South African Airways hit by cyber attack South African Airways (SAA) has become the latest organisation to fall victim to a cyber attack. In a statement released today, the flagship carrier of South Africa says it has been impacted by a significant cyber incident that began on Saturday, 3 May. According to SAA, the breachContinue reading “May 2025: Major Data Breaches and Cyber Attacks”
Tag Archives: hacking
April 2025: Major Data Breaches and Cyber Attacks
Ransomware surge: Sensata Technologies, US state agencies targeted in widespread cyber incidents Industrial technology company Sensata Technologies disclosed that the company experienced a ransomware attack that encrypted parts of its network. The company took its systems offline, initiated response protocols, and launched an investigation with third-party cybersecurity experts. Law enforcement has been notified and is involved. ThisContinue reading “April 2025: Major Data Breaches and Cyber Attacks”
March 2025: Major Data Breaches and Cyber Attacks
Data breach at Japanese telecom giant NTT hits 18,000 companies Japanese telecommunication services provider NTT Communications Corporation (NTT) is warning almost 18,000 corporate customers that their information was compromised during a cybersecurity incident. The data breach was discovered in early February 2025, but the exact date when the hackers gained initial access to NTT’s systemsContinue reading “March 2025: Major Data Breaches and Cyber Attacks”
AWS Security – Part 1- Securing Root Account with MFA
Task: Create AWS account and set up for below tasks What is the need to perform this: Securing an AWS root account is crucial because it has unrestricted access to all resources and services within your AWS environment. If compromised, an attacker could delete resources, steal data, or even lock you out of your ownContinue reading “AWS Security – Part 1- Securing Root Account with MFA”
Audit Conclusions
Objectives of Audit Conclusions Preparing Audit Conclusions ISO 19011, clause 6.4.9 Before the closing meeting, the auditors meeting consult each other to: Discussing Audit Conclusions with the Auditee It is important to discuss audit findings and conclusions with the management before the closing meeting and submitting the final report to: Closing Meeting Agenda Model PreparingContinue reading “Audit Conclusions”
Beyond the Initial Audit
Objective of beyond the Initial Audit Surveillance Activities Surveillance activities can also include: Surveillance Audits Re-certification Audit Certification Special cases Use of ISO Trade marks
Cybersecurity Breaches: Recent High-Profile Cases in the month of January 2025
Ransomware attack on New York Blood Center forces workarounds, drive cancellations One of the largest independent blood centers serving over 75 million people across the U.S. has been hit by a ransomware attack, forcing officials to reschedule blood drives and implement workarounds. New York Blood Center Enterprises said its team discovered suspicious activity affecting theContinue reading “Cybersecurity Breaches: Recent High-Profile Cases in the month of January 2025”
Vulnerability Management
It is not a scan or a one-time project. Vulnerability Management is a “program” which organizations might use. The goal is to continuously identify vulnerabilities. Then, they must address these vulnerabilities in appropriate ways. It can contain many different projects like: What, Why and How? It is the process of identifying, analyzing and ranking vulnerabilities.Continue reading “Vulnerability Management”
Monthly Round Up for the month of July 2024
AT & T cyber attack A massive AT&T Cyberattack caused Hackers to Steal Millions of Customer Records. Consequently, AT&T revealed that nearly all of its wireless customers’ call and text records were exposed. Furthermore, the hackers accessed customer data stored on a third-party cloud platform. Patient reports used as paper plates at Mumbai hospital A videoContinue reading “Monthly Round Up for the month of July 2024”
Information Security Clauses for business contracts and agreements
In line with ISO 27001 and NIST. General Clauses Confidentiality and Data Protection: a. The Vendor shall treat all data and information provided by [Company Name], including but not limited to personal data, intellectual property, and confidential business information, as strictly confidential and shall not disclose, share, or use such data and information for anyContinue reading “Information Security Clauses for business contracts and agreements”
