Author Archives: Onsite Computing, Inc.

Securiti to help businesses build secure, compliant Gen AI with a new tool

Cybersecurity solutions provider Securiti has rolled out a new tool, Gencore AI, to help enterprises build generative AI systems, co-pilots, and AI agents. The solution, according to Securiti, borrows its homegrown data security and compliance capabilities to deliver a generative AI maker that addresses the control and governance challenges faced by similar tools while handling […]

Researchers Uncover Vulnerabilities in Open-Source AI and ML Models

A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which could lead to remote code execution and information theft. The flaws, identified in tools like ChuanhuChatGPT, Lunary, and LocalAI, have been reported as part of Protect AI’s Huntr bug bounty platform. […]

Atende refused to pay the ransom, and now pays the price

“The fight against cybercrime will be successful if criminals become convinced that the only consequence of their actions can be punishment and not profiting from crime,” reads the notice on the website of Polish IT services provider Atende. “We did not succumb to the blackmail of the perpetrators of the attack, who demanded a ransom […]

A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation

Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes the hidden truth. His philosophy is plain yet brilliant: “When you have eliminated the impossible, whatever remains, however improbable, must be the truth.” Rather than following every lead, Holmes focuses on the details that are […]

Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus

The Dutch National Police, along with international partners, have announced the disruption of the infrastructure powering two information stealers tracked as RedLine and MetaStealer. The takedown, which took place on October 28, 2024, is the result of an international law enforcement task force codenamed Operation Magnus that involved authorities from the U.S., the U.K., Belgium, […]

5 cybersecurity issues at stake in next week’s US election

As the US heads into a historic election, with a deadlocked electorate facing a choice between two radically different presidential candidates, several cybersecurity matters could be determined by who wins the contest on Nov. 5. Democratic Vice President Kamala Harris and Republican candidate Donald Trump offer drastically different visions for the nation on many big […]

U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing

The U.S. government (USG) has issued new guidance governing the use of the Traffic Light Protocol (TLP) to handle the threat intelligence information shared between the private sector, individual researchers, and Federal Departments and Agencies. “The USG follows TLP markings on cybersecurity information voluntarily shared by an individual, company, or other any organization, when not […]

Security outsourcing on the rise as CISOs seek cyber relief

Security software and services spending is growing faster than staffing budgets, recasting security leaders in the role of quantity surveyors rather than builders of enterprise security. Gartner predicts that security services spending will increase 15.8% to reach $86.1 billion next year. The long-running global skills shortage in the cybersecurity industry is pushing investment towards security […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.