Tag: CISA
-
Dole Operations Shut Down By Ransomware
A ransomware attack on the Dole Food Company forced the manufacturer to stop production at all its North American facilities last week, causing a lettuce supply shortage at US grocery stores. “The company recently experienced a cybersecurity incident that has been identified as ransomware,” Dole announced in a short press release on the company website Thursday. “Upon… Read more
-
GoDaddy Victimized for Two Years in Cyber Security Breach
GoDaddy, one of the world’s largest web hosting services, said in a SEC filing this week that it fell victim to a two-year security breach that saw unknown attackers steal customer and employee login details and seize company source code. The company said the attackers also installed malware that redirected customer websites to malicious sites. The attackers were… Read more
-
Activision Breach Exposed Game and Employee Data
Activision suffered a data breach in December 2022 through an SMS phishing campaign that allowed attackers to access the company’s internal systems. While the company says the incident hasn’t compromised any game source code, player details, or sensitive employee data, the attacker “exfiltrated sensitive work place documents”. It added that the threat actor also exfiltrated… Read more
-
De-Fi Platform Platypus Loses $8.5 Million
Decentralized finance (DeFi) platform Platypus had about $8.5 million in cryptocurrency stolen by a hacker that the company is now in communication with. Platypus wrote on Twitter that the hacker used a flash loan attack — a maneuver involving a fast, uncollateralized loan that artificially raises the price of a digital coin before the hacker… Read more
-
Apple Issues Patch For Zero-Day Vulnerability
Apple on Monday released a new version of the iPhone and iPad’s operating systems to fix a zero day vulnerability that hackers were exploiting. On the security update page, Apple wrote that it “is aware of a report that this issue may have been actively exploited.” This is the language Apple uses when someone alerts… Read more
-
FBI Defends Itself Well From a Cyber Attack
The FBI is dealing with an attack on its digital infrastructure, although the severity isn’t yet clear. The law enforcement agency tells CNN it has “contained” a recent cybersecurity incident on its network. The bureau isn’t commenting on the perpetrator, scope or damage, but says it’s gathering “additional information.” Sources speaking to CNN claim the intruders targeted a system used… Read more
-
Oakland Declares State Of Emergency Due To Cyberattack
Oakland officials declared a state of emergency after a cyberattack that first hit city technology systems last week continues to make it impossible to pay parking fees, fines and taxes online or connect by phone with most city departments. Calls to 911 and city emergency services are still going through, city officials said, but response times to emergency calls… Read more
-
SAS Airlines Compromised by Cyber Attack
SAS Scandinavian Airlines was hit by a cyber attack on February 14th, compromising its app. The airline was said to be working on a solution, with reports saying that the problem was fixed to a large extent. Still, SAS warned that the attack may have targeted customer data following the breach. Hackers targeted SAS’ website and reportedly… Read more
-
Pepsi Suffers Employee Data Breach
Pepsi Bottling Ventures, the largest bottlers of Pepsi beverages in the US, has reported a data breach affecting the personal information of several employees. The company filed a notice of the data breach with the Attorney General of Montana on February 10 after discovering that a threat actor had accessed confidential information of certain current and former employees.… Read more
-
Helix22 Secures the Internet of Things
A set of 38 security vulnerabilities has been uncovered in wireless industrial internet of things (IIoT) devices from four different vendors that could pose a significant attack surface for threat actors looking to exploit operational technology (OT) environments. Threat actors can exploit vulnerabilities in Wireless IIoT devices to gain initial access to internal OT networks.… Read more