Author Archives: Onsite Computing, Inc.

Scalability Challenges in Privacy-Preserving Federated Learning

This post is part of a series on privacy-preserving federated learning. The series is a collaboration between NIST and the UK government’s Responsible Technology Adoption Unit (RTA), previously known as the Centre for Data Ethics and Innovation. Learn more and read all the posts published to date at NIST’s Privacy Engineering Collaboration Space or RTA’s […]

Palo Alto Networks and Tata Comms partner for AI-powered managed security

Tata Communications has announced a partnership with Palo Alto Networks to develop integrated and managed security services. The collaboration will focus on security consolidation for global networks, cloud, and IoT security, integrated cybersecurity and connectivity, threat intelligence, incident response, and zero-trust implementation. “It’s critical for businesses to adopt a platform-centric approach to cybersecurity as attack […]

Cyberattack Group ‘Awaken Likho’ Targets Russian Government with Advanced Tools

Russian government agencies and industrial entities are the target of an ongoing activity cluster dubbed Awaken Likho. “The attackers now prefer using the agent for the legitimate MeshCentral platform instead of the UltraVNC module, which they had previously used to gain remote access to systems,” Kaspersky said, detailing a new campaign that began in June […]

New Case Study: The Evil Twin Checkout Page

Is your store at risk? Discover how an innovative web security solution saved one global online retailer and its unsuspecting customers from an “evil twin” disaster. Read the full real-life case study here. The Invisible Threat in Online Shopping When is a checkout page, not a checkout page? When it’s an “evil twin”! Malicious redirects […]

GoldenJackal Target Embassies and Air-Gapped Systems Using Malware Toolsets

A little-known threat actor tracked as GoldenJackal has been linked to a series of cyber attacks targeting embassies and governmental organizations with an aim to infiltrate air-gapped systems using two disparate bespoke toolsets. Victims included a South Asian embassy in Belarus and a European Union government (E.U.) organization, Slovak cybersecurity company ESET said. “The ultimate […]

How the increasing demand for cyber insurance is changing the role of the CISO

Demand for cyber insurance is up, and market observers expect the number of standalone cyber insurance policies will continue to rise. German multinational insurance company Munich Re has valued the global cyber insurance market at $14 billion in 2023 and estimated that it will hit $20 billion-plus in 2025 and exceed $29 billion in 2027. […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.