Latest posts about Cyber Attack
Page 1 of 2 pages.
Strategies for Keeping your Company Safe from Cyber Fraud in 2024
March 1, 2024
Looking ahead to 2024, it is crucial for businesses to take proactive measures to protect themselves against AP fraud. This blog post will provide valuable insights into AP fraud prevention, offering five tips to safeguard your company’s finances.
Fighting Back Against Cyber Thieves
November 7, 2023
Preventing a cyber attack is nearly impossible, but there are plenty of steps chief supply chain officers can take to bolster their organizations’ cyber resilience and limit the potential of damage.
New Cybersecurity Requirements Needed for Supply Chains
October 25, 2022
In the face of this renewed global threat, countries have taken decisive (and sometimes radical) steps to tackle cyber threats head-on.
Guarding Against Cyber Threats
January 30, 2018
In a world awash in cyber threats, partners and suppliers can be the vulnerable points that cyber criminals exploit to gain access to systems. Those challenges will get worse before they get better as supply networks become ever more complex. As a matter of urgency, business leaders must proactively balance cyber risks against opportunity, growth and profitability, starting with a clear-eyed view of the size and scale of the risks. Then it’s time to set concrete expectations for suppliers....
Cyber attack launched against prominent ship broker and international consultancy
November 30, 2017
Clarksons PLC, the London-based shipbroker and ocean cargo consultancy, has confirmed that it is the latest victim of a sensational cyber attack. Shipping Cyber Security. Security of freight shipments.
House Committee signs off on port cybersecurity bill
November 8, 2017
Legislation focused on addressing cybersecurity concerns at United States ports was recently passed by the House of Representatives Homeland Security Committee. The legislation came in the form of the reintroduction of a bill from Rep. Norma J. Torres (D-CA), entitled H.R. 3101 the Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act.
FedEx’s TNT Unit Suffering from June Cyberattack
July 17, 2017
FedEx Corp.’s TNT unit is still trudging through some transactions by hand and information systems may never fully recover from a June Petya cyberattack that is expected to deal a blow to earnings.
Maersk cyber attack contained as ports and technology solution providers seek answers
June 28, 2017
While Maersk confirmed that it has been hit as part of a global cyber attack named Petya, cripling IT systems down multiple sites and select business units, spokesmen say the damage has been “contained.”
Petya Ransomware Cyber Attack Hits Maersk Line
June 28, 2017
While all vessel operations will continue, making “the majority” of port calls, the shipping line says it has “shut down” IT and communications infrastructure as a security measure.
Massive Cyber Attack Hits Businesses Worldwide
May 13, 2017
A massive cyber-attack using tools believed to have been developed by the US National Security Agency has struck organizations around the world, including the USA, UK, Spain, Russia, China, Portugal and Sweden, experts say it may be the biggest ransomware attack ever observed.
Dyn Urges Companies to Use Multiple Vendors in Wake of Cyber Attacks
October 24, 2016
Hackers unleashed a complex attack on the internet through common devices like webcams and digital recorders and cut access to some of the world's best known websites on Friday, a stunning breach of global internet stability.
Edward Snowden: Cyber War More Damaging To US than Any Other Nation
January 9, 2015
The former NSA contractor sat down with NOVA to discuss why the US should allocate more resources to defensive maneuvering in cyberspace than towards offensive capabilities.
Mobile Threats, Made to Measure
December 4, 2014
When it comes to malware, people who use trusted, mainstream app stores (as the bulk of users in the US and Western Europe do) are less likely to encounter malware.
Cyber Attacks Targeting Smartphone Supply Chains
December 4, 2014
A new mobile trojan dubbed “DeathRing” is being pre-loaded on to smartphones somewhere in the supply chain, warn researchers at mobile security firm Lookout.
Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance
November 23, 2014
Regin is an extremely complex piece of software that can be customized with a wide range of different capabilities that can be deployed depending on the target.