The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned a North Korean front company and three associated individuals for their involvement in the fraudulent remote information technology (IT) worker scheme designed to generate illicit revenues for Pyongyang. The sanctions target Korea Sobaeksu Trading Company (aka Sobaeksu United Corporation), and Kim Se […]
Author Archives: Onsite Computing, Inc.
Voice over Internet Protocol (VoIP) has revolutionized communication, especially in remote and hybrid work environments. Businesses adopting VoIP can choose between softphones and hardphones, each offering unique benefits. This blog post compares the two, helping you choose the best fit for your business communication needs. VoIP softphones VoIP softphones are software applications that enable calls […]
For businesses embracing Voice over Internet Protocol (VoIP) communication, the choice between VoIP softphones and hardphones is a critical one. This article compares the two, helping you choose the ideal phone system for your company. VoIP softphones VoIP softphones are software applications that enable calls on internet-enabled devices such as computers, tablets, and smartphones. Their […]
With the rise of remote and hybrid work environments, Voice over Internet Protocol (VoIP) has become a must-have for businesses. This technology offers two options: VoIP softphones and hardphones, each with its own pros and cons. In this article, we’ll discuss the differences between these two VoIP solutions and help you determine which one is […]
The threat actor known as Patchwork has been attributed to a new spear-phishing campaign targeting Turkish defense contractors with the goal of gathering strategic intelligence. “The campaign employs a five-stage execution chain delivered via malicious LNK files disguised as conference invitations sent to targets interested in learning more about unmanned vehicle systems,” Arctic Wolf Labs […]
From PowerShell abuse to USB data theft, modern threats hit fast—and hard.vSee how security-minded PMs are responding with real-time controls, smarter policies, and tools like ThreatLocker Patch Management. […] Go to Source Author: Sponsored by ThreatLocker
Nudges can be powerful — but they are not immune to overuse or misapplication. Go to Source Author: Swati Babbar
Russian aerospace and defense industries have become the target of a cyber espionage campaign that delivers a backdoor called EAGLET to facilitate data exfiltration. The activity, dubbed Operation CargoTalon, has been assigned to a threat cluster tracked as UNG0901 (short for Unknown Group 901). “The campaign is aimed at targeting employees of Voronezh Aircraft Production […]
National governments warn that many hacker groups attract young people through a sense of community, fame, or the promise of money and the perception of a lack of risk of prosecution. Go to Source Author: Robert Lemos, Contributing Writer
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned three North Korean nationals and a company for supporting fraudulent IT worker schemes that generated illicit revenue for the Democratic People’s Republic of Korea (DPRK) government. […] Go to Source Author: Bill Toulas



