CyberNews: Top of the News

Huawei Backdoors Confirmed in Vodaphone Documents(April 30, 2019)

Vodafone Group Plc has acknowledged that it found vulnerabilities going back years with equipment supplied by Shenzhen-based Huawei for the carrier’s Italian business. While Vodafone says the issues were resolved, the revelation may further damage the reputation of a major symbol of China’s global technology prowess. This is the first time such serious Huawei security issues have been made public.
: Vodafone Found Hidden Backdoors in Huawei Equipment

Maersk Head of Security on Lessons Learned from NotPetya(April 29, 2019)
 In late June 2017, international shipping container company Moller-Maersk was hit with the NotPetya malware. Speaking in a keynote session at CYBER UK 19, Maersk’s head of cybersecurity compliance said he was stunned by “the sheer ferocity and the speed and scale of the attack and the impact it had.” He said that the attack was a reminder that companies can become unintended victims, and that while it is important to protect systems and networks, companies also need to ensure that they have a solid recovery plan in place.

Read more in:
: Ransomware: The key lesson Maersk learned from battling the NotPetya attack

Greenville, North Carolina, Recovering from Ransomware(April 26, 2019)
 The city of Greenville, North Carolina is in the process of recovering from a ransomware attack that infected its systems on April 10. Officials say the city’s website is operational again and that some employees have email. The city said it never planned to pay the ransom. IT staff is reimaging all of the city’s computers.

Read more in:
: Greenville in recovery phase from Robbinhood ransomware attack
– City of Greenville bouncing back from ransomware attack

Cleveland Airport Malware Update(April 29, 2019)

Flight and baggage information monitors are once again operational at Cleveland’s Hopkins International Airport. Last week, city officials said that the problems were not caused by ransomware. At a press conference on Monday, April 29 Cleveland’s Chief Information Officer says that the malware that infected computers at the airport was indeed ransomware. Airport officials did not respond to the ransomware demands. The FBI is investigating.
Read more in:
: Cleveland acknowledges for first time Hopkins airport hack involved ransomware
– Flight screens working again at Cleveland Hopkins Airport after going dark amid malware discovery

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.