Who published? Jessica Lyons
Where was it published? The Register
When was it published? Nov 5, 2024
The truthfulness and integrity of the facts: Strong integrity. Events occurred.
How is it written and presented? Only one advertisement. Informative and straight forward.
Links and Citations: A lot of different article links at the bottom of the page. Wasn't many citations.
A ransomware organization named Hellcat targeted Schneider Electric in November 2024, claiming to have gained access to the company's Atlassian Jira internal system. The attackers sought a strange ransom of $125,000 in baguettes in exchange for more than 40GB of compressed data, which included project files and personal information. Schneider acknowledged the hack, but said its key goods and services were unaffected because it happened in a separate system. Organizations should limit access permissions, update and protect project management platforms on a regular basis, and put robust cybersecurity monitoring and response policies in place to stop similar attacks.
Who published? KnowBe4 Threat Lab
Where was it published? KnowB4
When was it published? April 10, 2025
The truthfulness and integrity of the facts: 10/10, very accurate information.
How is it written and presented? Informative. Advertisements are set to the side so that you can focus on the information
Links and Citations: Links only take you bake to their website.
Cybercriminals launched a massive phishing campaign during the U.S. tax season in March 2025, which resulted in a 27.9% rise in phishing attempts over the previous month. These attacks used advanced techniques such inserting QR codes in attachments, using polymorphic subject lines, and using lookalike domains to mimic reliable organizations. They frequently included payloads with a financial theme. Interestingly, 7.8% of these phishing emails used the genuine QuickBooks service to increase their legitimacy, and 48.8% of them came from hijacked business email accounts.
Organizations should use cutting-edge security tools that can examine every aspect of emails, including language, tone, subject lines, and attachments, in order to spot subtle clues of malevolent intent and defend against phishing assaults. Organizations should also offer pertinent and focused training programs to give staff members the skills they need to identify and address these dangers.
The objective of this project is to explore and understand the various risks, threats, and vulnerabilities related to cybersecurity on computers and mobile devices. I had research current cybersecurity issues in the news, focusing on topics such as privacy breaches, phishing scams, ransomware attacks, and more. Through this process, it will enhance my digital literacy skills and deepen my understanding of how to protect personal and sensitive information. The project also encourages me to reflect on these issues by sharing my findings on this ePortfolio and engaging in class discussions.
The clever phishing effort during the U.S. tax season and the Hellcat ransomware attack on Schneider Electric underscore the growing threat of cybercriminals taking advantage of weaknesses in vital systems. Regular upgrades must be given top priority by organizations, which should also restrict access to important systems and put proactive cybersecurity measures like monitoring and response mechanisms in place. It's also critical to use sophisticated security solutions that examine email content and use AI to identify changing phishing techniques. To reduce the risks of exploitation, employee training on identifying and managing these dangers is also crucial.