A threat actor has been abusing link wrapping services from reputed technology companies to mask malicious links leading to Microsoft 365 phishing pages that collect login credentials. […] Go to Source Author: Ionut Ilascu
Author Archives: Onsite Computing, Inc.
Telecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969 to facilitate remote control over compromised networks. Palo Alto Networks Unit 42 said it observed multiple incidents in the region, including one aimed at critical telecommunications infrastructure between February and November 2024. The attacks are characterized by the Go […]
Cybersecurity researchers have flagged a previously undocumented Linux backdoor dubbed Plague that has managed to evade detection for a year. “The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system authentication and gain persistent SSH access,” Nextron Systems researcher Pierre-Henri Pezier said. Pluggable Authentication Modules Go to Source […]
OpenAI isn’t just working on GPT-5. It looks like OpenAI is also preparing to release new open-source weights, living up to its name, OpenAI.’ […] Go to Source Author: Mayank Parmar
Anthropic says it has revoked OpenAI’s access to the Claude API after ChatGPT’s engineers were found using Claude’s coding tools. […] Go to Source Author: Mayank Parmar
SonicWall SSL VPN devices have become the target of Akira ransomware attacks as part of a newfound surge in activity observed in late July 2025. “In the intrusions reviewed, multiple pre-ransomware intrusions were observed within a short period of time, each involving VPN access through SonicWall SSL VPNs,” Arctic Wolf Labs researcher Julian Tuin said […]
OpenAI is reportedly working on a new plan called ‘Go,’ which would be cheaper than the existing $20 Plus subscription. […] Go to Source Author: Mayank Parmar
Dark Reading’s 2025 News Desk marks a decade of Black Hat USA memories. We’re making our return with a slate of interviews that help you stay up on the latest research from Black Hat — no trip to Las Vegas required. Go to Source Author: Becky Bracken
SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira ransomware attacks, potentially exploiting a previously unknown security vulnerability, according to cybersecurity company Arctic Wolf. […] Go to Source Author: Sergiu Gatlan
Pi-hole, a popular network-level ad-blocker, has disclosed that donor names and email addresses were exposed through a security vulnerability in the GiveWP WordPress donation plugin. […] Go to Source Author: Sergiu Gatlan
