Transportation and logistics companies in North America are the target of a new phishing campaign that delivers a variety of information stealers and remote access trojans (RATs). The activity cluster, per Proofpoint, makes use of compromised legitimate email accounts belonging to transportation and shipping companies so as to inject malicious content into existing email conversations. […]
Author Archives: Onsite Computing, Inc.
Most veteran CISOs implicitly understand the concept of technical debt and how it increases the risk across IT assets and applications. The idea is simple in theory, if difficult in practice to address. Technical debt is the accumulation of all of those technical improvements slated for some other time—deferred work that’s put off because there’s […]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Ivanti Virtual Traffic Manager (vTM) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2024-7593 (CVSS score: 9.8), which could be exploited by a remote unauthenticated attacker to bypass the […]
A CrowdStrike executive told a US Congressional hearing on Tuesday that the company’s endpoint detection and response sensor has to continue accessing the Windows kernel, despite criticism by some cybersecurity experts that the kernel access contributed to the crash of millions of Windows computers around the world in July. Access to the kernel by cybersecurity […]
Leaders in professional athletics lament the realities and risks of growth in connected stadium environments, social networks, and legalized gambling. Go to Source Author: Jeffrey Schwartz, Contributing Writer
Microsoft has released the September 2024 non-security preview update for Windows 10, version 22H2, with fixes for bugs causing Edge web browser freezes and media playback issues. […] Go to Source Author: Sergiu Gatlan
AutoCanada is warning that employee data may have been exposed in an August cyberattack claimed by the Hunters International ransomware gang. […] Go to Source Author: Bill Toulas
A water treatment facility in a small city took serious precautions to prevent any bad outcomes from a hazy cyber incident. Go to Source Author: Nate Nelson, Contributing Writer
Arkansas City, a small city in Cowley County, Kansas, was forced to switch its water treatment facility to manual operations over the weekend to contain a cyberattack detected on Sunday morning. […] Go to Source Author: Sergiu Gatlan
The encrypted messaging service said it will share users’ IP addresses and phone numbers with authorities when requested. Go to Source Author: Dark Reading Staff
