Ransomware Impact on CDK Global: Lessons for Automotive Cybersecurity

Ransomware Impact on CDK Global: Lessons for Automotive Cybersecurity

The cyberattack on CDK Global, a cornerstone of the automotive industry’s software infrastructure, continues to cast a long shadow over North American car dealerships. Launched on June 19th, the attack forced CDK to shut down critical systems, bringing sales, service, and overall dealership operations to a screeching halt. While CDK has initiated recovery efforts, dealerships…

Cyberattack Disrupts US Auto Dealerships for Two Days
|

Cyberattack Disrupts US Auto Dealerships for Two Days

Car dealerships across the United States faced disruptions for two consecutive days this week due to cyberattacks targeting CDK Global, a major provider of dealership management software. CDK shut down most of its systems on Wednesday as they investigated the cyber incident. The outage impacted critical dealership operations such as sales and service, potentially affecting…

Navigating 2024 Cybersecurity Challenges with GenAI
|

Navigating 2024 Cybersecurity Challenges with GenAI

Summary The article discusses the evolving landscape of holistic application security within cloud strategies, highlighting the increasing evaluation of Generative AI (GenAI) tools. CISOs face challenges in protecting applications and identities, and GenAI emerges as a potential solution. The blog outlines key challenges, including budgetary constraints and deciphering network data, offering GenAI-driven solutions. Additionally, GenAI…

Unlocking Tomorrow: Navigating the Terrain of Generative AI and Machine Learning for Business Transformation

Unlocking Tomorrow: Navigating the Terrain of Generative AI and Machine Learning for Business Transformation

The popularity of Generative AI has surged beyond the realm of IT in the past year. However, understanding the distinction between generative AI and machine learning is crucial for grasping how each can bring unique value to your organization. What is Machine Learning? Machine learning (ML) is a subset of artificial intelligence that employs algorithms…

Ghoulishly Good or Eerily Iffy
|

Ghoulishly Good or Eerily Iffy

The Advantages and Disadvantages of Generative AI As Halloween approaches, it’s the perfect time to delve into the enigmatic world of Generative Artificial Intelligence (AI). Much like the thrilling tales of this spooky season, generative AI has both its captivating advantages and hair-raising disadvantages. So, let’s put on our costumes, light our jack-o’-lanterns, and embark…

UPDATE YOUR SOFTWARE
| |

UPDATE YOUR SOFTWARE

Approximately 2 in 5 survey respondents say they either “sometimes,” “rarely,” or “never” install software updates. One of the easiest ways to protect accounts and information is to keep software and applications updated. Updates are periodically released to fix software problems and provide security patches for known vulnerabilities. This Cybersecurity Awareness Month, don’t hit the…

Protecting the Digital Realm: Celebrating Cybersecurity Awareness Month
|

Protecting the Digital Realm: Celebrating Cybersecurity Awareness Month

October is not just a month for Halloween costumes and pumpkin spice lattes; it’s also a time to don our digital capes and celebrate Cybersecurity Awareness Month. In today’s increasingly connected world, where our lives are intertwined with technology, the importance of cybersecurity cannot be overstated. So, let’s use this month to shine a spotlight…

SEC Approves New Cyber Reporting Regulations for Public Companies
| |

SEC Approves New Cyber Reporting Regulations for Public Companies

“The Securities and Exchange Commission voted 3-2 to adopt new regulations that would require publicly traded companies to notify the government when their IT systems are hacked and periodically disclose details around their cybersecurity risk governance in public filings. The rules, first proposed in 2022, were adopted in a meeting Wednesday, and would compel businesses…

| |

Cryptojacking Soars as Cyberattacks Increase, Diversify

Digital threat actors are adopting evolving tactical behaviors, opting for different types of malicious attacks compared to previous years, according to SonicWall. Overall intrusion attempts were up, led by the highest year on record for global cryptojacking volume recorded by SonicWall, as threat actors shifted away from traditional ransomware attacks in favor of a stealthier…

|

Supply Chain Attack Hits NHS Ambulance Trusts

“A cyber-attack on an NHS supplier has left two ambulance trusts serving millions of people without access to electronic patient records, it has emerged. Swedish healthcare IT firm Ortivus said in a statement that an attack on July 18 left affected UK customers using its hosted datacenter. “The electronic patient records are currently unavailable and…