According to recent research on employee offboarding, 70% of IT professionals say they’ve experienced the negative effects of incomplete IT offboarding, whether in the form of a security incident tied to an account that wasn’t deprovisioned, a surprise bill for resources that aren’t in use anymore, or a missed handoff of a critical resource or account. […]
Author Archives: Onsite Computing, Inc.
Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and spam campaigns on a large scale by abusing legitimate services. “Attackers can use Xeon to send messages through multiple software-as-a-service (SaaS) providers using valid credentials for the service providers,” SentinelOne security researcher Alex Delamotte said in a report shared […]
As enterprise CISOs and other executives are still calculating the impact of CrowdStrike’s disastrous July update glitch, some feel the need to assess alternatives. The big issue is transparency or, more precisely, the lack of meaningful transparency from CrowdStrike. CrowdStrike has absolutely been detailed about the technical description of the glitch. But although the vendor […]
A newly patched security flaw in Microsoft Windows was exploited as a zero-day by Lazarus Group, a prolific state-sponsored actor affiliated with North Korea. The security vulnerability, tracked as CVE-2024-38193 (CVSS score: 7.8), has been described as a privilege escalation bug in the Windows Ancillary Function Driver (AFD.sys) for WinSock. “An attacker who successfully exploited […]
The recent ban on Kaspersky security software is a reminder that we all need to review the source and coding processes of all software used in our organizations, and not just those with a government mandate. Do you know where the software is coded up? Who maintains the code? Is there any chance that malicious […]
Cybersecurity researchers have discovered new infrastructure linked to a financially motivated threat actor known as FIN7. The two clusters of potential FIN7 activity “indicate communications inbound to FIN7 infrastructure from IP addresses assigned to Post Ltd (Russia) and SmartApe (Estonia), respectively,” Team Cymru said in a report published this week as part of a joint […]
A data extortion campaign that compromises AWS resources through credentials collected from environment (.env) files stored insecurely on web servers has been uncovered by Unit 42 researchers. The exposed files contained AWS access keys, credentials for databases and social media accounts, API keys for SaaS applications and email services, as well as access tokens for […]
Windows 11 Build 27686 has a few noteworthy improvements, such as 2TB support for FAT32 storage. It also improves Windows Sandbox and offers greater control over HDR settings, but there’s an undocumented change – the ability to set power mode for two power states. […] Go to Source Author: Mayank Parmar
Google will redact your credit card details, passwords and other sensitive information in Chrome when you’re sharing or recording your screen on Android. […] Go to Source Author: Mayank Parmar
A new data extortion group tracked as Mad Liberator is targeting AnyDesk users and runs a fake Microsoft Windows update screen to distract while exfiltrating data from the target device. […] Go to Source Author: Bill Toulas
