CVSS 9.8 - CVE-2021-27877: SHA-based authentication is no longer used in Veritas Backup Exec software, but hasn't been disabled, and an attacker could remotely exploit it to gain access to an agent and execute privileged commands. ![]() CVSS 8.8 - multiple CVEs: Several models of Korenix Jetwave industrial switches contain command injection vulnerabilities that could give a remote attacker control of the switches OSes and cause a denial-of-serviceĪnd those Veritas vulnerabilities being exploited in the wild:.CVSS 9.1 - CVE-2022-25359: Several versions of ScadaFlex II SCADA Controllers contain a software vulnerability that could allow an unauthenticated remote attacker to overwrite, delete or create files.CVSS 9.8 - CVE-2020-6967: Rockwell Automation says all versions of its FactoryTalk Diagnostics software contain a deserialization bug that could let an attacker execute arbitrary commands.CVSS 9.9 - multiple CVEs: mySCADA myPRO software contains vulnerabilities that could allow an authenticated user to inject arbitrary commands.CVSS 9.9 out of 10 in severity - multiple CVEs: A series of vulnerabilities in Hitachi Energy MicroSCADA SDM600 software could allow a remote attacker to take control over affected products.The organization said it “does not expect this event to have a material adverse impact on its business, operations or financial results”.It was all quiet on the critical vulnerability front for most of this past week, though the US government's CISA body changed all that with a pair of alerts, then a bunch of serious ICS issues showed up, and the pre-Easter week finished with a trio of Veritas backup bugs that are being exploited in the wild.įirst, the new industrial control system threats: In a report filed with the US Securities and Exchange Commission regarding the attack, Yum! Brands said that it had “incurred, and may continue to incur, certain expenses related to this attack including expenses to respond to, remediate and investigate this matter”. We have no indication that customer information was impacted.” We are in the process of sending individual notifications and are offering complimentary monitoring and protection services. In a notice of the breach sent to those affected, Yum! Brands said there was “no evidence of identity theft or fraud” being committed with the stolen data.Ī Yum! Brands spokesperson said to Cyber Security Hub: “In the course of our forensic review and investigation, we identified some personal information belonging to employees was exposed during the January 2023 cyber security incident. The data stolen in the breach includes the names and ID card numbers of some employees including driver license numbers. ![]() It determined that the files accessed by the malicious actor during the cyber attack contained private employee data. Once discovered, Yum! Brands said the attack “took steps to lockdown impacted systems, notified federal law enforcement authorities, worked with leading digital forensics and restoration teams to investigate and recover from the incident and deployed enhanced 24/7 detection and monitoring technology”.Īfter the incident was contained, the fast-food corporation initiated an investigation into the attack to see if any personal data had been stolen. The ransomware attack resulted in approximately 300 restaurants within the UK being temporarily shut down due to the IT systems affected by the attack. The cyber attack, which took place on January 18, 2023, involved a malicious actor gaining unauthorized access to Yum! Brands’ network. ![]() US fast-food corporation Yum! Brands, which owns franchises including KFC, Pizza Hut and Taco Bell, has suffered a data breach following a ransomware attack. Note: This article was updated on April 12, 2023, to reflect the fact that employee data, not customer data, was accessed during the cyber attack against Yum! Brands
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |