(844) 627-8267
(844) 627-8267

iTWire – Panasonic allegedly breached | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


Another day, another major company breached. The ransomware group Akira alleges to have stolen projects, contracts, and other confidential information.

The dark web announcement was picked up immediately by eagle-eyed Sustainibil.IT founder and CEO Caity Randall who noted that Australia “seems to be quite the target of late.”

Randall is also an ANZ Senior Fellow for the Cyber Security Forum Initiative.



“This incident highlights the critical importance of investing in advanced threat intelligence and detection technologies – Australia is quickly becoming a considerable target for malicious actors. At Sustainabil.IT, we advocate for proactive cyber security strategies that not only mitigate risks but also deliver measurable ROI,” Randall said.

“For instance, technologies like SentinelOne XDR can effectively detect and respond to threats such as Akira ransomware. Additionally, using threat intelligence platforms like Flashpoint can significantly reduce risk and enhance protection.”

“Instead of succumbing to fear, businesses should leverage these advanced tools and conduct regular security reviews. With proper planning and proactive approaches, we can turn this evolving threat landscape challenge into an opportunity to strengthen our defences and ensure a safer digital future.”

In their dark web post, Akira claims to have breached Panasonic’s cybersecurity, and says the group is going to share the files it has stolen, with information about projects and confidential agreements, among other data. The group indicated it is going to come up with a catchy name for the dump and then make it available for downloading.

At the time of writing Panasonic is yet to make an official comment. The situation is only just developing and iTWire will continue to update the news.

According to cybersecurity company Sentinel One’s writeup on Akira, “actors behind Akira practice multi-extortion tactics and host a TOR-based (.onion) website where victims are listed along with any stolen data should a victim fail to comply with the ransom demands. Victims are instructed to contact the attacker via their TOR-based portal (.onion) where they enter a unique identifier provided in the ransom note they receive to begin the negotiation process. The group is known to require outrageous ransom payments, reaching hundreds of millions of dollars.”

 

IDC WHITE PAPER: The Business Value of Aiven Data Cloud Solutions

According to IDC, Aiven enables your teams to perform more efficiently, reduce direct infrastructure costs, and provide improved database performance, agility and scalability.

Find out how Aiven makes teams 48% more efficient, allowing staff to focus on high-value activities that drive real business results:

340% 3-year ROI – break even in 5 months (average)

37% lower 3-year cost of operations

78% reduction in staff time for database deployments

Download the IDC White Paper now


DOWNLOAD WHITE PAPER!

PROMOTE YOUR WEBINAR ON ITWIRE

It’s all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


MORE INFO HERE!

——————————————————–


Click Here For The Original Source.

.........................

National Cyber Security

FREE
VIEW