Breach
Accenture Faces $50 Million Ransom Demand
August 20 by Lisa MorganAccenture did not respond to the first demand window of four hours. Regardless, whatever advice the company is giving should be the advice it takes or it will have an ever bigger potential PR problem.
IOTW: Tokyo Olympics Suffers a Fujitsu-Related Breach
August 06 by Lisa MorganSome of the Tokyo Olympics victims had participated in a cyber security drill hosted by Japan's National Center of Incident Readiness and Strategy for Cybersecurity (NISC), which was yet another victi...
IOTW: Contractor Allegedly Responsible for Aramco $50 million Ransom
July 30 by Lisa MorganSaudi Aramco's data is particularly concerning because in addition to the employee data, reports, products specs, invoices and other sensitive company information that was stolen, also for sale is a m...
2021 Top Breaches: Part II
July 23 by Seth AdlerQ2, 2021 saw the Colonial Pipeline breach, the JBS breach, fallout from the Microsoft Exhchange breach, a massaive Facebook data leak, another large health system breach and more municipal breaches.
IOTW: JBS Recovers Quickly from a Ransomware Attack
June 11 by Lisa MorganLike the Colonial Pipeline attack, there was speculation about the impact of the incident on supply and product pricing. If the impact of the JBS attack didn't last long, wholesale prices were expecte...
IOTW: Irish Healthcare Data for Sale on the Dark Web
May 28 by Lisa MorganThe fear now is that scammers unrelated to the Health Service Executive (HSE) attack will buy the data for their own nefarious use. Already, HSE is facing regulatory fines as the result of GDPR and ma...
IOTW: End-Of-Life Third Party Software Responsible For Singtel Hack
February 19 by Seth AdlerBank account information was stolen from 28 former employees. A few dozen credit card numbers belonging to staff members of a Singtel corporate customer and information from 23 related enterprises wer...
Think Like A 2021 Cyber Security Attacker
January 28 by Seth AdlerThreats now breach and move laterally through software updates while the cyber security infrastructure perimeter continues to exponentially expand with new cloud-based tools to serve a distributed wor...
IOTW: Another Solarigate Target Identified by Microsoft
January 22 by Seth AdlerMicrosoft’s investigation into Solarigate, has identified yet another victim. Mimecast is a cloud-based email management system that incorporates security, archiving, and other services into the Offic...
IOTW: Russian Hack Deeper And Wider Than First Anticipated
January 08 by Seth AdlerSolarWinds' Orion update is currently inside of thousands of public and private institutions. Some have remediated the vulnerability. But Microsoft itself has noted in a statement that their investiga...
2020 Top Breaches: Part III
December 29 by Seth Adler10 Breaches: Q3, 2020 focused a light on global state adversaries attacking US government/election entities. Ransomware attacks, payments and RaaS all made news. And insider threats along with more ad...
2020 Top Breaches: Part I
December 22 by Seth AdlerIf you can truly remember what life was like pre-pandemic in Q1, 2020- you're in the minority. Our lives have all changed. And the cyber security discipline is completely different. We've gone from an...