The security landscape for cloud-native applications is undergoing a profound transformation. Containers, Kubernetes, and serverless technologies are now the default for modern enterprises, accelerating delivery but also expanding the attack surface in ways traditional security models can’t keep up with. As adoption grows, so does complexity. Security teams are asked to monitor sprawling hybrid Go […]
Author Archives: Onsite Computing, Inc.
A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a maliciously crafted repository is opened using the program. The issue stems from the fact that an out-of-the-box security setting is disabled by default, opening the door for attackers to run arbitrary code on users’ […]
The data leak underscores the larger issue of proprietary or sensitive data being shared with GenAI by users who should know better. Go to Source Author: Kristina Beek
By weaponizing the ThrottleStop.sys driver, attackers are disrupting antivirus and endpoint detection and response (EDR) systems. Go to Source Author: Rob Wright
Microsoft is working to resolve an ongoing Exchange Online outage affecting customers throughout North America, blocking their access to emails. […] Go to Source Author: Sergiu Gatlan
Even when a vulnerability is serious and a fix is available, actually securing cars is more difficult than one would hope. Go to Source Author: Nate Nelson, Contributing Writer
U.S. Senator Ron Wyden has sent a letter to the Federal Trade Commission (FTC) requesting the agency to investigate Microsoft for failing to provide adequate security in its products, which led to ransomware attacks against healthcare organizations. […] Go to Source Author: Bill Toulas
Apple warned customers last week that their devices were targeted in a new series of spyware attacks, according to the French national Computer Emergency Response Team (CERT-FR). […] Go to Source Author: Sergiu Gatlan
With legit sounding names, EvilAI’s “productivity” apps are reviving classic threats like Trojans while adding new evasion capabilities against modern antivirus defenses. Go to Source Author: Jai Vijayan, Contributing Writer
Panama’s Ministry of Economy and Finance (MEF) has disclosed that one of its computers may have been compromised in a cyberattack.. […] Go to Source Author: Bill Toulas
