Author Archives: Onsite Computing, Inc.

Guide:  The Ultimate Pentest Checklist for Full-Stack Security

Pentest Checklists Are More Important Than Ever Given the expanding attack surface coupled with the increasing sophistication of attacker tactics and techniques, penetration testing checklists have become essential for ensuring thorough assessments across an organization’s attack surface, both internal and external. By providing a structured approach, these checklists help testers systematically Go to Source Author:

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 – Oct 20)

Hi there! Here’s your quick update on the latest in cybersecurity. Hackers are using new tricks to break into systems we thought were secure—like finding hidden doors in locked houses. But the good news? Security experts are fighting back with smarter tools to keep data safe. Some big companies were hit with attacks, while others […]

Spectre flaw still haunts Intel and AMD chips, putting security at risk

Researchers from ETH Zurich have discovered new vulnerabilities in Intel and AMD processors, six years after the Spectre security flaws were first identified. The new Spectre variant, named “Post-Barrier Spectre,” allows attackers to bypass critical security barriers and access sensitive information, such as hashed passwords, despite earlier mitigations designed to prevent such attacks. The research, […]

Russian group’s hack of Texas water system underscores critical OT cyber threats

Cybersecurity threats to water utilities have accelerated in 2024 as Iranian, Chinese, and Russian threat actors increasingly target these critical systems. A spate of apparent joy-riding intrusions of rural water systems by could-be Russian state-linked hacktivists has continued unabated this year. Experts say these attacks, undertaken primarily by young amateurs, have caused little serious harm. […]

What makes a great CISO

The CISO’s role has evolved from managing technical controls to also supporting the business strategy. Becoming a great CISO requires more than technical expertise. To be highly effective, CISOs must balance business risks, protect against threats, and ensure organizational resilience. “It’s shifted from a technical or compliance-focused role into a business leader that needs to […]

Meet Latrodectus: Initial access brokers’ new favorite malware loader

This year law enforcement agencies have disrupted some of the biggest botnets that were used as payload distribution platforms by ransomware gangs. But when big players disappear from the cybercriminal ecosystem others quickly step in to fill the void. Enter Latrodectus, a malware loader on the rise in attack campaigns in recent months. “Currently, threat […]

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that could be exploited to leak sensitive data. “The vulnerabilities range in severity: in many cases a malicious server can inject files, tamper with file data, and even gain direct access to plaintext,” ETH Zurich researchers Jonas Hofmann and Kien […]

Schutz vor Business E-Mail Compromise: 8 wichtige Punkte für Ihre BEC-Richtlinie

Lesen Sie, welche Punkte in einer Richtlinie zum Schutz vor Business E-Mail Compromise (BEC) enthalten sein sollten. Foto: MMD Creative – shutterstock.com Laut Verizon machten BEC-Angriffe (Business E-Mail Compromise) im Jahr 2023 mehr als 50 Prozent der Vorfälle im Bereich Social Engineering aus. Die Aggressoren steigern nicht nur das Volumen ihrer Angriffsversuche, sondern werden auch […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.