Qantas has confirmed that it is now being extorted by threat actors following a cyberattack that potentially exposed the data for 6 million customers. […] Go to Source Author: Lawrence Abrams
Author Archives: Onsite Computing, Inc.
A previously undocumented spyware called ‘Batavia’ has been targeting large industrial enterprises in Russia in a phishing email campaign that uses contract-related lures. […] Go to Source Author: Bill Toulas
Security concerns are on the rise as more businesses adopt multicloud environments. But there’s no need to fret. This article shares eight actionable tips to help organizations like yours secure their multicloud ecosystems, from building a centralized security authority to implementing robust access controls. Establish centralized security leadership A single team should handle your overall […]
As multicloud architectures become increasingly prevalent, maintaining strong security has grown more challenging than ever. This article outlines eight key strategies for businesses looking to protect their cloud systems. Learn how to streamline security governance, minimize blind spots, and secure your environment across diverse cloud platforms for a unified and secure multicloud setup. Establish centralized […]
Multicloud strategies offer flexibility and cost savings, but they also come with serious security challenges. In this guide, we highlight eight expert-approved practices to secure your multicloud environment. These tips will help you enhance collaboration across teams and implement a unified detection strategy, ultimately improving the security of your infrastructure against evolving threats. Establish centralized […]
Shellter Project, the vendor of a commercial AV/EDR evasion loader for penetration testing, confirmed that hackers used its Shellter Elite product in attacks after a customer leaked a copy of the software. […] Go to Source Author: Bill Toulas
A color picker for Google’s browser with more than 100,000 downloads hijacks sessions every time a user navigates to a new webpage and also redirects them to malicious sites. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Everything feels secure—until one small thing slips through. Even strong systems can break if a simple check is missed or a trusted tool is misused. Most threats don’t start with alarms—they sneak in through the little things we overlook. A tiny bug, a reused password, a quiet connection—that’s all it takes. Staying safe isn’t just […]
If you didn’t hear about Iranian hackers breaching US water facilities, it’s because they only managed to control a single pressure station serving 7,000 people. What made this attack noteworthy wasn’t its scale, but how easily the hackers gained access — by simply using the manufacturer’s default password “1111.” This narrow escape prompted CISA to urge manufacturers […]
A hacking group with ties other than Pakistan has been found targeting Indian government organizations with a modified variant of a remote access trojan (RAT) called DRAT. The activity has been attributed by Recorded Future’s Insikt Group to a threat actor tracked as TAG-140, which it said overlaps with SideCopy, an adversarial collective assessed to […]



