Author Archives: Onsite Computing, Inc.

Ransomware-Attacke auf Medienhaus IDEA

srcset=”https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2118353690.jpg?quality=50&strip=all 6720w, https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2118353690.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2118353690.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2118353690.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2118353690.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2118353690.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2118353690.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2118353690.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2118353690.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2118353690.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2024/10/shutterstock_2118353690.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Hacker haben sich Zugriff auf die IT-Systeme des Medienunternehmens IDEA verschafft. NicoElNino – Shutterstock.com Nach eigenen Angaben stellte das Medienunternehmen IDEA am 21. Oktober fest, dass eine osteuropäische […]

Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack

Cisco on Wednesday said it has released updates to address an actively exploited security flaw in its Adaptive Security Appliance (ASA) that could lead to a denial-of-service (DoS) condition. The vulnerability, tracked as CVE-2024-20481 (CVSS score: 5.8), affects the Remote Access VPN (RAVPN) service of Cisco ASA and Cisco Firepower Threat Defense (FTD) Software. Arising […]

Critical Fortinet vulnerability finds zero-day RCE exploits

Hackers in the wild are actively exploiting a critical vulnerability in Fortinet’s software management platform FortiManager, the company warned its users on Wednesday. The bug, tracked as CVE-2024-47575, has been assigned a CVSS score of 9.8 out of 10, and is described as a “missing authentication for critical function” vulnerability allowing attackers to execute arbitrary […]

Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA

Sometimes, it turns out that the answers we struggled so hard to find were sitting right in front of us for so long that we somehow overlooked them. When the Department of Homeland Security, through the Cybersecurity and Infrastructure Security Agency (CISA), in coordination with the FBI, issues a cybersecurity warning and prescribes specific action, […]

Iranian hackers ramp up influence operations ahead of 2024 US election

As the 2024 US presidential election approaches, Iranian hackers are stepping up their cyber-influence operations to disrupt the electoral process and undermine voter confidence in the US. Iran-backed groups, particularly the Islamic Revolutionary Guard Corps (IRGC), have been increasingly active in cyber-enabled influence efforts, focusing on election-related operations that could escalate in the final days […]

The ransomware negotiation playbook adds new chapters

When an organization is suddenly locked out of its own systems or has sensitive data stolen, it’s not just about losing access — it’s an existential threat to its entire operation. Navigating a ransomware attack requires a cross-departmental response team, including legal counsel, cybersecurity experts, and organizational leadership. The technical team’s role during a ransomware […]

Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices

The North Korean threat actor known as Lazarus Group has been attributed to the zero-day exploitation of a now-patched security flaw in Google Chrome to seize control of infected devices. Cybersecurity vendor Kaspersky said it discovered a novel attack chain in May 2024 that targeted the personal computer of an unnamed Russian national with the […]

Diese Unternehmen hat’s schon erwischt

Hier finden Sie aktuelle Cyberangriffe auf deutsche Unternehmen. Elena Uve – Shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor Cyberangriffen schützen? Oder dass Ihr Unternehmen zu klein und damit uninteressant für Hacker ist? Egal, ob Sie dem Mittelstand angehören, an der Börse gelistet sind oder zu den kritischen Infrastrukturen gehören: Jedes Unternehmen hat Daten, […]

Fortinet Warns of Critical Vulnerability in FortiManager Under Active Exploitation

Fortinet has confirmed details of a critical security flaw impacting FortiManager that has come under active exploitation in the wild. Tracked as CVE-2024-47575 (CVSS score: 9.8), the vulnerability is also known as FortiJump and is rooted in the FortiGate to FortiManager (FGFM) protocol. “A missing authentication for critical function vulnerability [CWE-306] in FortiManager fgfmd daemon […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.