State-sponsored threat actors are no strangers to false-flag operations, impersonating or relying on cybercriminal groups to hide their real objectives. But the lines between cybercrime and cyberespionage are becoming increasingly blurred, with the number of such occurrences on the rise. In its Digital Defense Report 2024, Microsoft recently announced it has “observed nation-state threat actors […]
Author Archives: Onsite Computing, Inc.
Microsoft has revealed that a Chinese threat actor it tracks as Storm-0940 is leveraging a botnet called Quad7 to orchestrate highly evasive password spray attacks. The tech giant has given the botnet the name CovertNetwork-1658, stating the password spray operations are used to steal credentials from multiple Microsoft customers. “Active since at least 2021, Storm-0940 […]
Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and […]
Microsoft is further delaying the release of its controversial Recall feature for Windows Copilot+ PCs, stating it’s taking the time to improve the experience. The development was first reported by The Verge. The artificial intelligence-powered tool was initially slated for a preview release starting in October. “We are committed to delivering a secure and trusted […]
The EU’s NIS2 Directive for cybersecurity resilience entered full enforcement this month, and compliance with its requirements presents major challenges for many companies. A survey conducted by Veeam at the end of August found that while most IT leaders are confident of achieving NIS2 compliance, they also acknowledged that the cybersecurity directive has exacerbated existing […]
The EU’s NIS2 Directive for cybersecurity resilience entered full enforcement this month, and compliance with its requirements presents major challenges for many companies. A survey conducted by Veeam at the end of August found that while most IT leaders are confident of achieving NIS2 compliance, they also acknowledged that the cybersecurity directive has exacerbated existing […]
Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and […]
Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and […]
Sie können nicht sagen, wir hätten Sie nicht gewarnt… Foto: Anton Vierietin | shutterstock.com CISOs und andere Executives im Bereich IT-Sicherheit arbeiten im Regelfall hart daran, ihr Unternehmen – und ihre Karriere – abzusichern. Allerdings reicht eine kleine Unaufmerksamkeit, eine Fehlannahme oder auch ein falscher Ratschlag, um sämtliche Bemühungen im Handumdrehen zunichtezumachen. Falls Sie damit […]
Cybersecurity researchers have disclosed a new phishing kit that has been put to use in campaigns targeting Australia, Japan, Spain, the U.K., and the U.S. since at least September 2024. Netcraft said more than 2,000 phishing websites have been identified the kit, known as Xiū gǒu, with the offering used in attacks aimed at a […]

