Author Archives: Onsite Computing, Inc.

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according to new findings from Trend Micro. “In this attack, the threat actor used the gRPC protocol over h2c to evade security solutions and execute their crypto mining operations on the Docker host,” researchers Abdelrahman Esmail […]

Threat actors increasingly using malicious virtual hard drives in phishing attacks

Threat actors are increasingly creating malicious virtual hard drives to distribute malware, in the hopes of getting around email gateways that have become good at detecting infected documents, spreadsheets, and PDFs, says a new report. “While virtual hard drive files like .vhd and .vhdx are typically used for virtual machines, they can also be opened […]

IBM adds quantum-resistant controls within new security suite

In an effort to arm organizations against emerging AI and quantum-computing driven threats, IBM has announced Guardian Data Security Center, an offering it claims can integrate and streamline targeted security workflows under unified controls. “IBM Guardium Data Security Center is new data security software for protecting against hybrid cloud, AI, and quantum-related risks,” said Akiba […]

IoT Assignment Completed! Report on Barriers to U.S. IoT Adoption

The 16 members of the NIST-managed Internet of Things (IoT) Advisory Board have completed their report on barriers to the U.S. receiving the benefits of IoT adoption, along with their recommendations for overcoming those barriers. As Benson Chan (Chair) and Dan Caprio (Vice Chair) of the IoT Advisory Board state in the report: “The United […]

A Comprehensive Guide to Finding Service Accounts in Active Directory

Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However, without proper monitoring, they can pose a significant security risk due to their elevated privileges. This guide will walk you through how to locate and secure these accounts within Active Directory (AD), and explore how Silverfort’s solutions can help […]

Ransomware-Attacke auf Autozulieferer Yorozu

Die Server des Autoteilezulieferes Yorozu wurden verschlüsselt. mayam_studio – Shutterstock.com Der japanische Autoteilezulieferer Yorozu stellte kürzlich fest, dass seine Server verschlüsselt wurden. Das Unternehmen hat daraufhin alle betroffenen Systeme sowohl vom Internet als auch von internen Netzwerken isoliert. Weitere Details zu dem Angriff werden nicht genannt. Unterdessen behauptet die berüchtigte Ransomware-Bande Ransomhub, dass sie 849 […]

7 risk management mistakes CISOs still make

CISOs know risk management is essential for building and maintaining a resilient enterprise security posture. Yet despite their best efforts and good intentions, many security leaders continue to fall into common traps that undermine their best efforts. Regardless of your enterprise’s size, mission, or scope, risk management plays a bedrock role in its overall security […]

Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies

Two malware families that suffered setbacks in the aftermath of a coordinated law enforcement operation called Endgame have resurfaced as part of new phishing campaigns. Bumblebee and Latrodectus, which are both malware loaders, are designed to steal personal data, along with downloading and executing additional payloads onto compromised hosts. Tracked under the names BlackWidow, IceNova, […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.