Major brands face the “dangerous” cybersecurity landscape and growing threats, experts warn


Organizations that do not adapt to “dangerous” Cybersecurity situation According to Cloud Security Company CEO Aviatrix Doug Merritt, they are ambushed “by blind spots across the network.”

Recent attacks on major brands such as AT&T, the North Face and Cartier highlight what cybercriminals can do today.

Amy Bunn, an online safety advocate for computer security firm McAfee, described attacks on major service providers such as airlines and insurance companies as “a clear reminder of how prolific and sophisticated today’s cyber attacks are.”

Hawaiian Airlines

Hawaiian Airlines was hit by a cyber attack in late June. (Kevin Carter/Getty Images/Getty Images)

Cyber Attacks have hit major airlines, with up to 6 million customer profiles published

Van said the airline is a “major target” given the vast amount of confidential information stored in one place, but all industries are vulnerable.

“From healthcare and finance to retail and technology, attackers are always looking for weak spots to use, knowing how valuable consumer data is,” says Bunn. “Cybercriminals can also use this treasury of information to impersonate people, commit fraud with stolen identities, or to package and sell personal data on the dark web into the highest bidder.”

Hawaiian Airlines and Australian carrier Qantas were hit by various cyberattacks within a week of each other. Hawaiians were hits at the end of June, followed by Qantas in early July.

Qantas Boeing 737

Qantas Boeing 737 plane sits at Sydney Airport’s domestic terminal on a rainy day. (David Gray/AFP via Getty Images/Getty Images)

The attack came at the same time that the FBI posted to X that the cybercriminal group “scattered spiders” “expanding their targets to include the airline sector.”

Also, AFLAC warned last month that bad actors may have stolen personal data from US customers after insurance providers were the latest hit with ongoing Hacking Spree. It is targeted at the insurance industry.

Merritt says the heart of the issue is cloud security, and he said he is “a fundamental paradigm shift that most organizations don’t fully recognize.”

The infamous hacker group sets sights for the aviation industry in amazing security threats

today, Hackers have more ways to do it According to Merritt, it penetrates the network.

Previously, most of the data remained within a secure company network. Now data travels across the open internet. In other words, Merritt said there is an opportunity for hackers to intercept it, adding that many organizations are publicly exposing 50% to 80% of their systems “due to the inability to properly protect crowd workload communications.”

The issue stems from three important changes in how computing works today, Merritt said. For example, he said that when a corporate app pulls something out of the cloud, it uses the public internet rather than a controlled private network.

Fake HTML pages and hacker programs are typing on a computer while the man is seen on the screen in front of him.

hacker (Annette Riedl / Picture Alliance by Getty Images / Getty Images)

The traditional security perimeters have not disappeared. But instead of protecting some entry points, Merritt said companies face thousands or hundreds of thousands of entry points, many of which are connected to the internet and could be intercepted by hackers.

“This means that if you want to go ahead with the bad actors trying to take advantage of the weaknesses of cloud security, a new battlefield organization will need to cross,” Merritt said.

This underscores why it is important to ensure that consumers are taking steps to protect themselves, Bunn identified.Keep it safe online It’s not just going to a company. ”

Click here to get your Fox business on the go

“Even if the violation is not directly affected, the data can still be published and used in phishing scams and identity theft,” Bunn said.

To avoid this, Bunn suggested that consumers use strong, unique passwords and turn on two-factor authentication if possible. It is also important to note that you will be involved in unexpected texts and emails requesting personal information and use tools that will help you find high-risk links and messages before causing harm.

Leave a Reply

Your email address will not be published. Required fields are marked *