google.com, pub-6007374308804254, DIRECT, f08c47fec0942fa0

Top 10 cyber incidents revealed


  1. CrowdStrike IT outage: A flawed software update in July disrupted 8.5 million devices globally, with financial losses reaching US$5.4 billion. Recovery efforts required manual intervention despite a rapid fix by the cybersecurity firm.
  2. Change Healthcare ransomware attack: In February, a ransomware attack affected over 100 million individuals in the US, paralysing healthcare operations and leading to financial damages of US$4.457 billion.
  3. CDK global attack: Automotive software provider CDK Global faced a ransomware breach in June, impacting nearly 15,000 dealerships across North America. Recovery was complicated by a subsequent attack.
  4. Israel-Hamas cyber conflict: Amid the ongoing conflict, cyber incidents involving kinetic attacks caused casualties and injuries across the region, highlighting the intersection of physical and digital warfare.
  5. OpenSSH vulnerability: A zero-day exploit in July exposed over seven million instances of OpenSSH servers, emphasising the critical need for proactive software security measures.
  6. XZ Utils compromise: A critical vulnerability in an open-source library was discovered in March, averting a potential global supply chain attack. Investigations linked the breach to a long-term operation by an unidentified actor.
  7. Ivanti VPN breaches: Vulnerabilities in January and February exposed critical remote access systems, posing risks to enterprise security and supply chains.
  8. Salt Typhoon espionage campaign: Chinese state-sponsored hackers targeted telecommunications infrastructure worldwide, compromising surveillance systems and raising concerns over supply chain resilience.
  9. Blue Yonder ransomware attack: A November breach disrupted retail and grocery supply chains in the US and UK, affecting operations during a peak shopping period.
  10. Snowflake data breach: A May attack on the cloud provider exposed customer data from industries including finance and retail, attributed to weak authentication practices in customer environments.

The report also discusses industry-wide risks, such as dependency on cloud providers, and highlights strategies for resilience. These include adopting multi-cloud frameworks, integrating edge computing, and implementing Endpoint Detection and Response (EDR) diversification.



Source link

Recent Articles

LIC unveils Smart Pension Plan: Single premium annuity with multiple payout options

The Life Insurance Corporation of India (LIC) has launched a single premium “Smart Pension plan,” offering a range of annuity options for single...

Alexander Brothers Face More Lawsuits Accusing Them of Sexual Assault

Eleven more women have filed lawsuits against one or more of the Alexander brothers, the once high-flying trio who are facing multiple accusations...

Delaware Bill Would Limit Investor Lawsuits as Companies Consider Exiting State

Delaware lawmakers on Monday proposed changes to the U.S. state’s widely used corporate law that...

Washington In Meltdown As Bureaucrats Flee

(“Swiss bank” (yellow), “offshore bank” (green), “wire money” (red) and “IBAN” (blue)) Google search results for “lawyer” have skyrocketed by 400% in Washington D.C....

Sneaky move banks made just before RBA interest rate cut

Australia’s “big four” banks and other lenders have structured some of their loan products in a way that could create a mortgage cliff...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Stay on op - Ge the daily news in your inbox

google.com, pub-6007374308804254, DIRECT, f08c47fec0942fa0
google.com, pub-6007374308804254, DIRECT, f08c47fec0942fa0