The relationship between various TDSs and DNS associated with Vigorish Viper and the final landing experience for the user A Chinese organized crime syndicate with links to money laundering and human trafficking across Southeast Asia has been using an advanced “technology suite” that runs the whole cybercrime supply chain spectrum to spearhead its operations. Infoblox […]
Author Archives: Onsite Computing, Inc.
An illegal gambling empire fueled by modern-day slavery is being propped up by high-profile sponsorships — and defended with sophisticated anti-detection software.
A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential phishing activity, highlighting the abuse of the cloud computing model for malicious purposes. “Serverless architectures are attractive to developers and enterprises for their flexibility, cost effectiveness, and ease of use,” Google
Approximately 12.9 million Australians using the MediSecure prescription delivery service suffered a loss of personal information from an April ransomware attack, MediSecure said in a statement. The electronic prescription provider said it has now ceased its investigations of the incident that led it to temporarily shut down its website and phone lines in May. “MediSecure […]
Historic IT outage expected to spur regulatory scrutiny, soul-searching over “monoculture” of IT infrastructure – and cyberattack threats.
The opportunities to use AI in workflow automation are many and varied, but one of the simplest ways to use AI to save time and enhance your organization’s security posture is by building an automated SMS analysis service. Workflow automation platform Tines provides a good example of how to do it. The vendor recently released […]
As a vCISO, you are responsible for your client’s cybersecurity strategy and risk governance. This incorporates multiple disciplines, from research to execution to reporting. Recently, we published a comprehensive playbook for vCISOs, “Your First 100 Days as a vCISO – 5 Steps to Success”, which covers all the phases entailed in launching a successful vCISO […]
For many enterprises, IT infrastructures have broadened to the extent that they seemingly have no boundaries. Many employees are working remotely or via a hybrid model. Cloud-based services have become the norm. Edge computing and the internet of things are continuing to grow. This can all be great from the standpoint of keeping staffers happy, […]
The JavaScript downloader malware known as SocGholish (aka FakeUpdates) is being used to deliver a remote access trojan called AsyncRAT as well as a legitimate open-source project called BOINC. BOINC, short for Berkeley Open Infrastructure Network Computing Client, is an open-source “volunteer computing” platform maintained by the University of California with an aim to carry […]
Many nations see open source software as a great equalizer, giving the Global South the tools necessary for sustainable development. But recent supply chain attacks highlight the need for security.
