Supply Chain 24/7    Topics    Cyber Attack

Cyber Attack


Latest posts about Cyber Attack

Page 1 of 2 pages.
Strategies for Keeping your Company Safe from Cyber Fraud in 2024
Looking ahead to 2024, it is crucial for businesses to take proactive measures to protect themselves against AP fraud. This blog post will provide valuable insights into AP fraud prevention, offering five tips to safeguard your company’s finances.

Fighting Back Against Cyber Thieves
Preventing a cyber attack is nearly impossible, but there are plenty of steps chief supply chain officers can take to bolster their organizations’ cyber resilience and limit the potential of damage.

New Cybersecurity Requirements Needed for Supply Chains
In the face of this renewed global threat, countries have taken decisive (and sometimes radical) steps to tackle cyber threats head-on.

Guarding Against Cyber Threats
In a world awash in cyber threats, partners and suppliers can be the vulnerable points that cyber criminals exploit to gain access to systems. Those challenges will get worse before they get better as supply networks become ever more complex. As a matter of urgency, business leaders must proactively balance cyber risks against opportunity, growth and profitability, starting with a clear-eyed view of the size and scale of the risks. Then it’s time to set concrete expectations for suppliers....

Cyber attack launched against prominent ship broker and international consultancy
Clarksons PLC, the London-based shipbroker and ocean cargo consultancy, has confirmed that it is the latest victim of a sensational cyber attack. Shipping Cyber Security. Security of freight shipments.

House Committee signs off on port cybersecurity bill
Legislation focused on addressing cybersecurity concerns at United States ports was recently passed by the House of Representatives Homeland Security Committee. The legislation came in the form of the reintroduction of a bill from Rep. Norma J. Torres (D-CA), entitled H.R. 3101 the Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act.

FedEx’s TNT Unit Suffering from June Cyberattack
FedEx Corp.’s TNT unit is still trudging through some transactions by hand and information systems may never fully recover from a June Petya cyberattack that is expected to deal a blow to earnings.

Maersk cyber attack contained as ports and technology solution providers seek answers
While Maersk confirmed that it has been hit as part of a global cyber attack named Petya, cripling IT systems down multiple sites and select business units, spokesmen say the damage has been “contained.”

Petya Ransomware Cyber Attack Hits Maersk Line
While all vessel operations will continue, making “the majority” of port calls, the shipping line says it has “shut down” IT and communications infrastructure as a security measure.

Massive Cyber Attack Hits Businesses Worldwide
A massive cyber-attack using tools believed to have been developed by the US National Security Agency has struck organizations around the world, including the USA, UK, Spain, Russia, China, Portugal and Sweden, experts say it may be the biggest ransomware attack ever observed.

Dyn Urges Companies to Use Multiple Vendors in Wake of Cyber Attacks
Hackers unleashed a complex attack on the internet through common devices like webcams and digital recorders and cut access to some of the world's best known websites on Friday, a stunning breach of global internet stability.

Edward Snowden: Cyber War More Damaging To US than Any Other Nation
The former NSA contractor sat down with NOVA to discuss why the US should allocate more resources to defensive maneuvering in cyberspace than towards offensive capabilities.

Mobile Threats, Made to Measure
When it comes to malware, people who use trusted, mainstream app stores (as the bulk of users in the US and Western Europe do) are less likely to encounter malware.

Cyber Attacks Targeting Smartphone Supply Chains
A new mobile trojan dubbed “DeathRing” is being pre-loaded on to smartphones somewhere in the supply chain, warn researchers at mobile security firm Lookout.

Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance
Regin is an extremely complex piece of software that can be customized with a wide range of different capabilities that can be deployed depending on the target.


 


Featured Downloads

Unified Control System - Intelligent Warehouse Orchestration
Unified Control System - Intelligent Warehouse Orchestration
Download this whitepaper to learn Unified Control System (UCS), designed to orchestrate automated and human workflows across the warehouse, enabling automation technologies...
An Inside Look at Dropshipping
An Inside Look at Dropshipping
Korber Supply Chain’s introduction to the world of dropshipping. While dropshipping is not for every retailer or distributor, it does provide...

C3 Solutions Major Trends for Yard and Dock Management in 2024
C3 Solutions Major Trends for Yard and Dock Management in 2024
What trends you should be focusing on in 2024 depends on how far you are on your yard and dock management journey. This...
Packsize on Demand Packing Solution for Furniture and Cabinetry Manufacturers
Packsize on Demand Packing Solution for Furniture and Cabinetry Manufacturers
In this industry guide, we’ll share some of the challenges manufacturers face and how a Right-Sized Packaging On Demand® solution can...
Streamline Operations with Composable Commerce
Streamline Operations with Composable Commerce
Revamp warehouse operations with composable commerce. Say goodbye to legacy systems and hello to modernization.
{/exp:switchee}