The goal of this project was to research different types of cybersecurity attacks and how these attacks impacted others.
I learned that not even big companies are immune to cybersecurity attacks. More and more attacks happen everyday, most involving leaking information or demanding a ransom. Companies, and everyday people, need to take measures in order to protect important information. We may think that were are being cautious, but one miss click and your information could be stolen.
Kellogg confirmed in December 2024 that one employee was affected in a hack regarding files. Cleo servers, which the breakfast company uses to transfer employee files, were hacked on December 7, 2024. The information that was hacked included the social security number and name of the employee. There were two vulnerabilities that the company was aware of. The first, CVE-2024-50623, which was unrestricted file upload and download vulnerability. The second was CVE-2024-55956, which allowed unauthenticated users to import/execute arbitrary bash/PowerShell commands. The company is unsure if employees were affected. One way to prevent files from being stolen is by avoid clicking on unknown links
Who published the content? David Jones
Where was it published? Cybersecurity Dive
When was it published? April 8, 2025
The truthfulness and integrity of the facts: True, as there are other articles written about the same topic
How is it written and presented? Informs readers of attacks
Links and Citations: Links other articles
Sometime during the week of 4/6/2025, Sensata, a company that specializes in sensors, controls and other technologies for automotive and aerospace, was hit with a ransomware attack. This attack disrupted company operations, including shipping, manufacturing production, receiving, and more. Files were removed from the companies network, and the company is unsure if employees were affected. They are also unsure of what else was impacted during this attack. The amount that the attackers demanded for is unknown. Ways to protect yourself from ransomware attacks include using security software, having backups of data, and keeping your system and software updated.
Who published the content? Rob Wright
Where was it published? Cybersecurity Dive
When was it published? April 10, 2025
The truthfulness and integrity of the facts: Considered true, no misspelling, and there are other articles about this attack
How is it written and presented? No ads, just provides readers information about what is happening
Links and Citations: Provides links to other articles, including the revenue for the quarter.