Cyberattackers believed to be affiliated with the state-sponsored threat group pulled off the largest crypto heist reported to date, stealing $1.5 billion from exchange Bybit. It was carried out by interfering with a routine transfer between wallets. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Author Archives: Onsite Computing, Inc.
A previously undocumented Linux backdoor dubbed ‘Auto-Color’ was observed in attacks between November and December 2024, targeting universities and government organizations in North America and Asia. […] Go to Source Author: Bill Toulas
DISA Global Solutions, a leading US background screening and drug and alcohol testing firm, has suffered a data breach impacting 3.3 million people. […] Go to Source Author: Bill Toulas
DISA Global Solutions, a leading US background screening and drug and alcohol testing firm, has suffered a data breach impacting 3.3 million people. […] Go to Source Author: Bill Toulas
Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram. LightSpy is the name given to a modular spyware that’s capable of infecting both Windows and Apple systems with an aim to […]
Opposition activists in Belarus as well as Ukrainian military and government organizations are the target of a new campaign that employs malware-laced Microsoft Excel documents as lures to deliver a new variant of PicassoLoader. The threat cluster has been assessed to be an extension of a long-running campaign mounted by a Belarus-aligned threat actor dubbed […]
No matter the strategy, companies must approach securing unmanaged devices with sensitivity and respect for employee privacy. Go to Source Author: Jeff Shiner
Anthropic has started rolling out Claude 3.7 Sonnet, the company’s most advanced model and the first hybrid reasoning model it has shipped. […] Go to Source Author: Mayank Parmar
A hacker claims to have stolen thousands of internal documents with user records and employee data after breaching the systems of Orange Group, a leading French telecommunications operator and digital service provider. […] Go to Source Author: Ionut Ilascu
Nearly a third of organizations have an operational system connected to the Internet with a known exploited vulnerability, as attacks by state and non-state actors increase. Go to Source Author: Robert Lemos, Contributing Writer
