Most Recent Articles
Researchers Warn of Active GeoVision Botnet Used in DDoS and Cryptocurrency Attacks
Cybersecurity researchers have found an active botnet in the wild comprised of older GeoVision devices that have reached end of life (EOL).
One good reason to replace older IoT devices is the lack of support that inevitably faces any kind of hardware….
IT Pro Tuesday #328
Security Training, VMware News, Latency Monitoring & More
The post IT Pro Tuesday #328 appeared first on Hornetsecurity – Next-Gen Microsoft 365 Security.
Pegasus Spyware Under Fire: Court Docs Claim NSO Group Kept Infecting Celebs, Including a Dubai Princess, as Tech Giants Fought to Take It Down
New documents claim Israeli spyware maker NSO Group has been infecting hundreds to tens of thousands of devices with its infamous Pegasus spyware despite tremendous efforts by US tech giants to muffle its operations.
According to court documents publi…
Cybercriminals Are Stealing Cookies to Bypass MFA: What Content Creators Need to Know
The FBI Atlanta Division recently sent out a public warning that cybercriminals are exploiting stolen cookies to bypass multifactor authentication (MFA) and gain access to user accounts.
This trend comes as no surprise, as threat actors continuously e…
Helix Bitcoin Mixer Operator Sentenced to Prison
Authorities sentenced the operator of an infamous Bitcoin mixer service, dubbed Helix, to three years in federal prison.
Notorious Helix Bitcoin tumbler operator sentenced to three years in prison
Larry Dean Harmon, a 41-year-old Ohio man, ran the e…
Installing Applications without a User Assigned (iOS Only)
Enabling this feature allows devices to receive the MaaS360 App Catalog, silently install VPP apps with device assignment only, and apply related app configurations, even if the user has not authenticated during the DEP enrollment process or through en…
Idaho Man Gets 10 Years for Threatening Doctor with Leak of His Own Child’s Data, Hacking Clinics, and More
An Idaho man was sentenced this week to 10 years in prison for hacking into the servers of healthcare and state departments across the United States, stealing personal data belonging to more than 132,000 people, and attempting to extort a Florida ortho…
Guardians of Patient Data: A Cybersecurity Checklist for Small Healthcare Providers
Advancing technology has paved the way for our interconnected world. The internet binds most devices, unlocking a whole new world in terms of accessibility and convenience, but also one where digital threats lurk at every step.
Healthcare providers ar…