North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency organizations. […] Go to Source Author: Bill Toulas
Author Archives: Onsite Computing, Inc.
An ex-ransomware negotiator is under criminal investigation by the Department of Justice for allegedly working with ransomware gangs to profit from extortion payment deals. […] Go to Source Author: Lawrence Abrams
A new threat vector exploits how modern browsers save HTML files, bypassing Mark of the Web and giving attackers another social-engineering attack for delivering malware. Go to Source Author: Elizabeth Montalbano, Contributing Writer
The Spanish police have arrested two individuals in the province of Las Palmas for their alleged involvement in cybercriminal activity, including data theft from the country’s government. […] Go to Source Author: Bill Toulas
Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the Nim programming language, underscoring a constant evolution of their tactics. “Unusually for macOS malware, the threat actors employ a process injection technique and remote communications via wss, the TLS-encrypted version of the WebSocket protocol,” Go […]
Cisco has removed a backdoor account from its Unified Communications Manager (Unified CM), which would have allowed remote attackers to log in to unpatched devices with root privileges. […] Go to Source Author: Sergiu Gatlan
Citrix warns that patching recently disclosed vulnerabilities that can be exploited to bypass authentication and launch denial-of-service attacks may also break login pages on NetScaler ADC and Gateway appliances. […] Go to Source Author: Sergiu Gatlan
The Forminator plugin for WordPress is vulnerable to an unauthenticated arbitrary file deletion flaw that could enable full site takeover attacks. […] Go to Source Author: Bill Toulas
While the media often focuses on cyberattacks against large corporations, small businesses are actually the most vulnerable and frequently targeted. But why have they become prime targets? Here’s a look at the challenges that make it harder for small businesses to keep up with growing cybersecurity demands. False security assumptions Small businesses often face a […]
Small businesses are feeling the weight of cybersecurity pressures more than ever before. With rising threats, limited resources, and a constant race to keep up, these businesses are struggling to balance their day-to-day operations with the ever-growing need for robust security measures. Find out more about the cybersecurity challenges small businesses are facing today. False […]


