Author Archives: Onsite Computing, Inc.

Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar

Imagine trying to find a needle in a haystack, but the haystack is on fire, and there are a million other needles you also need to find. That’s what dealing with security alerts can feel like. SIEM was supposed to make this easier, but somewhere along the way, it became part of the problem. Too […]

Chinese hackers allegedly hacked US ISPs for cyber espionage

Chinese state-sponsored hackers have been found to have gained access to multiple US internet service providers (ISPs) to establish persistence and carry out cyber espionage activities. The Chinese APT group, Salt Typhoon, infiltrated these services in recent months in “pursuit of sensitive information,” according to a WSJ report. “Investigators are exploring whether the intruders gained access […]

EPSS vs. CVSS: What’s the Best Approach to Vulnerability Prioritization?

Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vulnerabilities for prioritization. While these scores provide some insight into the potential impact of a vulnerability, they don’t factor in real-world threat data, such as the likelihood of exploitation. With new vulnerabilities discovered daily, teams don’t have the time – […]

Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware

As many as 25 websites linked to the Kurdish minority have been compromised as part of a watering hole attack designed to harvest sensitive information for over a year and a half. French cybersecurity firm Sekoia, which disclosed details of the campaign dubbed SilentSelfie, described the intrusion set as long-running, with first signs of infection […]

Attackers impersonate freight companies in double brokering scams

Scammers are increasingly impersonating transportation companies to bid on shipments and then contract the job at a lower price to potentially less reliable carriers. This type of scam, known as double brokering, can nullify insurance coverage for shipments made by companies that fall victim to it and can also leave subcontracted transportation carriers unpaid. Threat […]

Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities

An advanced threat actor with an India nexus has been observed using multiple cloud service providers to facilitate credential harvesting, malware delivery, and command-and-control (C2). Web infrastructure and security company Cloudflare is tracking the activity under the name SloppyLemming, which is also called Outrider Tiger and Fishing Elephant. “Between late 2022 to present, SloppyLemming Go […]

Beware the risks of vulnerable VPNs: update, maintain, monitor, and protect

We live in a world that is always on and always vulnerable. We need remote access to allow employees to work from anywhere, but that also means that our networks are exposed to everywhere. If you still provide virtual private network (VPN) technology to your employees and do not include multifactor authentication, you are especially […]

Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign

Nation-state threat actors backed by Beijing broke into a “handful” of U.S. internet service providers (ISPs) as part of a cyber espionage campaign orchestrated to glean sensitive information, The Wall Street Journal reported Wednesday. The activity has been attributed to a threat actor that Microsoft tracks as Salt Typhoon, which is also known as FamousSparrow […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.