Categories
News

Chief Strategy Officer Sean Kiewiet …


Sean Kiewiet, the Chief Strategy Officer of Priority Technology Holdings Inc (NASDAQ:PRTH), sold 59,727 shares of the company on May 24, 2024. The transaction was filed on the same day with the SEC. Following this sale, the insider now owns 1,241,853 shares of Priority Technology Holdings Inc.

Priority Technology Holdings Inc operates as a provider of merchant acquiring and commercial payment solutions. The company offers a platform for merchants, banks, and distribution partners to grow their businesses through payment processing.

Over the past year, Sean Kiewiet has sold a total of 263,951 shares and has not made any purchases of the company’s stock. The insider transaction history for Priority Technology Holdings Inc shows a trend with 1 insider buy and 22 insider sells over the past year.

On the day of the latest transaction, shares of Priority Technology Holdings Inc were trading at $3.83, giving the company a market cap of $357.091 million. According to the GF Value, the stock is considered modestly undervalued with a price-to-GF-Value ratio of 0.68, based on a GF Value of $5.67.

The GF Value is calculated considering historical multiples such as price-earnings ratio, price-sales ratio, price-book ratio, and price-to-free cash flow. It also includes adjustments based on past returns and growth, and future business performance estimates from analysts.

Insider Sale at Priority Technology Holdings Inc (PRTH): Chief Strategy Officer Sean Kiewiet Sells SharesInsider Sale at Priority Technology Holdings Inc (PRTH): Chief Strategy Officer Sean Kiewiet Sells Shares

Insider Sale at Priority Technology Holdings Inc (PRTH): Chief Strategy Officer Sean Kiewiet Sells Shares

Insider Sale at Priority Technology Holdings Inc (PRTH): Chief Strategy Officer Sean Kiewiet Sells SharesInsider Sale at Priority Technology Holdings Inc (PRTH): Chief Strategy Officer Sean Kiewiet Sells Shares

Insider Sale at Priority Technology Holdings Inc (PRTH): Chief Strategy Officer Sean Kiewiet Sells Shares

This article, generated by GuruFocus, is designed to provide general insights and is not tailored financial advice. Our commentary is rooted in historical data and analyst projections, utilizing an impartial methodology, and is not intended to serve as specific investment guidance. It does not formulate a recommendation to purchase or divest any stock and does not consider individual investment objectives or financial circumstances. Our objective is to deliver long-term, fundamental data-driven analysis. Be aware that our analysis might not incorporate the most recent, price-sensitive company announcements or qualitative information. GuruFocus holds no position in the stocks mentioned herein.

This article first appeared on GuruFocus.



Source link

Categories
News

With this cunning backdoor installer, hackers can take complete control of courtroom equipment.

📷 Shutterstock / Kanoktuch

Experts have alerted us to a malware-contaminated software update that records court sessions, giving persistent access to as-yet-unidentified threat actors.

Rapid7, cybersecurity researchers, found and notified the programme developers of the issue. Although the infection has now been eradicated, it is still unclear how the supply chain attack has affected things.

The application in question is known as JAVS Viewer 8, and it is a component of the JAVS Suite 8, a collection of software tools that courts use to record, play back, and organise audio and video from legal proceedings. Over 10,000 courtrooms in the US and other countries are utilising the software, according to its creators, Justice AV Solutions.

Not a single witness

According to Rapid7, an upgraded version of JAVS Viewer 8 was recently hosted on the javs.com website. It also included a backdoor that gave its makers continuous access to compromised machines. The version that was tainted, identified as 8.3.7, was removed from the website prior to April 1, 2024.

In their research, Rapid7 stated that “users who have version 8.3.7 of the JAVS Viewer executable installed are at high risk and should take immediate action.” “A backdoored installer in this version gives attackers complete control over impacted systems.”

At least 38 endpoints were contaminated, according to Ars Technica, and cleaning the gadget requires some work.

As a result of the discoveries, JAVS said that it has removed the malware: The business released a statement saying, “We removed every version of Viewer 8.3.7 from the JAVS website, reset all passwords, and carried out a thorough internal audit of all JAVS systems.” “We verified that every file that is now accessible on the JAVS.com website is authentic and virus-free. We also confirmed that this issue did not compromise any systems, certificates, JAVS Source code, or other software releases.

Categories
News

Good luck keeping the past hidden now—a significant database breach exposed the criminal records of millions of Americans online.

📷  Sora Shimazaki / Pexels

There is bad news for Americans who want to get behind their unlawful pasts: sensitive data on millions of convicted offenders has been leaked, according to researchers.

In a blog post, Malwarebytes describes how a group of hackers exposed a database believed to have 70 million rows of data, which included the criminal histories of millions of Americans.

We can infer that Malwarebytes’ researchers did not have direct access to this database based on the language used in the statement. Nevertheless, it was said to include details such as full names, birth dates, postal addresses, known aliases, dates of arrest, dates of conviction, sentences, and more.

Developing a new leak site

The database, which contains information created between 2020 and 2024, is relatively new. A single felony is represented by each row; it is not a list of all the crimes a person may have committed.

EquationCorp and USDoD, two well-known cybercriminals, released the data.

The researchers claim that the latter is a “high-profile player” in the world of data leaks and that Connor Fitzpatrick, also known as Pompompurin, is intimately connected to him.

In case you missed it, Pompompurin was the proprietor and chief administrator of BreachForums, which is the most well-known underground site worldwide for exchanging malware, stolen and leaked data, and other pirated files. Fitzpatrick was recently taken into custody and the forum dismantled.

According to Malwarebytes, USDoD intends to create a new leak forum like BreachForums, and making this data public may be a publicity gimmick to generate interest in the new website.

It is currently unknown when, how, or from whom the hackers obtained this material.
Regardless, our American readers who have a criminal record ought to be cautious about the emails they receive, particularly if they cite prior convictions, provide attachments or links, or require immediate action. The database will probably be used by hackers for social engineering and phishing scams.