Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

    Cybersecurity researchers have lifted the curtain on a stealthy botnet that’s designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since it first surfaced in 2023. It’s capable of targeting a wide range of IoT devices, such as routers and gateways, spanning multiple architectures. “Built for

    Read More Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT DevicesContinue

  • Blog

    Fraud Rockets Higher in Mobile-First Latin America

    Cyber-fraudsters move quickly from compromised devices to account takeover to funds transfer, shifting money before many financial institutions can react.

    Read More Fraud Rockets Higher in Mobile-First Latin AmericaContinue

  • Blog

    Full Sail University to Open IBM Cyber Defense Range Powered by AWS and Cloud Range on Campus

    Post Content

    Read More Full Sail University to Open IBM Cyber Defense Range Powered by AWS and Cloud Range on CampusContinue

  • Blog

    Niobium Introduces The Fog

    Post Content

    Read More Niobium Introduces The FogContinue

  • Blog

    Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams

    Post Content

    Read More Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity TeamsContinue

  • Blog

    APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

    The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX. “PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control,” Trend Micro

    Read More APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO AlliesContinue

  • Blog

    Iranian Threat Actors Disrupt US Critical Infrastructure Via Exposed PLCs

    Attackers compromised Internet-facing OT devices and caused file and display manipulation, operational disruption, and financial losses across sectors.

    Read More Iranian Threat Actors Disrupt US Critical Infrastructure Via Exposed PLCsContinue

  • Blog

    Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

    The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams, machine identities, and autonomous systems.  The result is Identity Dark Matter: identity activity that sits outside the visibility of centralized IAM and

    Read More Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)Continue

  • Blog

    Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

    Artificial Intelligence (AI) company Anthropic announced a new cybersecurity initiative called Project Glasswing that will use a preview version of its new frontier model, Claude Mythos, to find and address security vulnerabilities. The model will be used by a small set of organizations, including Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike,&

    Read More Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major SystemsContinue

  • Blog

    N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

    The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, and PHP ecosystems. “The threat actor’s packages were designed to impersonate legitimate developer tooling […], while quietly functioning as malware loaders, extending Contagious Interview’s established playbook into a coordinated

    Read More N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, RustContinue

Page navigation

1 2 3 … 434 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us