industryThe Ransomware & AI Era (2020–2023) Daily Briefing
Cybersecurity Briefing: September 5, 2022 - Major Incidents Impacting Organizations
Monday, September 5, 2022
# Lead Story: IHG Cyberattack Disrupts Global Operations On September 5, 2022, InterContinental Hotels Group (IHG), known for its brands like Holiday Inn, reported a significant cyberattack that disrupted its booking systems and applications. The unauthorized activity severely impacted the technology supporting the company's operations worldwide, resulting in operational challenges for hotels. This incident highlights the increasing threats to the hospitality industry and the need for robust cybersecurity measures to protect critical infrastructure and customer data. IHG is currently investigating the incident to restore full functionality to its systems and ensure the security of its platforms. Source
Secondary Items
- Go-Ahead Group Cyberattack: The Go-Ahead Group, a leading UK transport company, reported a cyberattack affecting its scheduling software for bus drivers and services. While specific details of the attack remain undisclosed, the incident has raised concerns about the operational integrity of public transport services and the potential risks posed by such disruptions. Source
- Critical Vulnerability in Zyxel NAS Devices: A critical remote code execution vulnerability, designated CVE-2022-34747, was identified in Zyxel's network-attached storage devices, bearing a high CVSS score of 9.8. Zyxel promptly released a patch to mitigate this severe risk, emphasizing the necessity for organizations to remain vigilant and apply updates to their systems to prevent exploitation. Source
- Samsung Data Disclosure: In a related disclosure, Samsung revealed that unauthorized parties gained access to the personal information of U.S. customers, including names and contact details. Fortunately, sensitive information such as Social Security numbers remained secure. This incident underscores the ongoing vulnerabilities that major corporations face and the importance of maintaining stringent security protocols. Source