Let’s face it—traditional security training can feel as thrilling as reading the fine print on a software update. It’s routine, predictable, and, let’s be honest, often forgotten the moment it’s over. Now, imagine cybersecurity training that’s as unforgettable as your favorite show. Remember how “Hamilton” made history come alive, or how “The Office” taught us […]
Author Archives: Onsite Computing, Inc.
Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The “intriguing” campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut (LNK) file likely distributed in the form of a ZIP archive via a phishing email. […]
A new rule by the US Department of Defense to ensure that contractors and subcontractors are implementing information security measures required by the federal government is set to take effect 60 days after publication in the Federal Register on October 15. The rule governs the agency’s Cybersecurity Maturity Model Certification (CMMC) Program, which verifies that […]
Most of the chatter about artificial intelligence (AI) in cybersecurity concerns the technology’s use in augmenting and automating the traditional functional tasks of attackers and defenders, like how AI will improve vulnerability scanning or how large language models (LLMs) might transform social engineering. But there’s always an undercurrent of conversation about how “AI systems” will […]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical security flaw impacting Palo Alto Networks Expedition to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2024-5910 (CVSS score: 9.3), concerns a case of missing authentication in the Expedition migration tool that Go to […]
Go to Source Author:
North Korean threat actor BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS systems. […] Go to Source Author: Bill Toulas
Go to Source Author:
Questions remain over what a corporate ban will achieve, since Canadians will still be able to use the app. Go to Source Author: Nate Nelson, Contributing Writer
