It might still sound far-fetched to say AI can develop critical thinking skills and help us make decisions in the cybersecurity industry. But we’re not far off. Go to Source Author: Nenad Zaric
Author Archives: Onsite Computing, Inc.
Cloud-based patch management and vulnerability remediation provider, Action1, has confirmed the company’s plans to stay founder-led days after the company received an acquisition offer from CrowdStrike at a valuation of close to $1 billion. The decision to stay independent was mostly taken in favor of the brand keeping full control of its operations and not […]
CodeBreaker technique can create code samples that poison the output of code-completing LLMs, resulting in vulnerable — and undetectable — code suggestions. Go to Source Author: Robert Lemos, Contributing Writer
It’s no great revelation to say that SaaS applications have changed the way we operate, both in our personal and professional lives. We routinely rely on cloud-based and remote applications to conduct our basic functions, with the result that the only true perimeter of our networks has become the identities with which we log into […]
In what’s a case of an operational security (OPSEC) lapse, the operator behind a new information stealer called Styx Stealer leaked data from their own computer, including details related to the clients, profit information, nicknames, phone numbers, and email addresses. Styx Stealer, a derivative of the Phemedrone Stealer, is capable of stealing browser data, instant […]
Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say exhibits commonalities with known malicious software used by North Korean hacking groups. “This application shares several behaviors with malware we’ve seen that originated in North Korea (DPRK) — specifically the threat actor known as BlueNoroff — such as KANDYKORN and RustBucket,” […]
US semiconductor manufacturer Microchip Technology has disclosed that an “unauthorized party” disrupted its server operations, affecting some aspects of its business. The breach was detected on August 17 and has led to a significant slowdown in the company’s manufacturing capabilities, Microchip said in a SEC filing. According to the regulatory filing, the company noticed potentially […]
As enterprise CISOs try and maintain security across their entire global threat landscape, they are finding themselves in a love/hate relationship with their various cloud environments. For many, though, it’s more of a hate/despise relationship. Clouds can appear to be a seamless extension of existing operations, but they are in reality controlled by various cloud […]
Generative AI (GenAI) enabled threats, such as highly convincing phishing emails and morphed digital identities, which accurately mimic human communication, are evolving in real time, surpassing existing security measures and posing challenges to legacy defenses. “The availability of large language models (LLMs) has significantly reduced the barrier to entry for threat actors, leading to an […]
Attackers are increasingly abusing legitimate network management tools to camouflage their attacks on corporate networks, according to a report by security vendor CrowdStrike. The report found a 70% year-over-year increase in the use of remote monitoring and management (RMM) tools by adversaries. ConnectWise ScreenConnect surpassed AnyDesk to become the most abused RMM tool between June […]
