Healthcare fintech firm HealthEquity is warning that it suffered a data breach after a partner’s account was compromised and used to access the Company’s systems to steal protected health information. The Company says it detected the compromise after detecting ‘anomalous behavior’ from a partner’s personal device and launched an investigation into the incident. The investigation…

Read More

KEEPASSXC.EXE Information This is a valid program but it is not required to run on startup. This program is not required to start automatically as you can run it when you need to. It is advised that you disable this program so that it does not take up necessary resources. The following information is a…

Read More

PARSECD.EXE Information This is a valid program but it is not required to run on startup. This program is not required to start automatically as you can run it when you need to. It is advised that you disable this program so that it does not take up necessary resources. The following information is a…

Read More

“The business optimization plan is intended to strategically align the company’s workforce to support its ‘growth and innovation plans,’” according to the company’s July 3 filing with the U.S. Securities and Exchange Commission. OpenText, a supplier of a wide range of cybersecurity, AI and other IT management solutions for MSPs, plans to lay off 1,200…

Read More

PLANETVPN.EXE Information This is a valid program but it is not required to run on startup. This program is not required to start automatically as you can run it when you need to. It is advised that you disable this program so that it does not take up necessary resources. The following information is a…

Read More

 OVHcloud, a global cloud services provider and one of the largest of its kind in Europe, says it mitigated a record-breaking distributed denial of service (DDoS) attack earlier this year that reached an unprecedented packet rate of 840 million packets per second (Mpps). The company reports that it has seen a general trend of increased…

Read More

Twilio has confirmed that an unsecured API endpoint allowed threat actors to verify the phone numbers of millions of Authy multi-factor authentication users, potentially making them vulnerable to SMS phishing and SIM swapping attacks. Authy is a mobile app that generates multi-factor authentication codes at websites where you have MFA enabled.  In late June, a…

Read More

Most accomplished cybercriminals go out of their way to separate their real names from their hacker handles. But among certain old-school Russian hackers it is not uncommon to find major players who have done little to prevent people from figuring out who they are in real life. A case study in this phenomenon is “x999xx,”…

Read More

‘We want to make sure partners know we are the best place to invest as a partner with their dollars and their trust that we’re going to be here for the long haul, that we’re going to be able to protect their business and help them grow and really be a partner they can rely…

Read More

Thousands of pedophiles who download and share child sexual abuse material (CSAM) were identified through information-stealing malware logs leaked on the dark web, highlighting a new dimension of using stolen credentials in law enforcement investigations. The novel use of the dataset was conducted by Recorded Future’s Insikt Group, who shared a report explaining how they…

Read More