Month: July 2024

“The business optimization plan is intended to strategically align the company’s workforce to support its ‘growth and innovation plans,’” according to the company’s July 3 filing with the U.S. Securities and Exchange Commission. OpenText, a supplier of a wide range of cybersecurity, AI and other IT management solutions for MSPs, plans to lay off 1,200…

Read More

PLANETVPN.EXE Information This is a valid program but it is not required to run on startup. This program is not required to start automatically as you can run it when you need to. It is advised that you disable this program so that it does not take up necessary resources. The following information is a…

Read More

 OVHcloud, a global cloud services provider and one of the largest of its kind in Europe, says it mitigated a record-breaking distributed denial of service (DDoS) attack earlier this year that reached an unprecedented packet rate of 840 million packets per second (Mpps). The company reports that it has seen a general trend of increased…

Read More

Twilio has confirmed that an unsecured API endpoint allowed threat actors to verify the phone numbers of millions of Authy multi-factor authentication users, potentially making them vulnerable to SMS phishing and SIM swapping attacks. Authy is a mobile app that generates multi-factor authentication codes at websites where you have MFA enabled.  In late June, a…

Read More

Most accomplished cybercriminals go out of their way to separate their real names from their hacker handles. But among certain old-school Russian hackers it is not uncommon to find major players who have done little to prevent people from figuring out who they are in real life. A case study in this phenomenon is “x999xx,”…

Read More

‘We want to make sure partners know we are the best place to invest as a partner with their dollars and their trust that we’re going to be here for the long haul, that we’re going to be able to protect their business and help them grow and really be a partner they can rely…

Read More

Thousands of pedophiles who download and share child sexual abuse material (CSAM) were identified through information-stealing malware logs leaked on the dark web, highlighting a new dimension of using stolen credentials in law enforcement investigations. The novel use of the dataset was conducted by Recorded Future’s Insikt Group, who shared a report explaining how they…

Read More

FIA (Fédération Internationale de l’Automobile), the auto racing governing body since the 1950s, says attackers gained access to personal data after compromising several FIA email accounts in a phishing attack. Founded in 1904 as the Association Internationale des Automobile Clubs Reconnus (AIACR), FIA is a non-profit international association that coordinates many auto racing championships, including Formula…

Read More

The solution provider is seeing early success with its Apex Program, which trains members of the blind and visually impaired community to become cybersecurity professionals—and the goal is now to scale up the program nationally. In the 18 years since David Mayne suffered a car accident caused by a speeding driver, he has faced one…

Read More

Early-stage vendors focused on protecting data and GenAI usage in the cloud are among the year’s most notable cloud security startups. While securing cloud environments continues to grow as a concern for organizations, the arrival of generative AI introduces—or intensifies—a number of challenges for protecting the cloud. When it comes to data security, for instance,…

Read More