High 10 cyber incidents throughout 2024 revealed

0
12
Top 10 cyber incidents during 2024 revealed

  1. CrowdStrike IT outage: A flawed software update in July disrupted 8.5 million gadgets globally, with monetary losses reaching $5.4 billion. Restoration efforts required handbook intervention regardless of a fast repair by the cybersecurity agency.
  2. Change Healthcare ransomware assault: In February, a ransomware assault affected over 100 million people within the US, paralyzing healthcare operations and resulting in monetary damages of $4.457 billion.
  3. CDK international assault: Automotive software program supplier CDK International confronted a ransomware breach in June, impacting almost 15,000 dealerships throughout North America. Restoration was difficult by a subsequent assault.
  4. Israel-Hamas cyber battle: Amid the continued battle, cyber incidents involving kinetic assaults prompted casualties and accidents throughout the area, highlighting the intersection of bodily and digital warfare.
  5. OpenSSH vulnerability: A zero-day exploit in July uncovered over seven million situations of OpenSSH servers, emphasizing the important want for proactive software program safety measures.
  6. XZ Utils compromise: A important vulnerability in an open-source library was found in March, averting a possible international provide chain assault. Investigations linked the breach to a long-term operation by an unidentified actor.
  7. Ivanti VPN breaches: Vulnerabilities in January and February uncovered important distant entry techniques, posing dangers to enterprise safety and provide chains.
  8. Salt Hurricane espionage marketing campaign: Chinese language state-sponsored hackers focused telecommunications infrastructure worldwide, compromising surveillance techniques and elevating issues over provide chain resilience.
  9. Blue Yonder ransomware assault: A November breach disrupted retail and grocery provide chains within the US and UK, affecting operations throughout a peak procuring interval.
  10. Snowflake information breach: A Might assault on the cloud supplier uncovered buyer information from industries together with finance and retail, attributed to weak authentication practices in buyer environments.

The report additionally discusses industry-wide dangers, comparable to dependency on cloud suppliers, and highlights methods for resilience. These embody adopting multi-cloud frameworks, integrating edge computing, and implementing Endpoint Detection and Response (EDR) diversification.