Threat actors are actively exploiting a critical vulnerability in the Service Finder WordPress theme that allows them to bypass authentication and log in as administrators. […] Go to Source Author: Bill Toulas
Author Archives: Onsite Computing, Inc.
Microsoft has officially embedded Copilot Chat into its 365 suite — free of charge. It now lives as a side panel in your documents and spreadsheets, ready to help with writing, number crunching, and brainstorming on demand. Let’s unpack how this integration works, what’s new inside the free tier, and why it matters for modern […]
In a strategic move to expand AI accessibility, Microsoft has made Copilot Chat a standard feature within Microsoft 365 apps. Previously available only through premium licenses or enterprise add-ons, Copilot is now seamlessly integrated as a native side panel across tools such as Word, Excel, and Outlook. This blog explores which apps are affected and […]
Microsoft is now bundling Copilot Chat with Microsoft 365 apps at no extra charge. In this post, we’ll walk you through exactly which apps gain this upgrade, how the Copilot side-panel integrates, and what features remain exclusive to premium users. What’s changing with the Copilot Chat Integration? Previously, access to Copilot Chat required a separate […]
The UK Metropolitan Police has arrested two suspects following an investigation into the doxing of children online after a ransomware attack on a chain of London-based nurseries. […] Go to Source Author: Sergiu Gatlan
A threat actor is putting a spin on classic remote monitoring and management (RMM) attacks, using a Chinese open source tool instead. Go to Source Author: Nate Nelson, Contributing Writer
The Salesloft Drift breach shows attackers don’t need to “hack Google” — they just need to breach a trusted integration. Learn from Material Security how to secure OAuth, detect risky behavior, and protect data in Google Workspace. […] Go to Source Author: Sponsored by Material Security
Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it to deliver a known malware called Gh0st RAT to targets. The activity, observed by cybersecurity company Huntress in August 2025, is characterized by the use of an unusual technique called log poisoning (aka […]
Wanna work for a hot brand? Cyberattackers continue to evolve lures for job seekers in an impersonation campaign aimed at stealing resumes from social media pros. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don’t need advanced tools; they just need one careless login. For IT teams, that means endless resets, compliance struggles, and sleepless nights worrying about the next credential leak. This Halloween, The Hacker News and Specops […]



