Hackers associated with Scattered Spider tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance and retail sectors […] Go to Source Author: Lawrence Abrams
Author Archives: Onsite Computing, Inc.
In a recent intrusion, the notorious cybercriminal collective accessed CyberArk vaults and obtained more 1,400 secrets, subverted Azure, VMware, and Snowflake environments, and for the first known time, actively fought back against incident response teams. Go to Source Author: Rob Wright
Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber espionage infrastructure campaign for China-nexus hacking groups. The Operational Relay Box (ORB) network has been codenamed LapDogs by SecurityScorecard’s STRIKE team. “The LapDogs network has a high concentration […]
Starting June 9, 2025, Russian internet service providers (ISPs) have begun throttling access to websites and services protected by Cloudflare, an American internet giant. […] Go to Source Author: Bill Toulas
Hackers can spy on tens of thousands of connected tractors in the latest IoT threat, and brick them too, thanks to poor security in an aftermarket steering system. Go to Source Author: Nate Nelson, Contributing Writer
Enterprise identity management has evolved far beyond local accounts and Active Directory logins, especially with Apple devices entering the mix. This article breaks down Apple’s current approach to identity and device management, how managed Apple Accounts fit in, and why integrating with services such as Apple Business Manager and mobile device management (MDM) tools is […]
As Apple’s footprint in the enterprise grows, so do the challenges of managing user identity across macOS and iOS. This article explores the intricacies of Apple identity management, offering insights into best practices for seamless integration with modern identity providers and mobile device management (MDM) platforms. The legacy of directory binding Back in the early […]
Remember when logging in to a work computer just meant a password and a network account? Those days are long gone, especially in workplaces that use Apple devices exclusively. From managed Apple Accounts to cloud identity providers and mobile device management (MDM) integration, this guide walks you through what’s changed, what works and what doesn’t, […]
A critical NetScaler ADC and Gateway vulnerability dubbed “Citrix Bleed 2” (CVE-2025-5777) is now likely exploited in attacks, according to cybersecurity firm ReliaQuest, seeing an increase in suspicious sessions on Citrix devices. […] Go to Source Author: Bill Toulas
Putting a vulnerability debt figure together involves work, but having vulnerability debt figures lets you measure real-world values against your overall security posture. Go to Source Author: Matt Middleton-Leal



