Yodel parcel delivery service confirmed that it suffered a cyber incident that disrupted distribution operations leaving customers unable to track orders or reach customer support.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
NopSec has released the findings from their State of Vulnerability Management report surveying 426 CISOs, information security managers, analysts, pen testers, and other security professionals.
A strong recovery and resilience strategy will ensure that crypto and DeFi firms are able to rebound from cyber attacks with minimal disruptions to their operations, mitigating losses for their investors and users.
Having a robust approach to cyber hygiene in healthcare organizations not only improves clinical cybersecurity and the efficiency of clinical operations, it also ultimately improves patient safety and privacy.
AMD said it was investigating a data breach by the RansomHouse cyber extortion group claiming to have stolen 450 GB of data by exploiting weak passwords used by the chipmaker's employees.
The LockBit gang is the latest ransomware-as-a-service outfit to push the envelope, this time by offering the criminal underworld's first known bug bounty program.
Fraud is becoming more personalized. The risks of not prioritizing identity verification for fraud prevention are significant — damaged brand reputation and consumer trust, compliance-related fines and significant financial repercussions.
The personal data of 1 billion China citizens, or about two-thirds of the country's entire population, appears to be available for sale on an underground forum after a data leak.
Factoring External Attack Surface Management (EASM) into the equation means the math is clear for all. Insurance companies can better justify premium prices, while companies can demonstrate their cyber posture when applying for cybersecurity insurance.
NFT marketplace OpenSea acknowledged a data breach after an employee of a third-party email delivery vendor downloaded email addresses and shared them with an unauthorized party.