Four members of the now-defunct REvil ransomware operation have been sentenced to several years in prison in Russia, marking one of the rare instances where cybercriminals from the country have been convicted of hacking and money laundering charges. Russian news publication Kommersant reported that a court in St. Petersburg found Artem Zaets, Alexei Malozemov, Daniil […]
Author Archives: Onsite Computing, Inc.
The Computer Emergency Response Team of Ukraine (CERT-UA) has detailed a new malicious email campaign targeting government agencies, enterprises, and military entities. “The messages exploit the appeal of integrating popular services like Amazon or Microsoft and implementing a zero-trust architecture,” CERT-UA said. “These emails contain attachments in the form of Remote Desktop Protocol (‘.rdp’ Go […]
The networking company found liable for illegally gathering user data for targeted advertising by the Irish Data Protection Commission. Go to Source Author: Dark Reading Staff
The BlackBasta ransomware operation has moved its social engineering attacks to Microsoft Teams, posing as corporate help desks contacting employees to assist them with an ongoing spam attack. […] Go to Source Author: Lawrence Abrams
Kremlin intelligence carried out a wide-scale phishing campaign in contrast to its usual, more targeted operations. Go to Source Author: Nate Nelson, Contributing Writer
Eight months after the breach occurred, Change Healthcare has finally sent out millions of notices of compromised data to affected individuals. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Russia has sentenced four members of the REvil ransomware operation to over 4 years in prison for distributing malware and illegal circulation of means of payment. […] Go to Source Author: Lawrence Abrams
Amazon has seized domains used by the Russian APT29 hacking group in targeted attacks against government and military organizations to steal Windows credentials and data using malicious Remote Desktop Protocol connection files. […] Go to Source Author: Bill Toulas
Transitioning to Voice over Internet Protocol (VoIP) phone systems can bring significant flexibility and cost savings for businesses. However, many still worry about the security of VoIP compared to traditional phone systems. In this article, we’ll tackle frequently asked questions about protecting VoIP and traditional phones so you can decide whether to make the switch […]
Voice over Internet Protocol (VoIP) phone systems are quickly replacing traditional phone lines in many businesses, yet security concerns linger among business owners. Is VoIP as secure as traditional phone systems? In this article, we’ll explore frequently asked questions about the security of VoIP and traditional phone systems, providing insights to help you determine whether […]


