Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux

    Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver a previously unknown malware family called ZiChatBot on Windows and Linux systems. “While these wheel packages do implement the features described on their PyPI web pages, their true purpose is to covertly deliver malicious files,” Kaspersky 

    Read More PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and LinuxContinue

  • Blog

    vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution

    A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of the sandbox and execute arbitrary code on susceptible systems. vm2 is an open-source library used to run untrusted JavaScript code inside a secure sandbox by intercepting and proxying JavaScript objects to…

    Read More vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code ExecutionContinue

  • Blog

    Yet Another Way to Bypass Google Chrome’s Encryption Protection

    Authors of the VoidStealer Trojan uncovered a way to get around Google’s App-Bound Encryption (ABE), opening the door to infostealers.

    Read More Yet Another Way to Bypass Google Chrome’s Encryption ProtectionContinue

  • Blog

    Instructure Breach Exposes Schools’ Vendor Dependence

    ShinyHunters’ attack on Instructure, which owns the widely used Canvas learning management system (LMS), carries big questions about the trust educational institutions put into their vendors.

    Read More Instructure Breach Exposes Schools’ Vendor DependenceContinue

  • Blog

    Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks

    Cybersecurity researchers have exposed a new Mirai-derived botnet that self-identifies as xlabs_v1 and targets internet-exposed devices running Android Debug Bridge (ADB) to enlist them in a network capable of carrying out distributed denial-of-service (DDoS) attacks. Hunt.io, which detailed the malware, said it made the discovery after identifying an exposed directory on a Netherlands-hosted

    Read More Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS AttacksContinue

  • Blog

    MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack

    The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been described as a “false flag” operation. The attack, observed by Rapid7 in early 2026, has been found to leverage social engineering techniques via Microsoft Teams to initiate the infection…

    Read More MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware AttackContinue

  • Blog

    The Hacker News Launches ‘Cybersecurity Stars Awards 2026’ — Submissions Now Open

    For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats. But behind every headline, there’s a quieter, better story. It’s the story of leaders making tough calls under pressure, teams building smarter defenses, and security products that keep hunting threats 24/7…

    Read More The Hacker News Launches ‘Cybersecurity Stars Awards 2026’ — Submissions Now OpenContinue

  • Blog

    From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber

    As part of its 20th anniversary celebration, Dark Reading looks back on 20 of the biggest newmaking events from the past two decades that influenced the risk landscape for today’s cybersecurity teams.

    Read More From Stuxnet to ChatGPT: 20 News Events That Shaped CyberContinue

  • Blog

    Your AI Agents Are Already Inside the Perimeter. Do You Know What They’re Doing?

    Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern them. In their inaugural Market Guide for Guardian Agents, Gartner states that “enterprise adoption of AI agents is accelerating, outpacing maturity of governance policy controls.” Enterprise leaders can request access to the Gartner Market Guide…

    Read More Your AI Agents Are Already Inside the Perimeter. Do You Know What They’re Doing?Continue

  • Blog

    Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA

    In hard-to-detect attacks, hackers are dropping the CloudZ RAT and a fresh plugin, Pheno, to hijack the Windows-based bridge between PCs and smartphones.

    Read More Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FAContinue

Page navigation

1 2 3 … 458 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us