A threat actor has gained access to Microsoft 365 environments of a small number of customers of Commvault’s Metallic service. Go to Source Author: Jai Vijayan, Contributing Writer
Author Archives: Onsite Computing, Inc.
DragonForce, a ransomware “cartel” that has gained significant popularity since its debut in 2023, attacked an MSP as part of a recent supply chain attack, via known SimpleHelp bugs. Go to Source Author: Alexander Culafi, Senior News Writer, Dark Reading
An Iranian national has pleaded guilty to participating in the Robbinhood ransomware operation, which was used to breach the networks, steal data, and encrypt devices of U.S. cities and organizations in an attempt to extort millions of dollars over a five-year span. […] Go to Source Author: Lawrence Abrams
The attack dirsupted MathWorks’ systems and online applications, but it remains unclear which ransomware group targeted the software company and whether they stole any data. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
The non-ransomware extortion group has switched up tactics and victimology in a deliberate and focused campaign similar to those of other attackers focused on stealing sensitive data. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a cryptocurrency mining botnet. The attacks, designed to mine for Dero currency, is notable for its worm-like capabilities to propagate the malware to other exposed Docker instances and rope them into an ever-growing horde of mining bots. Kaspersky […]
A multiyear investigation by a public-private partnership has resulted in the seizure of the botnet’s US-based infrastructure and indictments for its key players, significantly disrupting a vast cybercriminal enterprise. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Not every “critical” vulnerability is a critical risk. Picus Exposure Validation cuts through the noise by testing what’s actually exploitable in your environment — so you can patch what matters. […] Go to Source Author: Sponsored by Picus Security
Organizations need to broaden their strategy to manage vulnerabilities more effectively and strengthen network cyber resilience. Go to Source Author: Amar Ramakrishnan
MathWorks, a leading developer of mathematical computing and simulation software, has revealed that a recent ransomware attack is behind an ongoing service outage. […] Go to Source Author: Sergiu Gatlan
