LONDON, Oct 12 (Reuters)CMA CGM, the world’s fourth-largest container shipping group, said it has restored its online business services after a cyber attack last month paralysed activity.

France-based CMA CGM first reported the incident on Sept 28, saying it had shut down access to its online services after malware targeted its peripheral servers.

“The CMA CGM Group’s e-commerce sites are once again live with all their main functionalities up and running,” the company said in a statement on Sunday. “Applications and essential functionalities are now operational and secured.”

In a separate incident, U.N. shipping agency the International Maritime Organization (IMO) said on Oct. 1 that its website and intranet had been disabled by a sophisticated cyber attack and its IT specialists had shut down key systems to prevent further damage.

The IMO resumed full services a week later and an IMO spokeswoman said it had thwarted cyber attacks

Read More

The chief executive of cyber fraud prevention company NS8 has been arrested and charged for defrauding the firm’s own investors. 

Adam Rogas was arrested in Las Vegas, Nevada, the US Department of Justice (DoJ) and US Securities and Exchange Commission (SEC) said on Thursday. 

The 43-year-old is the co-founder and CEO of startup NS8, an organization that touts an intelligence-driven platform for detecting fraud. However, according to US prosecutors, fraud has been taking place at the top level for some time. 

Rogas allegedly fabricated financial data and statements to make it appear that the company was generating substantial revenue from its clients. As the former CEO had access over a bank account used to deposit customer payments, he was able to tamper with bank statements before they were sent to the NS8 financial department for processing.

See also: Black Hat: When penetration testing earns you a felony arrest record

Together

Read More

The on-going shift to remote work will require more than just technology; cyber security training and awareness should remain key priorities, say tech-experts.

Conceding that the sudden shift to telework, practically overnight, had been a major challenge for more than 80 per cent of the organisations worldwide, particularly during the first half of 2020, experts pointed out that in addition to evolving remote work environment, increased reliance on personal device usage and overall influx of workers outside the corporate network, organisations had to protect the network from opportunistic phishers to scheming nation-state actors.

Threat Landscape Report

A recent FortiGuard Labs Global Threat Landscape Report revealed that 60 per cent of the organisations had reported an increase in cyber security breach attempts, while 34 per cent – of actual breaches in their networks.

 

And this was despite their investments in key technologies. Nearly 50 per cent of the enterprises surveyed had

Read More

Travel firms have failed to secure their websites from hackers despite previous cyberattacks, consumer group Which? has claimed.

Websites linked to Marriott, British Airways and easyJet were found to be vulnerable by its investigation. Each of the sites has previously been the subject of high-profile data breaches.

This research found hundreds of flaws linked to the three companies, Which? says, as well as on some domains linked to American Airlines and Lastminute.com.

The consumer group said it had looked at the security of websites operated by 98 travel companies – including airlines, tour operators, hotel chains and booking sites – examining cybersecurity on their main websites, and related sites, including promotional sites, spin-off business and employee log-in portals.

Almost 500 issues were found on sites linked to Marriott, with more than 100 judged to be high-risk or critical by Which? Marriott was

Read More

The Department of Homeland Security’s cyber agency warned Wednesday that a ‘malicious cyber actor’ is targeting a Small Business Administration (SBA) webpage used to funnel loans to businesses during the COVID-19 pandemic.



a screenshot of a computer: Federal agency warns 'malicious cyber actor' targeting coronavirus small business loan program


© iStock
Federal agency warns ‘malicious cyber actor’ targeting coronavirus small business loan program

“The Cybersecurity and Infrastructure Security Agency (CISA) is currently tracking an unknown malicious cyber actor who is spoofing the Small Business Administration (SBA) COVID-19 loan relief webpage via phishing emails,” CISA wrote in an alert published Wednesday. “These emails include a malicious link to the spoofed SBA website that the cyber actor is using for malicious re-directs and credential stealing.”

CISA noted that the emails are being sent to “various Federal Civilian Executive Branch and state, local, tribal, and territorial government recipients” under the subject line of “SBA Application–Review and Proceed,” with the sender using an SBA email address.

The malicious email directs

Read More