Vulnerability ScanningContinue

  • Blog

    CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below – CVE-2025-49113 (CVSS score: 9.9) – A deserialization of untrusted data vulnerability that allows remote code

    Read More CISA Adds Two Actively Exploited Roundcube Flaws to KEV CatalogContinue

  • Blog

    EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

    With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readiness. EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI…

    Read More EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and SecurityContinue

  • Blog

    Attackers Use New Tool to Scan for React2Shell Exposure

    Researchers say threat actors wielded the sophisticated — and unfortunately named — toolkit to target high-value networks for React2Shell exploitation.

    Read More Attackers Use New Tool to Scan for React2Shell ExposureContinue

Page navigation

1 2 3 … 392 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us