Author Archives: Onsite Computing, Inc.

U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned a North Korean front company and three associated individuals for their involvement in the fraudulent remote information technology (IT) worker scheme designed to generate illicit revenues for Pyongyang. The sanctions target Korea Sobaeksu Trading Company (aka Sobaeksu United Corporation), and Kim Se […]

VoIP softphones vs. hardphones: Which is better for your business?

Voice over Internet Protocol (VoIP) has revolutionized communication, especially in remote and hybrid work environments. Businesses adopting VoIP can choose between softphones and hardphones, each offering unique benefits. This blog post compares the two, helping you choose the best fit for your business communication needs. VoIP softphones VoIP softphones are software applications that enable calls […]

Choosing between VoIP softphones and hardphones

For businesses embracing Voice over Internet Protocol (VoIP) communication, the choice between VoIP softphones and hardphones is a critical one. This article compares the two, helping you choose the ideal phone system for your company. VoIP softphones VoIP softphones are software applications that enable calls on internet-enabled devices such as computers, tablets, and smartphones. Their […]

Should your business pick VoIP softphones or hardphones?

With the rise of remote and hybrid work environments, Voice over Internet Protocol (VoIP) has become a must-have for businesses. This technology offers two options: VoIP softphones and hardphones, each with its own pros and cons. In this article, we’ll discuss the differences between these two VoIP solutions and help you determine which one is […]

Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files

The threat actor known as Patchwork has been attributed to a new spear-phishing campaign targeting Turkish defense contractors with the goal of gathering strategic intelligence. “The campaign employs a five-stage execution chain delivered via malicious LNK files disguised as conference invitations sent to targets interested in learning more about unmanned vehicle systems,” Arctic Wolf Labs […]

Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor

Russian aerospace and defense industries have become the target of a cyber espionage campaign that delivers a backdoor called EAGLET to facilitate data exfiltration. The activity, dubbed Operation CargoTalon, has been assigned to a threat cluster tracked as UNG0901 (short for Unknown Group 901). “The campaign is aimed at targeting employees of Voronezh Aircraft Production […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.