Connect with us

Innovation and Technology

Was Cisco Just Hit By Ransomware? What Happened And What To Do

Published

on

Was Cisco Just Hit By Ransomware? What Happened And What To Do

Cisco Breach — What Happened?

The reported Cisco breach came to light when ransomware outfit Kraken appeared to have published the leaked data on its dark web blog, according to the Cybersecurity News site. The adversaries also apparently left a threatening message on the site, indicating they had long-term access to Cisco’s network, according to the report.

Cisco’s Response

Cisco has not actually been breached by the ransomware gang — the leak is the result of an old incident that took place in 2022.

“Cisco is aware of certain reports regarding a security incident,” a spokesperson for the firm told me over email. “The incident referenced in the reports occurred back in May 2022, and we fully addressed it at that time. Based on our investigation, there was no impact to our customers.”

“More details about the incident and how we addressed it can be found in this blog post that Cisco Talos, our threat intelligence organization, published in August 2022,” the Cisco spokesperson added.

Cisco Data Leaked

The data apparently leaked by the ransomware gang is pretty sensitive, including usernames, security identifiers, and NTLM password hashes. It appeared to have been extracted from Cisco’s Windows Active Directory environment.

What Could Happen?

This sort of data could allow cybercriminals to do “a number of potentially damaging things,” says Jamie Akhtar, CEO and co-founder of CyberSmart. For example, the domain controller credentials could allow hackers to escalate privileges within Cisco’s network, access and steal sensitive data, and launch brute-force attacks, deploy malware, or set up further phishing scams.

What to Do

So this data is not from a new breach, but it highlights the need to deploy strong cybersecurity measures to counter it, says Akhtar.

He recommends regularly changing passwords, using MFA, monitoring data logs, and tightly controlling who has access to what.

While Cisco has not just been breached by ransomware operators, it’s also a good idea to make yourself as robust as possible in the face of data-locking malware. Ensure you have decent backups and that basic cybersecurity measures are in place.

Conclusion

The reported Cisco breach is actually an old incident that occurred in 2022. The data leaked by the ransomware gang is not new, but it highlights the importance of deploying strong cybersecurity measures to counter credential-based cyberattacks.

FAQs

Q: What happened in the reported Cisco breach?
A: The reported Cisco breach is actually an old incident that occurred in 2022, and the data leaked by the ransomware gang is not new.

Q: What kind of data was leaked?
A: The data apparently leaked by the ransomware gang includes usernames, security identifiers, and NTLM password hashes extracted from Cisco’s Windows Active Directory environment.

Q: What are the potential consequences of the leaked data?
A: The leaked data could allow cybercriminals to do “a number of potentially damaging things,” such as escalating privileges, accessing and stealing sensitive data, launching brute-force attacks, deploying malware, or setting up further phishing scams.

Q: What should I do to protect myself from data-locking malware?
A: Ensure you have decent backups and that basic cybersecurity measures are in place. Regularly change your passwords, use MFA, monitor data logs, and tightly control who has access to what.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Innovation and Technology

Underestimating China’s Competitors

Published

on

Underestimating China’s Competitors

The Risks of Underestimating Competition from China

A Growing Economic Powerhouse

China has become a significant player in the global economy, with its GDP growing from $4.6 trillion in 2004 to over $13.6 trillion in 2020. This rapid growth has led to increased global trade and investment, making China a major competitor in various industries. However, many companies and countries are still underestimating the risks associated with doing business with China.

Risks of Underestimation

Insufficient Research and Analysis

Many companies fail to conduct thorough research on the Chinese market, leading to a lack of understanding of local business practices, regulations, and cultural nuances. This can result in costly mistakes, such as misjudging local competition, underestimating market size, or failing to comply with regulations.

Inadequate Protection of Intellectual Property

China has a history of intellectual property theft and counterfeiting. Companies may underestimate the risk of their intellectual property being stolen or copied, leading to significant financial losses and damage to their brand reputation.

Dependence on a Single Market

Companies may underestimate the risks of relying too heavily on a single market, in this case, China. A significant portion of their revenue comes from China, making them vulnerable to fluctuations in the Chinese market, trade tensions, or economic downturns.

Over-Reliance on Local Partners

Companies may underestimate the risks of over-relying on local partners or middlemen in China. This can lead to a lack of control over the supply chain, inadequate quality control, and potential corruption.

Consequences of Underestimation

Financial Losses

Underestimating the risks of doing business in China can result in significant financial losses due to intellectual property theft, mismanagement, or misjudging the market.

Reputation Damage

A failure to comply with local regulations or protect intellectual property can damage a company’s reputation, leading to a loss of customer trust and potential brand collapse.

Supply Chain Disruptions

Dependence on a single market or over-reliance on local partners can lead to supply chain disruptions, resulting in delayed production, increased costs, or even product recalls.

Conclusion

In conclusion, underestimating the risks of doing business with China can have severe consequences for companies and countries. It is essential to conduct thorough research, protect intellectual property, diversify supply chains, and maintain a strong presence in the market. By acknowledging the risks and taking proactive measures, companies can minimize the potential pitfalls and capitalize on the opportunities presented by the Chinese market.

FAQs

Q: What are the most common risks associated with doing business in China?
A: The most common risks include intellectual property theft, misjudging the market, over-reliance on local partners, and underestimating the competition.

Q: How can companies protect themselves from these risks?
A: Companies can protect themselves by conducting thorough research, diversifying their supply chains, protecting intellectual property, and maintaining a strong presence in the market.

Q: What are the consequences of underestimating the risks of doing business in China?
A: The consequences of underestimating the risks of doing business in China can include financial losses, reputation damage, and supply chain disruptions.

Continue Reading

Innovation and Technology

Trust, But Verify the Data Feeding Your AI Systems

Published

on

Trust, But Verify the Data Feeding Your AI Systems

The Backbone of AI: Data

The Challenge of Data Quality and Reliability

Artificial intelligence is only as good as the data behind it — and that’s a big problem. A recent survey shows that only about half of executives believe their data is ready to meet the demands of AI.

Data Concerns

More than half of executives with companies adopting AI, 54%, are worried about the reliability and quality of their data, according to a survey by Dun & Bradstreet. Other concerns include data security (46%), data privacy violations (43%), sensitive or proprietary information disclosure (42%), and data’s amplification of bias (26%).

Data Quality and Timeliness

Data quality, timelines, and consistency have been slowing down technology progress for decades — since business intelligence tools emerged in the 1980s, to the data analytics revolution in the early 2000s, to today’s AI activity.

The Importance of Trustworthy Data

Observers across the industry agree that actionable data is still too few and far between for the AI world. As a result, trust is lacking in today’s AI projects. "Organizations don’t have enough visibility into their data — even with the basics of who owns it, its source, or who has modified it," said Kunju Kashalikar, senior director of product management with Pentaho.

Security Implications

Untrustworthy data "means possibly feeding proprietary or biased data into machine models, likely breaching IP and data protection rules," said Kashalikar. "It also makes it difficult to establish accountability for regulatory compliance. Data must be catalogued at the source with easily understandable terminology so it can flow through various projects like AI with the ability to have streamlined discovery."

The Need for Integrated Data

AI-based applications "cannot be implemented securely without knowledge of proper access controls applied to the data in question," said David Brauchler, technical director at NCC Group. "The quality, quantity, and nature of data are all paramount. For training purposes, data quality and quantity have a direct impact on the resultant model."

The Road to Success

To move forward with AI, it’s critical that data is well-prepared and integrated, said Mary Hamilton, managing director and global lead for Accenture’s Innovation Center Network. "This includes making all relevant data accessible to AI agents in real-time, including unstructured data, through APIs or microservices." She emphasized the need for seamless and integrated data environments to achieve the full potential of AI.

Conclusion

In conclusion, the quality and reliability of data are critical components for the success of AI. As the industry continues to advance, it’s essential to prioritize the development of trustworthy and integrated data systems to ensure the reliability and effectiveness of AI applications.

FAQs

  • What is the main challenge in AI development?
    • The main challenge in AI development is the quality and reliability of data.
  • What are the concerns of executives regarding AI?
    • The concerns of executives regarding AI include data security, data privacy violations, sensitive or proprietary information disclosure, and data’s amplification of bias.
  • How can organizations ensure the success of AI projects?
    • Organizations can ensure the success of AI projects by prioritizing the development of trustworthy and integrated data systems.
  • What is the importance of data integration in AI?
    • Data integration is crucial for achieving the full potential of AI, as it enables the seamless and real-time exchange of data between systems and applications.
Continue Reading

Innovation and Technology

Twitter’s Cofounder on Creating Opportunities

Published

on

Twitter’s Cofounder on Creating Opportunities

Creating Opportunities: A Conversation with Twitter’s Cofounder

From Maverick to Mogul

Jack Dorsey, one of the co-founders of Twitter, has always been a trailblazer. He co-founded the microblogging platform in 2006, revolutionizing the way people share information and connect with each other. As the company grew, so did Dorsey’s influence. He became a symbol of innovation and entrepreneurship, inspiring a new generation of start-up founders and entrepreneurs.

Achieving the Impossible

Dorsey’s path to success was not without its challenges. He dropped out of college, and his early attempts at starting businesses failed. However, he never gave up. He continued to experiment, learning from his mistakes, and refining his ideas. In 2006, he co-founded Twitter with Evan Williams, Noah Glass, and Biz Stone, and the rest, as they say, is history.

The Power of Failure

Dorsey believes that failure is an essential part of the learning process. He has often spoken about the importance of embracing failure, using it as an opportunity to learn and improve. “If you’re not failing, you’re not trying hard enough,” he has said. This philosophy has guided his approach to business and life, helping him to develop a resilience and resourcefulness that has served him well.

Creating Opportunities

Dorsey’s approach to creating opportunities is two-fold. First, he believes in taking calculated risks. He is willing to venture into the unknown, even if it means facing uncertainty and failure. Second, he is a strong believer in the power of collaboration. He has always surrounded himself with talented individuals who share his vision and are willing to work together to achieve a common goal.

The Future of Opportunity

As Twitter’s co-founder, Dorsey has had a front-row seat to the evolution of the internet and social media. He has witnessed the rise of new technologies and platforms, and has been at the forefront of innovation. His vision for the future is one of continued disruption, where technology empowers individuals and communities to create new opportunities and connections.

Frequently Asked Questions

* What inspired you to start Twitter?
+ I was inspired by the concept of a real-time, global conversation. I wanted to create a platform where people could share their thoughts and connect with each other.
* How do you approach risk-taking?
+ I believe in taking calculated risks. I’m willing to venture into the unknown, but I also do my research and prepare for the potential outcomes.
* What advice would you give to aspiring entrepreneurs?
+ I would say that failure is a natural part of the process. Don’t be afraid to take risks, and don’t be discouraged by setbacks. Keep pushing forward, and always be open to learning and improving.

Continue Reading
Advertisement

Our Newsletter

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Trending