Author Archives: Onsite Computing, Inc.

Avangrid partners with state fusion cell to fight cyber threats via data sharing

Avangrid’s award-winning cybersecurity initiative uses real-time data sharing to protect the energy grid. Avangrid, a sustainable energy company based in Orange, CT, supplies gas and electricity to millions of people. However, as a provider of critical infrastructure, Avangrid must also prioritize cybersecurity. Cyberattacks on the energy grid can lead to power outages, data manipulation, and […]

Microsoft privilege escalation issue forces the debate: ‘When is something a security hole?’

Security vendor Fortra announced on Friday what it is describing as a Microsoft security hole that would allow an attacker who had stolen low-level access credentials to escalate them to high-level access. Privilege escalation is hardly a new issue, but it is a critical tool in an attacker’s arsenal. Privilege escalation is also a routine […]

Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution

A new set of security vulnerabilities has been disclosed in the OpenPrinting Common Unix Printing System (CUPS) on Linux systems that could permit remote command execution under certain conditions. “A remote unauthenticated attacker can silently replace existing printers’ (or install new ones) IPP urls with a malicious one, resulting in arbitrary command execution (on the […]

A critical Nvidia Container Toolkit bug can allow a complete host takeover

Nvidia has patched a critical vulnerability affecting its container toolkit (formerly known as Nvidia docker). The vulnerability — tracked as CVE-2024-0132 — has been assigned a CVSS score of 9 out of 10 and can allow a rogue user or application to break out of their dedicated container and gain full access to the underlying […]

How to Plan and Prepare for Penetration Testing

As security technology and threat awareness among organizations improves so do the adversaries who are adopting and relying on new techniques to maximize speed and impact while evading detection. Ransomware and malware continue to be the method of choice by big game hunting (BGH) cyber criminals, and the increased use of hands-on or “interactive intrusion” […]

Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks

The threat actor known as Storm-0501 has targeted government, manufacturing, transportation, and law enforcement sectors in the U.S. to stage ransomware attacks. The multi-stage attack campaign is designed to compromise hybrid cloud environments and perform lateral movement from on-premises to cloud environment, ultimately resulting in data exfiltration, credential theft, tampering, persistent Go to Source Author:

Carrier Global takes collaborative approach to cybersecurity

For enterprises that do business worldwide, cybersecurity can be a complex undertaking, as risks such as phishing attacks by threat actors continuously evolve across the globe to bypass traditional defenses wherever they may reside. Carrier Global, a provider of heating, ventilation, and air conditioning, refrigeration, and fire and security equipment, is a case in point. […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.