Author Archives: Onsite Computing, Inc.

The Hidden Security Gaps in Your SaaS Apps: Are You Doing Due Diligence?

SaaS applications have become indispensable for organizations aiming to enhance productivity and streamline operations. However, the convenience and efficiency these applications offer come with inherent security risks, often leaving hidden gaps that can be exploited. Conducting thorough due diligence on SaaS apps is essential to identify and mitigate these risks, ensuring the protection of your […]

New Banshee Stealer Targets 100+ Browser Extensions on Apple macOS Systems

Cybersecurity researchers have uncovered new stealer malware that’s designed to specifically target Apple macOS systems. Dubbed Banshee Stealer, it’s offered for sale in the cybercrime underground for a steep price of $3,000 a month and works across both x86_64 and ARM64 architectures.  “Banshee Stealer targets a wide range of browsers, cryptocurrency wallets, and around 100 […]

Google Pixel Devices Shipped with Vulnerable App, Leaving Millions at Risk

A large percentage of Google’s own Pixel devices shipped globally since September 2017 included dormant software that could be used to stage nefarious attacks and deliver various kinds of malware. The issue manifests in the form of a pre-installed Android app called “Showcase.apk” that comes with excessive system privileges, including the ability to remotely execute […]

11 top bug bounty programs launched in 2024

Bug bounty programs remain a crucial component of cybersecurity strategies in 2024, offering organisations the ability to draw in help from a diverse pool of cybersecurity professionals and researchers. The schemes offer continuous testing against emerging threats. What are bug bounty programs? Bug bounty programs are structured systems for individuals to identify and report security […]

Major GitHub repos leak access tokens putting code and clouds at risk

An analysis of build artifacts generated by GitHub Actions workflows inside open-source repositories belonging to major companies revealed sensitive access tokens to third-party cloud services, as well as GitHub itself. In addition, a change made this year in the GitHub artifacts feature has introduced a race condition that attackers can exploit to abuse previously unusable […]

Thousands of NetSuite stores leak sensitive data due to access control misconfiguration

Researchers have found that several thousand Oracle NetSuite customers are inadvertently leaking sensitive data to unauthenticated users through externally facing stores built with NetSuite SuiteCommerce or NetSuite Site Builder. The exposure is likely caused by a deficient understanding of access controls for custom record types in NetSuite, one of the most popular SaaS enterprise resource […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.