Your Android phone is more than just a device; it’s a vault of personal information. But is it truly secure? Cybercriminals are constantly refining their methods, which means you need to take a proactive approach to Android security. Dive into this comprehensive guide to common Android threats and practical steps to transform your smartphone into […]
Author Archives: Onsite Computing, Inc.
Malicious websites designed to rank high in Google search results for ChatGPT and Luma AI deliver the Lumma and Vidar infostealers and other malware. Go to Source Author: Elizabeth Montalbano, Contributing Writer
The Canadian government has ordered Hikvision’s subsidiary in the country to cease all operations following a review that determined them to pose a national security risk. […] Go to Source Author: Bill Toulas
The sooner we integrate cybersecurity basics into school curriculum, the stronger and more resilient our children — and their futures — will be. Go to Source Author: Crystal Morin
Microsoft has confirmed a new known issue causing delivery delays for June 2025 Windows security updates due to an incorrect metadata timestamp. […] Go to Source Author: Sergiu Gatlan
The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs, in a report published last week, said it was able to make this connection by pivoting from Proton66-linked digital assets, leading to the discovery of an active threat cluster that […]
Spanish authorities have arrested five individuals in Madrid and the Canary Islands, suspected of laundering $540 million (€460 million) from illegal cryptocurrency investment schemes and defrauding more than 5,000 victims. […] Go to Source Author: Bill Toulas
The Federal Bureau of Investigation (FBI) has warned Americans of cybercriminals impersonating health fraud investigators to steal their sensitive information. […] Go to Source Author: Sergiu Gatlan
Over 1,200 Citrix NetScaler ADC and NetScaler Gateway appliances exposed online are unpatched against a critical vulnerability believed to be actively exploited, allowing threat actors to bypass authentication by hijacking user sessions. […] Go to Source Author: Sergiu Gatlan
Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in number and frequency over the last few years. Some recent reports estimate that 83% of attacks involve compromised secrets. According to reports such as the […]

