Author Archives: Onsite Computing, Inc.

The 10 biggest issues CISOs and cyber teams face today

To outsiders, the CISO role may seem straightforward: Secure the tech stack. But CISOs know that their job, which in its earliest days may have been narrow in scope, now comprises a huge array of responsibilities. Although CISOs say each of those duties are critical, they cite a group of issues that are top of […]

77% of CISOs fear next big breach will get them fired

When security vendor Portnox reported in a survey that 77% of CISOs say they are either very or extremely worried about losing their job when the next big breach happens, it raised questions about how CISOs should perceive their value in the C-suite. Will they be punished for issues beyond their control? What should happen […]

Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel

A new attack technique could be used to bypass Microsoft’s Driver Signature Enforcement (DSE) on fully patched Windows systems, leading to operating system (OS) downgrade attacks. “This bypass allows loading unsigned kernel drivers, enabling attackers to deploy custom rootkits that can neutralize security controls, hide processes and network activity, maintain stealth, and much more,” SafeBreach […]

Cyber Risk Assessments: Risikobewertung hilft CISOs

Mit Hilfe von Cyber Risk Assessments können CISOs nicht nur das konkrete Risiko im Unternehmen ermitteln, sondern auch den Erfolg ihrer Arbeit sichtbar machen. Foto: Elnur – shutterstock.com Ab einem gewissen Alter gehen viele Menschen regelmäßig zum Arzt für einen Check-up. Das ist sinnvoll und wird sogar von der Krankenkasse bezahlt. Auf diese Weise können […]

Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining

The infamous cryptojacking group known as TeamTNT appears to be readying for a new large-scale campaign targeting cloud-native environments for mining cryptocurrencies and renting out breached servers to third-parties. “The group is currently targeting exposed Docker daemons to deploy Sliver malware, a cyber worm, and cryptominers, using compromised servers and Docker Hub as the infrastructure […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.