Author Archives: Onsite Computing, Inc.

A guide to building IoT networks with infrastructure-as-code

Internet of Things (IoT) networks are growing rapidly, but scaling them can be complex. Infrastructure as Code (IaC) simplifies this process by automating the deployment and management of IoT infrastructure. By adopting IaC, organizations can ensure their IoT networks are scalable, secure, and efficient. The Challenge of IoT Network Scalability An IoT network comprises interconnected […]

Harnessing Infrastructure as Code for scalable and secure IoT networks

As Internet of Things (IoT) networks expand, the need for efficient and scalable management becomes non-negotiable for businesses. Infrastructure as Code (IaC) automates infrastructure provisioning and configuration, allowing organizations to optimize resource utilization, reduce manual errors, and ensure a robust and resilient IoT infrastructure. The Challenge of IoT Network Scalability An IoT network comprises interconnected […]

The power of Infrastructure as Code in scaling Internet of Things networks

The Internet of Things (IoT) has been key toward revolutionizing industries, connecting devices, and enabling data-driven insights. However, scaling IoT networks is becoming a challenge as the number of devices continues to increase. To address this, infrastructure-as-code (IaC) provides seamless scalability and efficient management of IoT infrastructure. The Challenge of IoT Network Scalability An IoT […]

‘Water Barghest’ Sells Hijacked IoT Devices for Proxy Botnet Misuse

An elusive, sophisticated cybercriminal group has used known and zero-day vulnerabilities to compromise more than 20,000 SOHO routers and other IoT devices so far, and then puts them up for sale on a residential proxy marketplace for state-sponsored cyber-espionage actors and others to use. Go to Source Author: Elizabeth Montalbano, Contributing Writer

Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments

Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds at scale. The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic. “Criminals can […]

NHIs Are the Future of Cybersecurity: Meet NHIDR

The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and critical infrastructure. When attackers compromise a non-human identity (NHI), they can swiftly exploit it to move laterally across systems, identifying vulnerabilities and compromising additional NHIs in minutes. While organizations often take Go to Source Author:

Decades-Old Security Vulnerabilities Found in Ubuntu’s Needrestart Package

Multiple decade-old security vulnerabilities have been disclosed in the needrestart package installed by default in Ubuntu Server (since version 21.04) that could allow a local attacker to gain root privileges without requiring user interaction. The Qualys Threat Research Unit (TRU), which identified and reported the flaws early last month, said they are trivial to exploit, […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.