article thumbnail

Steel sheet giant Hoa Sen Group hacked by Maze ransomware operators

Security Affairs

Experts at threat intelligence firm Cyble came across a post published by Maze ransomware operators claiming to have breached the steel sheet giant Hoa Sen Group. The Hoa Sen Group (HSG) was founded in the year 2001, it has 7,100 employees across all its 343 companies and has been earning annual revenue of around $1.18

article thumbnail

Pharmaceutical giant Cencora discloses a data breach

Security Affairs

formerly known as AmerisourceBergen, is an American drug wholesale company and a contract research organization that was formed by the merger of Bergen Brunswig and AmeriSource in 2001. The company did not provide details about the attack, it’s unclear if Cencora was hit by a ransomware attack. Cencora, Inc. The Company had $238.6

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Somehow SMBs must keep pace competitively, while also tamping down the rising risk of suffering a catastrophic network breach. Remote desktop risks.

article thumbnail

What is fileless malware?

Malwarebytes

The first malware to be classified as fileless was the Code Red Worm , which ran rampant in 2001, attacking computers running Microsoft’s Internet Information Services (IIS). Modern ransomware attacks sometimes rely on PowerShell commands that execute code stored on public websites like Pastebin or GitHub.

Malware 123
article thumbnail

Industrial cybersecurity: know the biases that can derail collaboration between OT and IT

Cisco Security

The Wannacry ransomware attack targeted workstations running Windows XP, introduced in 2001. Regularly assess and remediate risks. They’re also biased toward making IT the sole administrator of OT systems, reducing the risk of stolen credentials or configuration changes that could introduce vulnerabilities. Take patching.

article thumbnail

It’s not ‘See you later.’ It’s ‘Goodbye’: Moving on from Tokenization in the age of Ransomware

CyberSecurity Insiders

Tokenization was invented a little over twenty years ago in 2001 to address the risk of losing cardholder data from eCommerce platforms. Transactions could now flow through entire financial workflows without risking payment card compromise. In fact, the average cost of a ransomware attack in 2021 is $1.85

article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

AES or the Advanced Encryption Standard was adopted in 2001 by the US National Institute of Standards and Testing (NIST) as the standard for symmetric encryption. In each of these cases, the cracked encryption can lead to leaked data, but the nature of the risk remains distinct.