Author Archives: Onsite Computing, Inc.

CrowdStrike-Action1 deal collapses over user concerns

Cloud-based patch management and vulnerability remediation provider, Action1, has confirmed the company’s plans to stay founder-led days after the company received an acquisition offer from CrowdStrike at a valuation of close to $1 billion. The decision to stay independent was mostly taken in favor of the brand keeping full control of its operations and not […]

Styx Stealer Creator’s OPSEC Fail Leaks Client List and Profit Details

In what’s a case of an operational security (OPSEC) lapse, the operator behind a new information stealer called Styx Stealer leaked data from their own computer, including details related to the clients, profit information, nicknames, phone numbers, and email addresses. Styx Stealer, a derivative of the Phemedrone Stealer, is capable of stealing browser data, instant […]

New macOS Malware TodoSwift Linked to North Korean Hacking Groups

Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say exhibits commonalities with known malicious software used by North Korean hacking groups. “This application shares several behaviors with malware we’ve seen that originated in North Korea (DPRK) — specifically the threat actor known as BlueNoroff — such as KANDYKORN and RustBucket,” […]

Microchip suffers cyberattack, impacting manufacturing operations

US semiconductor manufacturer Microchip Technology has disclosed that an “unauthorized party” disrupted its server operations, affecting some aspects of its business. The breach was detected on August 17 and has led to a significant slowdown in the company’s manufacturing capabilities, Microchip said in a SEC filing. According to the regulatory filing, the company noticed potentially […]

8 cloud security gotchas most CISOs miss

As enterprise CISOs try and maintain security across their entire global threat landscape, they are finding themselves in a love/hate relationship with their various cloud environments. For many, though, it’s more of a hate/despise relationship. Clouds can appear to be a seamless extension of existing operations, but they are in reality controlled by various cloud […]

Custodians looking to beat offenders in the GenAI cybersecurity battle

Generative AI (GenAI) enabled threats, such as highly convincing phishing emails and morphed digital identities, which accurately mimic human communication, are evolving in real time, surpassing existing security measures and posing challenges to legacy defenses. “The availability of large language models (LLMs) has significantly reduced the barrier to entry for threat actors, leading to an […]

Attackers increasingly using legitimate remote management tools to hack enterprises

Attackers are increasingly abusing legitimate network management tools to camouflage their attacks on corporate networks, according to a report by security vendor CrowdStrike. The report found a 70% year-over-year increase in the use of remote monitoring and management (RMM) tools by adversaries. ConnectWise ScreenConnect surpassed AnyDesk to become the most abused RMM tool between June […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.