Author Archives: Onsite Computing, Inc.

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf

The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region. “The group utilizes sophisticated tactics that include deploying a backdoor that leverages Microsoft Exchange servers for credentials theft, and exploiting […]

The key differences between proprietary and open-source VoIP

In this blog post, we will discuss the key differences between proprietary and open-source VoIP. We will discuss the technical aspects of each type of software, as well as the advantages and disadvantages of each to help you decide which one is best for your business. What is a proprietary VoIP system? Proprietary VoIP are […]

Proprietary vs. open-source VoIP: Which one is best for my business?

When choosing a VoIP solution for your business, it is important to consider the pros and cons of both proprietary and open-source systems. In this blog post, we will compare and contrast these two types of VoIP, highlighting the key differences and helping you determine which one is the best fit for your organization. What […]

What are the differences between proprietary and open-source VoIP?

VoIP, or Voice over Internet Protocol, has revolutionized communication by allowing businesses to make and receive phone calls over the internet. In this blog post, we will discuss the advantages and disadvantages of two types of VoIP — proprietary and open source — as well as factors to consider when choosing the best VoIP solution […]

More than one-third of cloud environments are critically exposed

In the first half of this year, 38% of organizations had at least one cloud workload that was critically vulnerable, highly privileged, and publicly exposed, according to a study of telemetry from customers of cloud security vendor Tenable released this week. “This ‘toxic cloud triad’ creates a high-risk attack path that makes these workloads prime […]

6 biggest healthcare security threats

Cyberattacks targeting the healthcare sector have surged since the COVID-19 pandemic and the resulting rush to enable remote delivery of healthcare services. Security vendors and researchers tracking the industry have reported a major increase in phishing attacks, ransomware, web application attacks, and other threats targeting healthcare providers. This year’s rise in ransomware in healthcare, in […]

Do the Marriott cybersecurity settlements send the wrong message to CISOs, CFOs?

Years after having been hit by a trio of major data breaches between 2014 and 2020, Marriott announced on Wednesday settlements both with the US Federal Trade Commission (FTC) and a group of the attorneys general (AGs) from almost every US state.  But the settlements disappointed many in the cybersecurity community, as both the monetary […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.