The threat actors trick victims into opening a malicious script, leading to the execution of the BroaderAspect .NET loader. Go to Source Author: Kristina Beek
Author Archives: Onsite Computing, Inc.
A Chinese national was arrested in Milan, Italy, last week for allegedly being linked to the state-sponsored Silk Typhoon hacking group, which responsible for cyberattacks against American organizations and government agencies. […] Go to Source Author: Lawrence Abrams
Researchers have released proof-of-concept (PoC) exploits for a critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed CitrixBleed2, warning that the flaw is easily exploitable and can successfully steal user session tokens. […] Go to Source Author: Lawrence Abrams
The new ransomware strain’s aggressive multithreading and cross-platform capabilities make it a potent threat to enterprise environments. Go to Source Author: Jai Vijayan, Contributing Writer
Researchers observed North Korean threat actors targeting cryptocurrency and Web3 platforms on Telegram using malicious Zoom meeting requests. Go to Source Author: Alexander Culafi
The outage began shortly before the July 4 holiday weekend and caused disruptions for customer ordering and other services provided by the IT distributor. Go to Source Author: Rob Wright
Hackers stole nearly $140 million from six banks in Brazil by using an employee’s credentials from C&M, a company that offers financial connectivity solutions. […] Go to Source Author: Bill Toulas
Malware analyst discovered a new version of the Atomic macOS info-stealer (also known as ‘AMOS’) that comes with a backdoor, to attackers persistent access to compromised systems. […] Go to Source Author: Bill Toulas
The announcement comes just months after security researchers observed that the group was making the transition to rebrand to World Leaks, a data theft outfit. Go to Source Author: Kristina Beek
Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization (SEO) poisoning techniques to deliver a known malware loader called Oyster (aka Broomstick or CleanUpLoader). The malvertising activity, per Arctic Wolf, promotes fake websites hosting trojanized versions of legitimate tools like PuTTY and WinSCP, aiming to trick software professionals Go to Source Author:
