{"id":29385,"date":"2019-11-01T06:00:07","date_gmt":"2019-11-01T12:00:07","guid":{"rendered":"https://www.webroot.com/blog/?p=29385"},"modified":"2019-10-31T15:08:55","modified_gmt":"2019-10-31T21:08:55","slug":"cyber-news-rundown-bed-bath-beyond-data-breach","status":"publish","type":"post","link":"https://www.webroot.com/blog/2019\/11\/01\/cyber-news-rundown-bed-bath-beyond-data-breach\/","title":{"rendered":"Cyber News Rundown: Bed, Bath, &#038; Beyond Data Breach"},"content":{"rendered":"\n<h2>Bed, Bath, &amp; Beyond Data Breach<\/h2>\n\n\n\n<p>An official announcement made earlier this week acknowledged\nillicit access to customer data used in online accounts for <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bed-bath-and-beyond-discloses-customer-login-credentials-breach\/\">Bed,\nBath, &amp; Beyond<\/a>. While the breach didn\u2019t affect payment card\ninformation, the retailer quickly began contacting affected customers and took\nsteps to safeguard against future incidents. <\/p>\n\n\n\n<h2>Johannesburg Shutdown After Cyber Attack<\/h2>\n\n\n\n<p>Three months after a cyber attack hit <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/10\/johannesburgs-network-shut-down-after-second-attack-in-3-months\/\">Johannesburg<\/a>,\nSouth Africa, the city is once again dealing with network outages. After a\nransom note was posted to several social media outlets, city officials are\nstill attempting to downplay the attacks by claiming they purposefully took\ndown the sites rather than them being ransomed by hackers. In addition to the ransom\nnote, hackers also posted screenshots proving their control over the city\u2019s\nnetwork systems and their expectation of payment. <\/p>\n\n\n\n<h2>UniCredit Financial Data Leak<\/h2>\n\n\n\n<p>Officials working for <a href=\"https:\/\/www.helpnetsecurity.com\/2019\/10\/28\/unicredit-data-compromised\/\">UniCredit<\/a>,\nan Italian banking firm, announced that unauthorized access to their systems\nhas left the sensitive information of nearly 3 million Italian exposed. Fortunately,\nthe stolen information did not include any financial data, but did contain personally\nidentifiable information such as names and contact details. It is unclear how hackers\ngained access to the data, though it appears the data may have even been taken\nyears earlier in prior security breaches faced by the firm. <\/p>\n\n\n\n<h2>Ransomware Shuts Down New Mexico School District<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-attack-causes-school-district-wide-shutdown\/\">Las\nCruces Public Schools<\/a>, a New Mexico school district, was forced to take\ntheir entire system offline following a ransomware attack. While email and\nother important services are still offline, students have still been attending\nclasses as normal, though the process of fully remediating the incident has just\nbegun. It is still unclear how the attack was initiated, but it\u2019s the latest in\na long line of educational institutions that have fallen victim to ransomware\nthis year. <\/p>\n\n\n\n<h2>Malware Attack on Indian Power Plant<\/h2>\n\n\n\n<p>It has been confirmed that both an <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/10\/indian-nuclear-power-company-confirms-north-korean-malware-attack\/\">Indian\nnuclear power plant<\/a> and another piece of infrastructure have fallen victim\nto a malware attack apparently tied to North Korean actors. Fortunately, the\nattacks did not allow unauthorized control of the systems, though this attack\nmay have been only a test to determine security and response times in\npreparation for a larger, future attack.&nbsp;\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bed, Bath, &amp; Beyond Data Breach An official announcement made earlier this week acknowledged illicit access to customer data used in online accounts for Bed, Bath, &amp; Beyond. While the breach didn\u2019t affect payment card information, the retailer quickly began contacting affected customers and took steps to safeguard against future incidents. Johannesburg Shutdown After Cyber [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":29391,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3959,3563,25171,25169,19847,3769,24853,7703,4463,3557,25163,25161,25157,25167,25159,25155,25165,3937,19703,5003],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29385"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=29385"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29385\/revisions"}],"predecessor-version":[{"id":29393,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29385\/revisions\/29393"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/29391"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=29385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=29385"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=29385"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=29385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}