Author Archives: Onsite Computing, Inc.

New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration

Cybersecurity researchers have disclosed new security flaws impacting Citrix Virtual Apps and Desktop that could be exploited to achieve unauthenticated remote code execution (RCE) The issue, per findings from watchTowr, is rooted in the Session Recording component that allows system administrators to capture user activity, and record keyboard and mouse input, along with a video […]

New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns

Cybersecurity researchers are calling attention to a new sophisticated tool called GoIssue that can be used to send phishing messages at scale targeting GitHub users. The program, first marketed by a threat actor named cyberdluffy (aka Cyber D’ Luffy) on the Runion forum earlier this August, is advertised as a tool that allows criminal actors […]

Hackerangriff auf Berufsförderungswerk Oberhausen

Das Berufsförderungswerk Oberhausen ist Opfer einer Cyberattacke. Auszubildende können derzeit nicht an ihren Rechnern arbeiten. Juice Verve – Shutterstock.com Nach der Cyberattacke auf mehrere Schulen in Bayern hat es jetzt die nächste deutsche Bildungseinrichtung getroffen. Das Berufsförderungswerk Oberhausen (BFW) stellte am vergangenen Wochenende fest, dass Hacker in das Netzwerk eingedrungen sind. „Wir haben daraufhin umgehend […]

North Korean Hackers Target macOS Using Flutter-Embedded Malware

Threat actors with ties to the Democratic People’s Republic of Korea (DPRK aka North Korea) have been found embedding malware within Flutter applications, marking the first time this tactic has been adopted by the adversary to infect Apple macOS devices. Jamf Threat Labs, which made the discovery based on artifacts uploaded to the VirusTotal platform […]

Incident Response, Anomaly Detection Rank High on Planned ICS Security Spending

Data from the SANS State of ICS/OT Cybersecurity report suggest organizations are going to shift spending from security technologies protecting industrial control systems and operational technology environments to non-technical activities such as training and incident response. Go to Source Author: Jennifer Lawinski, Contributing Writer

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.