An American-Israeli national named Osei Morrell has been arrested in Israel for his alleged involvement in exploiting the Nomad bridge smart-contract in August 2022 that allowed hackers to siphon $190 million. […] Go to Source Author: Bill Toulas
Author Archives: Onsite Computing, Inc.
OpenAI is rolling out ‘Codex’ for ChatGPT, which is an AI agent that automates and delegates programming tasks for software engineers. […] Go to Source Author: Mayank Parmar
During the second day of Pwn2Own Berlin 2025, competitors earned $435,000 after exploiting zero-day bugs in multiple products, including Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat Enterprise Linux, and Mozilla Firefox. […] Go to Source Author: Sergiu Gatlan
As cyberthreats become more sophisticated, your business’s focus shouldn’t just be on collecting more data about them. The key is to use a threat intelligence platform (TIP) that filters out the noise and delivers the most relevant, actionable insights. Learn how to select a platform that fits seamlessly with your team’s expertise and existing infrastructure, […]
Organizations that invest in threat intelligence platforms (TIPs) often struggle to use them effectively. TIPs are designed to collect, analyze, and share threat data, but they can become overwhelming or underutilized without the right approach. Our guide helps you choose a platform that aligns perfectly with your team’s skills and existing infrastructure, empowering you to […]
A threat intelligence platform (TIP) should be more than just a data repository. In this post, we explore the key features that define an effective TIP and how to make sure it drives meaningful action rather than overwhelm your team with endless alerts. Align threat intelligence to your environment One of the biggest mistakes organizations […]
For at least half a year, the official software supplied with Procolored printers included malware in the form of a remote access trojan and a cryptocurrency stealer. […] Go to Source Author: Bill Toulas
A well-documented cybersecurity incident response program (CSIRP) provides the transparency needed for informed decision-making, protecting the organization in a constantly changing threat environment. Go to Source Author: Craig Porter
Ransomware gang members increasingly use a new malware called Skitnet (“Bossnet”) to perform stealthy post-exploitation activities on breached networks. […] Go to Source Author: Bill Toulas
Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational institutions in China. “Over the past few months, it has expanded aggressively, continuously leveraging infected devices to launch external attacks,” NSFOCUS said in a report […]



