Innovation and Technology
Was Cisco Just Hit By Ransomware? What Happened And What To Do

Cisco Breach — What Happened?
The reported Cisco breach came to light when ransomware outfit Kraken appeared to have published the leaked data on its dark web blog, according to the Cybersecurity News site. The adversaries also apparently left a threatening message on the site, indicating they had long-term access to Cisco’s network, according to the report.
Cisco’s Response
Cisco has not actually been breached by the ransomware gang — the leak is the result of an old incident that took place in 2022.
“Cisco is aware of certain reports regarding a security incident,” a spokesperson for the firm told me over email. “The incident referenced in the reports occurred back in May 2022, and we fully addressed it at that time. Based on our investigation, there was no impact to our customers.”
“More details about the incident and how we addressed it can be found in this blog post that Cisco Talos, our threat intelligence organization, published in August 2022,” the Cisco spokesperson added.
Cisco Data Leaked
The data apparently leaked by the ransomware gang is pretty sensitive, including usernames, security identifiers, and NTLM password hashes. It appeared to have been extracted from Cisco’s Windows Active Directory environment.
What Could Happen?
This sort of data could allow cybercriminals to do “a number of potentially damaging things,” says Jamie Akhtar, CEO and co-founder of CyberSmart. For example, the domain controller credentials could allow hackers to escalate privileges within Cisco’s network, access and steal sensitive data, and launch brute-force attacks, deploy malware, or set up further phishing scams.
What to Do
So this data is not from a new breach, but it highlights the need to deploy strong cybersecurity measures to counter it, says Akhtar.
He recommends regularly changing passwords, using MFA, monitoring data logs, and tightly controlling who has access to what.
While Cisco has not just been breached by ransomware operators, it’s also a good idea to make yourself as robust as possible in the face of data-locking malware. Ensure you have decent backups and that basic cybersecurity measures are in place.
Conclusion
The reported Cisco breach is actually an old incident that occurred in 2022. The data leaked by the ransomware gang is not new, but it highlights the importance of deploying strong cybersecurity measures to counter credential-based cyberattacks.
FAQs
Q: What happened in the reported Cisco breach?
A: The reported Cisco breach is actually an old incident that occurred in 2022, and the data leaked by the ransomware gang is not new.
Q: What kind of data was leaked?
A: The data apparently leaked by the ransomware gang includes usernames, security identifiers, and NTLM password hashes extracted from Cisco’s Windows Active Directory environment.
Q: What are the potential consequences of the leaked data?
A: The leaked data could allow cybercriminals to do “a number of potentially damaging things,” such as escalating privileges, accessing and stealing sensitive data, launching brute-force attacks, deploying malware, or setting up further phishing scams.
Q: What should I do to protect myself from data-locking malware?
A: Ensure you have decent backups and that basic cybersecurity measures are in place. Regularly change your passwords, use MFA, monitor data logs, and tightly control who has access to what.
Innovation and Technology
Underestimating China’s Competitors

The Risks of Underestimating Competition from China
A Growing Economic Powerhouse
China has become a significant player in the global economy, with its GDP growing from $4.6 trillion in 2004 to over $13.6 trillion in 2020. This rapid growth has led to increased global trade and investment, making China a major competitor in various industries. However, many companies and countries are still underestimating the risks associated with doing business with China.
Risks of Underestimation
Insufficient Research and Analysis
Many companies fail to conduct thorough research on the Chinese market, leading to a lack of understanding of local business practices, regulations, and cultural nuances. This can result in costly mistakes, such as misjudging local competition, underestimating market size, or failing to comply with regulations.
Inadequate Protection of Intellectual Property
China has a history of intellectual property theft and counterfeiting. Companies may underestimate the risk of their intellectual property being stolen or copied, leading to significant financial losses and damage to their brand reputation.
Dependence on a Single Market
Companies may underestimate the risks of relying too heavily on a single market, in this case, China. A significant portion of their revenue comes from China, making them vulnerable to fluctuations in the Chinese market, trade tensions, or economic downturns.
Over-Reliance on Local Partners
Companies may underestimate the risks of over-relying on local partners or middlemen in China. This can lead to a lack of control over the supply chain, inadequate quality control, and potential corruption.
Consequences of Underestimation
Financial Losses
Underestimating the risks of doing business in China can result in significant financial losses due to intellectual property theft, mismanagement, or misjudging the market.
Reputation Damage
A failure to comply with local regulations or protect intellectual property can damage a company’s reputation, leading to a loss of customer trust and potential brand collapse.
Supply Chain Disruptions
Dependence on a single market or over-reliance on local partners can lead to supply chain disruptions, resulting in delayed production, increased costs, or even product recalls.
Conclusion
In conclusion, underestimating the risks of doing business with China can have severe consequences for companies and countries. It is essential to conduct thorough research, protect intellectual property, diversify supply chains, and maintain a strong presence in the market. By acknowledging the risks and taking proactive measures, companies can minimize the potential pitfalls and capitalize on the opportunities presented by the Chinese market.
FAQs
Q: What are the most common risks associated with doing business in China?
A: The most common risks include intellectual property theft, misjudging the market, over-reliance on local partners, and underestimating the competition.
Q: How can companies protect themselves from these risks?
A: Companies can protect themselves by conducting thorough research, diversifying their supply chains, protecting intellectual property, and maintaining a strong presence in the market.
Q: What are the consequences of underestimating the risks of doing business in China?
A: The consequences of underestimating the risks of doing business in China can include financial losses, reputation damage, and supply chain disruptions.
Innovation and Technology
Trust, But Verify the Data Feeding Your AI Systems

The Backbone of AI: Data
The Challenge of Data Quality and Reliability
Artificial intelligence is only as good as the data behind it — and that’s a big problem. A recent survey shows that only about half of executives believe their data is ready to meet the demands of AI.
Data Concerns
More than half of executives with companies adopting AI, 54%, are worried about the reliability and quality of their data, according to a survey by Dun & Bradstreet. Other concerns include data security (46%), data privacy violations (43%), sensitive or proprietary information disclosure (42%), and data’s amplification of bias (26%).
Data Quality and Timeliness
Data quality, timelines, and consistency have been slowing down technology progress for decades — since business intelligence tools emerged in the 1980s, to the data analytics revolution in the early 2000s, to today’s AI activity.
The Importance of Trustworthy Data
Observers across the industry agree that actionable data is still too few and far between for the AI world. As a result, trust is lacking in today’s AI projects. "Organizations don’t have enough visibility into their data — even with the basics of who owns it, its source, or who has modified it," said Kunju Kashalikar, senior director of product management with Pentaho.
Security Implications
Untrustworthy data "means possibly feeding proprietary or biased data into machine models, likely breaching IP and data protection rules," said Kashalikar. "It also makes it difficult to establish accountability for regulatory compliance. Data must be catalogued at the source with easily understandable terminology so it can flow through various projects like AI with the ability to have streamlined discovery."
The Need for Integrated Data
AI-based applications "cannot be implemented securely without knowledge of proper access controls applied to the data in question," said David Brauchler, technical director at NCC Group. "The quality, quantity, and nature of data are all paramount. For training purposes, data quality and quantity have a direct impact on the resultant model."
The Road to Success
To move forward with AI, it’s critical that data is well-prepared and integrated, said Mary Hamilton, managing director and global lead for Accenture’s Innovation Center Network. "This includes making all relevant data accessible to AI agents in real-time, including unstructured data, through APIs or microservices." She emphasized the need for seamless and integrated data environments to achieve the full potential of AI.
Conclusion
In conclusion, the quality and reliability of data are critical components for the success of AI. As the industry continues to advance, it’s essential to prioritize the development of trustworthy and integrated data systems to ensure the reliability and effectiveness of AI applications.
FAQs
- What is the main challenge in AI development?
- The main challenge in AI development is the quality and reliability of data.
- What are the concerns of executives regarding AI?
- The concerns of executives regarding AI include data security, data privacy violations, sensitive or proprietary information disclosure, and data’s amplification of bias.
- How can organizations ensure the success of AI projects?
- Organizations can ensure the success of AI projects by prioritizing the development of trustworthy and integrated data systems.
- What is the importance of data integration in AI?
- Data integration is crucial for achieving the full potential of AI, as it enables the seamless and real-time exchange of data between systems and applications.
Innovation and Technology
Twitter’s Cofounder on Creating Opportunities

Creating Opportunities: A Conversation with Twitter’s Cofounder
From Maverick to Mogul
Jack Dorsey, one of the co-founders of Twitter, has always been a trailblazer. He co-founded the microblogging platform in 2006, revolutionizing the way people share information and connect with each other. As the company grew, so did Dorsey’s influence. He became a symbol of innovation and entrepreneurship, inspiring a new generation of start-up founders and entrepreneurs.
Achieving the Impossible
Dorsey’s path to success was not without its challenges. He dropped out of college, and his early attempts at starting businesses failed. However, he never gave up. He continued to experiment, learning from his mistakes, and refining his ideas. In 2006, he co-founded Twitter with Evan Williams, Noah Glass, and Biz Stone, and the rest, as they say, is history.
The Power of Failure
Dorsey believes that failure is an essential part of the learning process. He has often spoken about the importance of embracing failure, using it as an opportunity to learn and improve. “If you’re not failing, you’re not trying hard enough,” he has said. This philosophy has guided his approach to business and life, helping him to develop a resilience and resourcefulness that has served him well.
Creating Opportunities
Dorsey’s approach to creating opportunities is two-fold. First, he believes in taking calculated risks. He is willing to venture into the unknown, even if it means facing uncertainty and failure. Second, he is a strong believer in the power of collaboration. He has always surrounded himself with talented individuals who share his vision and are willing to work together to achieve a common goal.
The Future of Opportunity
As Twitter’s co-founder, Dorsey has had a front-row seat to the evolution of the internet and social media. He has witnessed the rise of new technologies and platforms, and has been at the forefront of innovation. His vision for the future is one of continued disruption, where technology empowers individuals and communities to create new opportunities and connections.
Frequently Asked Questions
* What inspired you to start Twitter?
+ I was inspired by the concept of a real-time, global conversation. I wanted to create a platform where people could share their thoughts and connect with each other.
* How do you approach risk-taking?
+ I believe in taking calculated risks. I’m willing to venture into the unknown, but I also do my research and prepare for the potential outcomes.
* What advice would you give to aspiring entrepreneurs?
+ I would say that failure is a natural part of the process. Don’t be afraid to take risks, and don’t be discouraged by setbacks. Keep pushing forward, and always be open to learning and improving.
-
Career Advice2 months ago
Interview with Dr. Kristy K. Taylor, WORxK Global News Magazine Founder
-
Diversity and Inclusion (DEIA)2 months ago
Sarah Herrlinger Talks AirPods Pro Hearing Aid
-
Career Advice2 months ago
NetWork Your Way to Success: Top Tips for Maximizing Your Professional Network
-
Diversity and Inclusion (DEIA)2 months ago
The Power of Belonging: Why Feeling Accepted Matters in the Workplace
-
Changemaker Interviews2 months ago
Unlocking Human Potential: Kim Groshek’s Journey to Transforming Leadership and Stress Resilience
-
Global Trends and Politics2 months ago
Health-care stocks fall after Warren PBM bill, Brian Thompson shooting
-
Global Trends and Politics2 months ago
Unionization Goes Mainstream: How the Changing Workforce is Driving Demand for Collective Bargaining
-
Training and Development2 months ago
Level Up: How Upskilling Can Help You Stay Ahead of the Curve in a Rapidly Changing Industry