Author Archives: Onsite Computing, Inc.

Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disruptive Attacks Against Israel

A threat actor affiliated with Hamas has expanded its malicious cyber operations beyond espionage to carry out disruptive attacks that exclusively target Israeli entities. The activity, linked to a group called WIRTE, has also targeted the Palestinian Authority, Jordan, Iraq, Saudi Arabia, and Egypt, Check Point said in an analysis. “The [Israel-Hamas] conflict has not […]

Important tools to empower your remote workforce

For many, the transition to remote work was a sudden shift, but it’s one that’s likely to continue. To help your employees thrive in their new work environments, providing the right tools and technology is paramount. In this post, we’ll cover everything your remote workforce needs to feel empowered and stay productive while working from […]

6 Must-have equipment for remote workers

While your office may offer all the necessary tools, creating an efficient home office environment requires thoughtful planning. From ergonomic chairs to high-quality headsets, the right gear can make all the difference in remote employees’ performance. Here’s a breakdown of essential items that will help your staff stay comfortable and focused while working from home. […]

What your employees need for a productive work from home setup

In the office, employees have everything they need within reach: high-speed internet, ergonomic furniture, office supplies, and reliable tech. However, when working from home, those essentials might not be as easily available. If you have remote workers, make sure they have the following gear. Laptop For most employees, their laptop is where they’ll spend the […]

Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims

Romanian cybersecurity company Bitdefender has released a free decryptor to help victims recover data encrypted using the ShrinkLocker ransomware. The decryptor is the result of a comprehensive analysis of ShrinkLocker’s inner workings, allowing the researchers to discover a “specific window of opportunity for data recovery immediately after the removal of protectors from BitLocker-encrypted Go to […]

Amazon bestätigt Datenklau

Amazon ist von einem Datenleck betroffen. Hintergrund ist eine Sicherheitslücke bei einem Drittanbieter. bluestork – Shutterstock.com Anfang November meldete ein Cyberkrimineller unter dem Namen „Nam3L3ss“, dass er rund 2,8 Millionen Daten von Amazon erbeutet hat. Dazu zählen E-Mail-Adressen, Telefonnummern und Arbeitsstandorte von Amazon-Mitarbeitern. Nach Angaben des Hackers erfolgte der Angriff im vergangenen Jahr bei dem […]

Digital Identities: Getting to Know the Verifiable Digital Credential Ecosystem

If you are interested in the world of digital identities, you have probably heard some of the buzzwords that have been floating around for a few years now… “verifiable credential”, “digital wallet”, “mobile driver’s license” or “mDL.” These terms, among others, all reference a growing ecosystem around what we are calling “verifiable digital credentials.” But […]

Comprehensive Guide to Building a Strong Browser Security Program

The rise of SaaS and cloud-based work environments has fundamentally altered the cyber risk landscape. With more than 90% of organizational network traffic flowing through browsers and web applications, companies are facing new and serious cybersecurity threats. These include phishing attacks, data leakage, and malicious extensions. As a result, the browser also becomes a vulnerability […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.