Everything to Know About Essendant’s Multi-Day Outage

Essendant, a Staples-owned wholesale distributor of office supplies and stationery, paused its operations recently because of a multi-day, network-wide outage. The system disruption has prevented customers from placing orders online or contacting the company’s customer care unit. While Essendant has yet to disclose the reason behind the outage, many think someone had hacked into the company’s system. Customers are expressing their frustration over the company's lack of transparency. Essendant's Outage Is Preventing Fulfillment of Orders

Microsoft Patch Tuesday

Microsoft released on March 14, 2023, a security update that fixes at least 74 bugs in Windows and other software. Hackers are already attacking two flaws, including a very serious one in Microsoft Outlook. Microsoft Outlook Vulnerability The Outlook bug, CVE-2023-23397, affects all versions of Microsoft Outlook from 2013 to the most recent one. Microsoft said that threat actors are taking advantage of this bug. It starts working automatically when a malicious email goes to an email server, even before it appears in the Preview Pane.

Hiatus Malware Targets Business Routers

There is a new malware campaign targeting business-grade routers. It is called Hiatus, a complex operation that deploys the HiatusRAT malware. It is a kind of Remote Access Trojan (RAT) that cybercriminals use to gain remote control over a target system. Hiatus is the first of its kind. Lumen's security experts say it has been around since July 2022 and is still active. It gives business owners another reason to tighten cybersecurity.

Cerebral Data Breach – 3.18 Million Affected

Cerebral, an online platform that offers mental health care services, recently suffered a data breach that may have affected up to 3.18 million users. According to its report, the breach was due to the company’s use of third-party pixel trackers. Cerebral did not say the exact number of users affected. However, the company said it had taken steps to ease the breach’s impact. What Exactly Are Tracking Pixels? Tracking pixels are tiny pieces of code that businesses can embed on their websites, online ads, or marketing emails.

Reduce the Risk of Business Email Compromise Attacks

Email threats have been around since the early 90s. But phishing techniques are much more sophisticated now than they were back then. One of the most successful and lucrative tactics is business email compromise (BEC). BEC scams have stolen over $43 billion from businesses worldwide between July 2019 and December 2021. Threat actors are making more money from it than ransomware. It's not enough to have a simple email security solution in place.

Maintain Customer Trust By Scaling Up IT Systems

Every business owner knows that forming a strong relationship with customers is essential to succeed. And two important elements of this relationship are positive customer experience and customer trust. Having these will help you bring in new customers and repeat or loyal customers. With businesses relying more on computer systems for various functions, data breaches have become one of the leading threats to customer trust and confidence. As such, you have to make sure that your IT system is protected from security attacks.

Hatch Bank Falls Victim to Data Breach

Hatch Bank confirmed a data breach that compromised its customers' personal data. The financial technology firm said hackers found a vulnerability in its internal file-transfer software. This allowed the hackers to access and steal around 140,000 customer names and social security numbers from Jan. 30-31, 2023. Hatch is using Fortra's GoAnywhere file-transfer platform. Many other large businesses also use GoAnywhere to share sensitive files. Hatch Bank Left in the Dark About Software’s Vulnerability

Chick-fil-A Confirms Credential Stuffing Attack

Credential stuffing is one of the many forms of cyberattacks on the rise. It's a low-risk, low-cost automated method. It uses bots to access username-password combinations from past data breaches. It then uses that information to exfiltrate data from a new target system. It relies on people's habit of reusing the same login credential across various sites. Chick-fil-A is one of the most recent victims of a credential stuffing attack.

US Government: Royal Ransomware Targets Critical Infrastructure

The United States government is alerting organizations about the Royal ransomware operation. The Federal Bureau of Investigation (FBI) and the Cybersecurity & Infrastructure Security Agency (CISA) said in a joint advisory that the Royal ransomware gang poses an increasing threat to critical infrastructure of numerous sectors in the U.S. The Royal ransomware group has been targeting different sectors across the country and abroad. Among its victims are health care, education, communications, and manufacturing organizations.

How to Protect Your Organization From Callback Phishing

Callback phishing scams are one of the worst cyberattacks you can encounter. It is devastating to experience on a personal level. But it is even more disastrous if it happens to your organization. To help you, here is a guide covering how callback phishing works and the steps you should take to address it. How Does Callback Phishing Work? A callback phishing attack usually starts with the victim receiving an email.

Contact

Network Revolution

Social Media