Author Archives: Onsite Computing, Inc.

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware called OtterCookie with capabilities to steal credentials from web browsers and other files. NTT Security Holdings, which detailed the new findings, said the attackers have “actively and continuously” updated the malware, introducing versions v3 and […]

Unlock efficiency with Microsoft Power Automate

Running a small business often means wearing many hats. You’re handling sales, marketing, customer service, and a lot more. It can get overwhelming, and you might find yourself doing the same tedious tasks day after day. But what if there is a way to free up some of your precious time and focus on growing […]

Work smarter, not harder with Microsoft Power Automate

Juggling the demands of a small business can be tough. You’re always looking for ways to be more efficient and get more done in less time. Microsoft Power Automate could be the answer you’ve been searching for. This clever tool from Microsoft lets you automate everyday tasks and create workflows between the different apps you […]

Microsoft Power Automate: Say goodbye to repetitive manual tasks

As a small-business owner, your time is incredibly valuable. Every minute spent on tasks that don’t directly contribute to your core business is a minute lost. If you’re tired of manually sending emails, moving files around, or entering the same information in multiple places, there’s a solution. Microsoft Power Automate is a user-friendly tool designed […]

Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials

Cybersecurity researchers are warning of a new campaign that’s targeting Portuguese-speaking users in Brazil with trial versions of commercial remote monitoring and management (RMM) software since January 2025. “The spam message uses the Brazilian electronic invoice system, NF-e, as a lure to entice users into clicking hyperlinks and accessing malicious content hosted in Dropbox,” Cisco […]

Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business

AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But with this power comes new risks — like data leaks, identity theft, and malicious misuse. If your company is exploring or already using AI agents, you need to ask: Are they secure? AI agents work with […]

Beyond Vulnerability Management – Can You CVE What I CVE?

The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity is limited and patching everything immediately is a struggle. Our Vulnerability Operation Center (VOC) dataset analysis identified 1,337,797 unique findings (security issues) across 68,500 unique customer assets. 32,585 of them were distinct Go to Source […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.