Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

admin
Pinned September 1, 2023

<> Embed

@  Email

Report

Uploaded by user
SEC: Public companies must report cyberattacks within four days
<> Embed @  Email Report

SEC: Public companies must report cyberattacks within four days

Microsoft confirms June Outlook and OneDrive outages were caused by DDoS attacks

 

Igor Bonifacic
Igor Bonifacic
 

Earlier this month, a group known as Anonymous Sudan took credit for a service outage that disrupted access to Outlook, OneDrive and a handful of other Microsoft online services. After initially sharing little information about the incident, the company confirmed late Friday it had been the target of a series of distributed denial-of-service attacks. In a blog post spotted by the Associated Press (via The Verge), Microsoft said the attacks “temporarily impacted” the availability of some services, adding they were primarily designed to generate “publicity” for a threat actor the company has dubbed Storm-1359. Under Microsoft’s threat actor naming convention, Storm is a temporary designator the company employs for groups whose affiliation it hasn’t definitively established yet.

“We have seen no evidence that customer data has been accessed or compromised,” the company said. In a statement Microsoft shared with the Associated Press, the tech giant confirmed Anonymous Sudan was responsible for the attacks. It’s not clear how many Microsoft customers were affected by the attacks, or if the impact was global. The company believes Storm-1359 likely relied on a combination of virtual private servers and rented cloud infrastructure to carry out its operation.

Per Bleeping Computer, Anonymous Sudan began carrying out cyberattacks at the start of 2023. At the time, the group claimed it was targeting countries that meddle in Sudanese politics and promote anti-Muslim policies. However, some cybersecurity researchers believe the group is in fact an offshoot of the Kremlin-affiliated Killnet gang, and the reference to Sudan is a false flag designed to mislead casual onlookers. The likelihood of that link became more apparent on Friday when Anonymous Sudan said it was forming a “Darknet Parliament” with Killnet and Revil, another pro-Russian gang. As a first order of business, the alliance threatened to target SWIFT, the international interbanking system the United States and European Union cut Russia off from in response to its invasion of Ukraine in early 2022.

SEC: Public companies must report cyberattacks within four days | DeviceDaily.com

Engadget is a web magazine with obsessive daily coverage of everything new in gadgets and consumer electronics   

(18)