Phishing: The Silent Precursor to Data Breaches

December 12, 2024 at 02:20PM Phishing is a leading cyber threat that often initiates data breaches, as seen in the 2021 Colonial Pipeline attack. This social engineering tactic manipulates victims into revealing sensitive information through various methods, including email and SMS. Mitigating risks requires user education, technical controls, and robust incident response strategies. ### Meeting … Read more

Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack

December 11, 2024 at 05:38PM Krispy Kreme experienced a cybersecurity incident affecting online ordering while retail operations remain unaffected. An SEC filing revealed unauthorized access to its IT systems, prompting ongoing investigations and external expert assistance. The company anticipates material business impact, though losses may be mitigated by cyber insurance. Customer data compromise remains unconfirmed. … Read more

Krispy Kreme Doughnut Corporation admits to hole in security

December 11, 2024 at 02:05PM Krispy Kreme has reported a cybersecurity attack affecting online orders, revealing unauthorized access to its IT systems. Despite engaging cybersecurity experts, the incident is expected to significantly impact revenues and operations. The company faces potential costs related to recovery and restoration, while maintaining that fresh doughnuts remain available in stores. … Read more

No Doughnuts Today? Cyberattack Puts Krispy Kreme in a Sticky Situation

December 11, 2024 at 01:23PM Krispy Kreme confirmed a cyberattack that disrupted operations, including online ordering, referencing a “cybersecurity incident.” The company took immediate steps with cybersecurity experts to investigate and mitigate the impact. The incident, likely a data-extortion ransomware attack, is expected to materially affect business operations until resolved. ### Meeting Takeaways: Krispy Kreme … Read more

Cybercrime Gangs Abscond With Thousands of AWS Credentials

December 10, 2024 at 11:21AM Cybercriminal gangs exploited public website vulnerabilities to steal AWS cloud credentials from numerous organizations, uncovered by researchers from CyberCyber Labs. The attackers, linked to groups Nemesis and ShinyHunters, misconfigured an AWS S3 bucket containing stolen data. AWS confirmed the incident was due to customer application flaws, not their systems. ### … Read more

Inside the incident: Uncovering an advanced phishing attack

December 10, 2024 at 10:11AM The article by Varonis Security Specialist Tom Barnea discusses the evolution of sophisticated phishing attacks that exploit AI and legitimate platforms. A specific case involving a U.K. insurance company illustrates how attackers used a trusted sender’s email and created deceptive links. Recommendations emphasize user awareness and technical measures for prevention. … Read more

Heart surgery device maker’s security bypassed, data encrypted and stolen

December 10, 2024 at 07:38AM Artivion reported a cybersecurity incident resembling a ransomware attack on November 21, 2024, resulting in data theft and file encryption. The company is investigating, has engaged external advisors, and is working to restore systems. The incident has disrupted operations but is not expected to impact finances significantly, aided by cyber … Read more

Ransomware attack hits leading heart surgery device maker

December 9, 2024 at 06:03PM Artivion experienced a ransomware attack on November 21, disrupting operations and forcing some systems offline. The company is investigating the incident, involving external advisors, and has reported data encryption and theft. While most operational disruptions have been addressed, additional costs are expected, and no ransom demands have yet been claimed. … Read more

Large-Scale Incidents & the Art of Vulnerability Prioritization

December 9, 2024 at 10:04AM Cybersecurity defenders face increasing vulnerabilities due to a growing IT environment. Recent reports indicate that 14% of breaches exploit vulnerabilities, emphasizing the need for clear prioritization strategies. Learning from past incidents like MOVEit and Log4j can guide effective vulnerability evaluation and management, including the adoption of secure-by-design principles. ### Meeting … Read more

PoC exploit chains Mitel MiCollab 0-day, auth-bypass bug to access sensitive files

December 6, 2024 at 01:07AM A zero-day file read vulnerability in Mitel MiCollab can be exploited with a previously patched bug, allowing unauthorized access to sensitive files. Despite reporting the issue to Mitel over 100 days ago, it remains unpatched. The vulnerability is particularly concerning given the platform’s widespread use. **Meeting Takeaways:** 1. **Vulnerability Overview**: … Read more