The prolific Chinese APT Mustang Panda is the likely culprit behind a sophisticated cyber-espionage attack that sets up persistent remote access to victim machines. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Author Archives: Onsite Computing, Inc.
A spear-phishing email campaign has been observed targeting recruiters with a JavaScript backdoor called More_eggs, indicating persistent efforts to single out the sector under the guise of fake job applicant lures. “A sophisticated spear-phishing lure tricked a recruitment officer into downloading and executing a malicious file disguised as a resume, leading to a more_eggs backdoor […]
U.S. cybersecurity agency CISA is warning about two critical vulnerabilities that allow authentication bypass and remote code execution in Optigo Networks ONS-S8 Aggregation Switch products used in critical infrastructure. […] Go to Source Author: Bill Toulas
A new generation of malware is on the rise, and it’s proving to be a formidable opponent for businesses of all sizes. Fileless malware is just one of the many types of attacks that organizations need to be aware of and prepared to defend against. What is fileless malware? Fileless malware is a type of […]
2024October2Security_B, application whitelisting, cybersecurity, endpoint protection, fileless malware, General Articles B, network segmentation, network traffic monitoring, phishing awareness training, PowerShell logging, Security, software patching
Unmasking fileless malware: How hackers attack without a trace
The techniques cybercriminals use to hack into systems are not any simpler. Today, there’s a glut of malware types that don’t rely on traditional methods for infiltration. Fileless malware, in particular, is an incredibly elusive and dangerous threat that can bypass even the most sophisticated security measures. What is fileless malware? Fileless malware is a […]
2024October2Security_A, application whitelisting, cybersecurity, endpoint protection, fileless malware, General Articles A, network segmentation, network traffic monitoring, phishing awareness training, PowerShell logging, Security, software patching
Fileless malware: The invisible threat in your system
Cybercriminals are always coming up with new, unpredictable ways to breach a company’s cyber defenses. One of the most elusive threats is fileless malware — an attack method that leaves no traditional trace behind. What is fileless malware? Fileless malware is a type of malicious program that operates without using executable files to infect a […]
Hackers are actively exploiting a recently disclosed RCE vulnerability in Zimbra email servers that can be triggered simply by sending specially crafted emails to the SMTP server. […] Go to Source Author: Bill Toulas
Hackers are actively exploiting a recently disclosed RCE vulnerability in Zimbra email servers that can be triggered simply by sending specially crafted emails to the SMTP server. […] Go to Source Author: Bill Toulas
Organizations looking to maximize their security posture will find AI a valuable complement to existing people, systems, and processes. Go to Source Author: Paul Bingham, Micah VanFossen
Improvements in cybersecurity and basics like patching aren’t keeping pace with the manufacturing sector’s rapid growth. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading



