Author Archives: Onsite Computing, Inc.

Private browsing best practices: How to hide your online activities

Your web browser tracks everything you do online, storing information like search history and cookies. Private browsing can help reduce this by keeping your activity hidden. But how does private browsing work, and why is it important for your privacy? What is private browsing? Private browsing is a web browser feature that allows you to […]

Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials

Law enforcement authorities have announced the takedown of an international criminal network that leveraged a phishing platform to unlock stolen or lost mobile phones. The phishing-as-a-service (PhaaS) platform, called iServer, is estimated to have claimed more than 483,000 victims globally, led by Chile (77,000), Colombia (70,000), Ecuador (42,000), Peru (41,500), Spain (30,000), and Argentina Go […]

MFA adoption is catching up but is not quite there

While the adoption of multifactor authentication has picked up in the face of growing identity threats, it isn’t quite where it should be, according to Osterman Research. The study, which surveyed a number of cybersecurity professionals from over a hundred US-based organizations, had almost all (94.2%) respondents admitting they don’t protect “every employee and every […]

Hacker selling 7 TB of Star Health Insurance’s customer data using Telegram

Sensitive customer data from Star Health and Allied Insurance, India’s largest standalone health insurer, has been leaked via chatbots on the messaging platform Telegram, raising serious concerns about data security and privacy in the healthcare sector, a Reuters report said. This breach, potentially affecting over 31 million customers, underscores the growing threat of cybercriminals exploiting […]

Passwordless AND Keyless: The Future of (Privileged) Access Management

In IT environments, some secrets are managed well and some fly under the radar. Here’s a quick checklist of what kinds of secrets companies typically manage, including one type they should manage: Passwords [x] TLS certificates [x] Accounts [x] SSH keys ??? The secrets listed above are typically secured with privileged access management (PAM) solutions […]

Iranian APT UNC1860 Linked to MOIS Facilitates Cyber Intrusions in Middle East

An Iranian advanced persistent threat (APT) threat actor likely affiliated with the Ministry of Intelligence and Security (MOIS) is now acting as an initial access facilitator that provides remote access to target networks. Google-owned Mandiant is tracking the activity cluster under the moniker UNC1860, which it said shares similarities with intrusion sets tracked by Microsoft, […]

Want to know how the bad guys attack AI systems? MITRE’S ATLAS can show you

It’s one thing to understand that artificial intelligence introduces new and rapidly evolving threats, but it’s quite another — incredibly daunting — task to stay on top of what those threats look like, where they’re coming from, and how severe they are. The Adversarial Threat Landscape for AI Systems (ATLAS) is an attempt to do […]

Chrome Users Can Now Sync Passkeys Across Devices with New Google PIN Feature

Google on Thursday unveiled a Password Manager PIN to let Chrome web users sync their passkeys across Windows, macOS, Linux, ChromeOS, and Android devices. “This PIN adds an additional layer of security to ensure your passkeys are end-to-end encrypted and can’t be accessed by anyone, not even Google,” Chrome product manager Chirag Desai said. The […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.