Industrial IoT now powers things we rely on daily, such as water, power, transport, and healthcare, making its security a consumer issue, not just an engineering problem. What IIoT means (and why you should care) Industrial IoT, or IIoT for short, is the web of...
The UK is moving ahead with a ransomware payment ban for public bodies and critical national infrastructure, alongside new reporting rules for everyone else. But what does this ban entail and what could be the consequences for non-compliance? I The post What the UK’s...
American furniture maker Lovesac, known for its modular couches and comfy beanbags, has warned customers that their data was breached by hackers earlier this year, and that they should remain vigilant to the threat of identity theft. The warning letter from Lovesac...
Popular media streaming platform Plex has informed its users of yet another data breach, urging them to change their passwords as soon as possible. Criminals often target media streaming platforms because they deal with sensitive information. Plex has fallen victim...
Threat actors are at it again, targeting content creators and businesses with a new malvertising campaign on Meta. This time, the malicious ads are bundled with a video tutorial that guides viewers through the process of downloading and installing a so-called browser...
The Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. This edition of the Monthly Threat Report focuses on industry events and content from...