The CrowdStrike Global Incident in Perspective
This morning, a significant IT outage caused widespread disruptions across the globe effecting various industries, including airlines, banking, and media. This incident was linked to a software update from CrowdStrike, and issues with Microsoft’s Azure cloud platform. The combination of these factors led to major operational disruptions, affecting computers running the Windows operating system with […]
Major Data Breach Hits Disney: 1.1TB of Data Compromised
July 16, 2024 – Disney has fallen victim to a significant cyberattack orchestrated by the hacker group NullBulge, leading to the breach of 1.1TB of sensitive data. The compromised information includes unreleased projects, concept art, login details, and personal information. The attack was facilitated through unauthorized access to Disney’s internal Slack communication channels. In addition […]
UK Ministry of Defense Data Breach & Global Implications
In May 2024, the UK Ministry of Defense (MoD) was struck by a severe cybersecurity breach, resulting in the exposure of sensitive personal data of nearly 270,000 current and former staff members. Orchestrated through the payroll systems managed by MoD’s private contractor, Shared Services Connected Limited (SSCL), this breach highlights significant vulnerabilities within government cybersecurity […]
Japan’s Space Agency JAXA Faces Significant Cybersecurity Breach
The Japan Aerospace Exploration Agency (JAXA), has recently experienced a severe cybersecurity breach that compromised its internal networks. This sophisticated attack targeted JAXA’s Active Directory server. The breach has exposed potentially sensitive space-related technologies and data, including but not limited to employee credentials and network operations data. Officials from JAXA have expressed significant concern, labeling […]
Navigating the Unprecedented HTTP/2 “Rapid Reset” DDoS Attack
Recently, the digital world witnessed the largest Distributed Denial of Service (DDoS) attack in history, with internet titans like Google and Amazon grappling with an assault that surged to a staggering 398 million requests per second. This attack exploited a novel technique known as “Rapid Reset,” targeting the widely utilized HTTP/2 protocol, integral for boosting […]
Understanding the Cisco Duo MFA Service Breach
Introduction In early April 2024, Cisco’s Duo multifactor authentication (MFA) service, a cornerstone of secure access to corporate applications, was compromised. This incident exposes the vulnerabilities even in systems designed to protect against unauthorized access, shedding light on the sophistication of cyber threats in today’s digital age. The Breach Explained The breach targeted a third-party […]
Shadow Intrusion: The CVE-2024-3094 Threat
The CVE-2024-3094 incident, involving a sophisticated backdoor in XZ Utils versions 5.6.0 and 5.6.1, casts a spotlight on the critical vulnerabilities in open-source software supply chains. This event not only highlights the potential risks to internet security but also emphasizes the importance of community collaboration, vigilance, and rapid response mechanisms in the cybersecurity domain. Through […]
The Big 3 Cyber Updates of March 2024
In the dynamic world of cybersecurity, staying ahead means being well-informed about the latest developments. As digital technologies weave deeper into our lives, so does the sophistication of cyber threats. This month’s update from Black Rock Engineering & Technology dives into the latest cybersecurity challenges. We’re examining everything from advanced phishing techniques exploiting software vulnerabilities […]
The Recent Cyberattack on UnitedHealth’s Optum
In late February 2024, the healthcare sector faced a formidable challenge when UnitedHealth Group’s subsidiary, Optum, was targeted by a sophisticated cyberattack. This incident, attributed to the notorious BlackCat ransomware group, disrupted the operations of Change Healthcare, a major platform used across the United States for billing and insurance verification processes. This attack not only […]
Navigating the ConnectWise Vulnerability and What can we Learn?
Understanding the Risks: Recent analyses have unveiled critical security vulnerabilities within ConnectWise’s ScreenConnect software. Identified as technical flaws in the software’s architecture, these vulnerabilities could potentially empower unauthorized entities to circumvent traditional authentication processes or explore the software’s directory beyond intended boundaries. Essentially, this means hackers could infiltrate systems utilizing ScreenConnect without undergoing standard security […]