The Iranian state-sponsored hacking group APT34, aka OilRig, has recently escalated its activities with new campaigns targeting government and critical infrastructure entities in the United Arab Emirates and the Gulf region. […] Go to Source Author: Bill Toulas
Author Archives: Onsite Computing, Inc.
The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region. “The group utilizes sophisticated tactics that include deploying a backdoor that leverages Microsoft Exchange servers for credentials theft, and exploiting […]
Microsoft has officially deprecated the Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP) in future versions of Windows Server, recommending admins switch to different protocols that offer increased security. […] Go to Source Author: Lawrence Abrams
In this blog post, we will discuss the key differences between proprietary and open-source VoIP. We will discuss the technical aspects of each type of software, as well as the advantages and disadvantages of each to help you decide which one is best for your business. What is a proprietary VoIP system? Proprietary VoIP are […]
When choosing a VoIP solution for your business, it is important to consider the pros and cons of both proprietary and open-source systems. In this blog post, we will compare and contrast these two types of VoIP, highlighting the key differences and helping you determine which one is the best fit for your organization. What […]
VoIP, or Voice over Internet Protocol, has revolutionized communication by allowing businesses to make and receive phone calls over the internet. In this blog post, we will discuss the advantages and disadvantages of two types of VoIP — proprietary and open source — as well as factors to consider when choosing the best VoIP solution […]
OpenAI has disrupted over 20 malicious cyber operations abusing its AI-powered chatbot, ChatGPT, for debugging and developing malware, spreading misinformation, evading detection, and conducting spear-phishing attacks. […] Go to Source Author: Bill Toulas
In the first half of this year, 38% of organizations had at least one cloud workload that was critically vulnerable, highly privileged, and publicly exposed, according to a study of telemetry from customers of cloud security vendor Tenable released this week. “This ‘toxic cloud triad’ creates a high-risk attack path that makes these workloads prime […]
Cyberattacks targeting the healthcare sector have surged since the COVID-19 pandemic and the resulting rush to enable remote delivery of healthcare services. Security vendors and researchers tracking the industry have reported a major increase in phishing attacks, ransomware, web application attacks, and other threats targeting healthcare providers. This year’s rise in ransomware in healthcare, in […]
Years after having been hit by a trio of major data breaches between 2014 and 2020, Marriott announced on Wednesday settlements both with the US Federal Trade Commission (FTC) and a group of the attorneys general (AGs) from almost every US state. But the settlements disappointed many in the cybersecurity community, as both the monetary […]



