Latest Insights on Security Breach | BarberaIT https://tct.com.au/blog/category/security-breach/ Managed Services Provider Tue, 03 Feb 2026 04:51:41 +0000 en-AU hourly 1 https://wordpress.org/?v=6.8.3 https://tct.com.au/wp-content/uploads/2025/08/cropped-BarberaIT-fav-ico-1-32x32.png Latest Insights on Security Breach | BarberaIT https://tct.com.au/blog/category/security-breach/ 32 32 Security Report – 30 Jan 2026 https://tct.com.au/blog/security-report-30-jan-2026/ Tue, 03 Feb 2026 04:51:41 +0000 https://tct.com.au/?p=13516 Cybercriminals never stand still, constantly reinventing their tactics to exploit trust, familiarity and human instinct. INKY continues to observe threat...

The post Security Report – 30 Jan 2026 appeared first on Barbera IT.

]]>
Cybercriminals never stand still, constantly reinventing their tactics to exploit trust, familiarity and human instinct. INKY continues to observe threat actors weaponising cloud email platforms and voice‐based social engineering to bypass security controls. A recent example is a phishing campaign that sent hundreds of emails from a compromised SendGrid account linked to OpenAI to issue fraudulent invoices. The OpenAI invoice scam demonstrates how attackers leverage legitimate cloud email services and voice‑based social engineering to bypass security controls. By sending an invoice‑themed email through SendGrid, criminals ensured the message passed SPF/DKIM/DMARC checks and appeared trustworthy. The absence of malicious links allowed the email to evade URL filters, while the urgent call‑to‑action prompted the recipient to contact a scammer who then sought remote access.

Callback phishing is part of a broader trend in which attackers weaponise trusted platforms and remote‑support tools. Advanced email security, vigilance, user education and rigorous verification through official channels remain the most effective defenses against this evolving threat.

Recent Breaches

 

Australia – Victorian Department of Education – Education 

Exploit: Hacking

Risk to Business: Moderate: The Department of Education in Victoria, Australia, has confirmed a data breach that affected current students and inactive past student accounts across more than 1,700 government schools. On January 14, the department said an unauthorised third party breached a school’s network. A follow-up update on January 21 confirmed that the attacker accessed a Department of Education database containing student information. The exposed data includes student and school names, year levels and department-issued email addresses with encrypted passwords. The department stated that no other student data, such as dates of birth, home addresses, phone numbers or family details, was accessed. At this stage, there is no evidence that the data has been publicly released or shared with third parties. The Office of the Victorian Information Commissioner (OVIC) has launched an investigation into the incident.

United States – The Illinois Department of Human Services – Healthcare

Exploit: Hacking

Risk to Business: Moderate: The Illinois Department of Human Services (IDHS) confirmed a data breach that exposed sensitive records of roughly 700,000 individuals, marking one of the largest public-sector breaches in 2026. According to the agency, the breach exposed two separate sets of records. The first involves personal and program-related data tied to more than 672,000 Medicaid and Medicare Savings Program recipients, including addresses, case numbers, demographic details and medical assistance plan names. A second set of records affected around 32,000 customers of the Division of Rehabilitation Services, exposing names, addresses, case details and referral information spanning multiple years. IDHS said the investigation into the incident is ongoing, and officials are still working to determine how the intrusion occurred and whether additional data may have been accessed.

Talk to a BarberaIT team member today about implementing IT strategy plan for your business.

 

Robert Brown
30/1/2026

Related Articles:
How AI Is Changing Cybercrime
Stable Connection Is Essential for Your Business

The post Security Report – 30 Jan 2026 appeared first on Barbera IT.

]]>
Security Report – 28 Nov 2025 https://tct.com.au/blog/security-report-28-nov-2025/ Fri, 28 Nov 2025 02:56:34 +0000 https://tct.com.au/?p=13396 Many SMBs think they have a security problem, but the real issue is a fragmented software suite—a mix of disconnected...

The post Security Report – 28 Nov 2025 appeared first on Barbera IT.

]]>
Many SMBs think they have a security problem, but the real issue is a fragmented software suite—a mix of disconnected applications added over time. Each tool solves a single problem, but together they create complexity, gaps in protection, and higher costs.

The answer isn’t piling on more products. It’s choosing a concise, best-of-breed product suite that delivers comprehensive cybersecurity without unnecessary overlap. A well-integrated suite reduces complexity, saves time, and closes gaps between systems. Your IT provider can work efficiently, respond faster, and focus on proactive risk management instead of constant firefighting.

For business owners, a unified suite means better visibility and control. Threats, compliance, and performance can be tracked, making planning and resource allocation easier. The result? Stronger security, simpler operations, and a business that moves faster and stays safer.

Recent Breaches

 

Korea – LG Energy Solution – Energy & Natural Resources 

Exploit: Ransomware & Malware

Risk to Business: Moderate: LG Energy Solution, a subsidiary of Korean multinational LG, has confirmed that it experienced a ransomware attack. According to the company, the attack targeted one specific overseas facility and did not impact its headquarters or other global sites. LG Energy Solution said the affected location has since returned to normal operations after recovery measures were implemented. The company is continuing security monitoring and conducting an internal investigation as a precaution. Meanwhile, the Akira ransomware gang has added LG Energy Solution to its leak site, claiming it stole 1.7 TB of data. The group claims the cache contains corporate documents, employee information databases and other sensitive files. According to the Federal Bureau of Investigation (FBI), Akira has already amassed more than $244 million in ransomware proceeds to date.

United States – International Game Technology (IGT) – Media, Sports & Entertainment

Exploit: Ransomware & Malware

Risk to Business: Moderate: International Game Technology (IGT), a global leader in digital gaming, sports betting and fintech solutions for casinos and online platforms, confirmed a significant cybersecurity incident on November 17. In a filing with the U.S. Securities and Exchange Commission (SEC) last Tuesday, the company reported experiencing operational disruptions following unauthorised access to its internal IT systems and applications. IGT stated that it immediately activated its incident response (IR) plan and launched an investigation with support from external advisors. While the company did not disclose the nature of the attack, taking systems offline is a common response to ransomware activity. Meanwhile, the Qilin ransomware gang has added IGT to its dark web leak site, claiming it stole 10 GB of data — an estimated 21,600 files. Although the group did not publish sample data, it labeled the archive as “publicated,” suggesting the stolen files may already be circulating online.

Talk to a BarberaIT team member today about implementing IT strategy plan for your business.

 

Robert Brown
28/11/2025

Related Articles:
How AI Is Changing Cybercrime
Stable Connection Is Essential for Your Business

The post Security Report – 28 Nov 2025 appeared first on Barbera IT.

]]>
Security Report – 14 Nov 2025 https://tct.com.au/blog/security-report-14-nov-2025/ Fri, 14 Nov 2025 00:47:33 +0000 https://tct.com.au/?p=13272 Modern businesses now operate almost entirely in the cloud. From productivity suites like Microsoft 365 and Google Workspace to CRMs...

The post Security Report – 14 Nov 2025 appeared first on Barbera IT.

]]>
Modern businesses now operate almost entirely in the cloud. From productivity suites like Microsoft 365 and Google Workspace to CRMs and accounting platforms, organisations rely heavily on SaaS applications to power their most critical business operations. For MSPs, this means your clients’ data no longer lives behind a secure firewall. It’s scattered across dozens of SaaS apps and potentially exposed to dozens of risks. As more organisations move toward a cloud-first IT strategy, SaaS applications have become prime targets for cybercriminals. As SaaS threats evolve, MSPs must continuously refine their security strategies and align their services to better protect clients. Staying ahead of today’s risks requires layered, automated and proactive defense.

Recent Breaches

 

North America – Booking.com – Hospitality & Leisure 

Exploit: Phishing

Risk to Business: Severe: A large-scale phishing campaign is targeting the global hospitality industry, with attackers aiming to gain unauthorized access to hotel booking platforms, including Booking.com. In this campaign, hotel managers are being tricked into visiting ClickFix-style phishing pages that steal their login credentials and install PureRAT ransomware. Attackers use compromised email accounts to send convincing spear-phishing messages that impersonate legitimate booking platforms. Once hotel staff click on these links, they will be redirected to malicious websites that will install ransomware and harvest credentials. Active since April 2025, this operation is part of a growing trend of phishing attacks on hotel booking systems. Threat actors either sell stolen booking platform accounts on cybercrime forums or use them to send fraudulent emails to hotels and guests, thereby committing financial fraud.

United States – The University of Pennsylvania – Education

Exploit: Hacking

Risk to Business: Moderate: The University of Pennsylvania confirmed a massive data breach on November 5, which exposed the personal information of students, alumni, staff and community affiliates. The breach reportedly exposed more than 1.2 million records. The cyber incident came to light on October 31, when several members of the Penn community received emails claiming to be from the university’s Graduate School of Education (GSE). The university later confirmed that certain systems linked to its development and alumni activities had been compromised. The stolen data includes personally identifiable information (PII) — some of which dates back decades — along with banking details. However, the university said that no medical information was involved in the breach. According to Penn, the attack began with a social engineering scam. After learning of the incident, university staff quickly locked down the affected systems but were unable to prevent the fraudulent emails from being sent or the sensitive information from being stolen.

Talk to a BarberaIT team member today about implementing IT strategy plan for your business.

Robert Brown
14/11/2025

Related Articles:
4 Ways Small Businesses Can Leverage Copilot for Microsoft 365
Stable Connection Is Essential for Your Business

The post Security Report – 14 Nov 2025 appeared first on Barbera IT.

]]>
Security Report – 7 Nov 2025 https://tct.com.au/blog/security-report-7-nov-2025/ Fri, 07 Nov 2025 05:44:56 +0000 https://tct.com.au/?p=13263 Phishing continues to be one of the most dreaded cybersecurity risks facing businesses today. According to the 2026 Kaseya Cybersecurity Outlook...

The post Security Report – 7 Nov 2025 appeared first on Barbera IT.

]]>
Phishing continues to be one of the most dreaded cybersecurity risks facing businesses today. According to the 2026 Kaseya Cybersecurity Outlook Report, nearly half (49%) of businesses have been impacted in the last 12 months alone. Phishing-as-a-Service platforms and ready-to-use phishing kits make it easier for even less tech-savvy individuals with malicious intent to launch phishing attacks at scale. Additionally, AI-powered phishing campaigns are more dangerous, sophisticated and harder to spot.  Without proper education and training, employees may struggle to distinguish genuine emails from phishing scams. Even with regular awareness training, some users consistently fall for phishing simulations. In real-world scenarios, such risky behaviors can put the entire organisation at risk.

Recent Breaches

 

Australia – Ansell – Manufacturing 

Exploit: Third-Party Data Breach

Risk to Business: Severe: Clop, the notorious cyber extortion group behind several high-profile breaches, has listed Australian personal protective equipment (PPE) manufacturer Ansell as a victim on its darknet leak site. The claim comes just weeks after Ansell disclosed “unauthorised data access” in an Australian Securities Exchange (ASX) announcement. On October 14, Ansell confirmed the breach stemmed from vulnerabilities in licensed third-party software. The hackers have now allegedly published a 552GB dataset that is said to have been exfiltrated from Ansell’s network, sharing it via the BitTorrent peer-to-peer protocol. The torrent file, made available on November 3, has already been downloaded multiple times. So far, the hackers have not disclosed what data is included in the breach, nor have they shared proof of compromise or any ransom demand.

United Kingdom – Ernst & Young – Finance

Exploit: Misconfiguration

Risk to Business: Moderate: A major cloud misconfiguration has exposed a massive amount of data belonging to British multinational professional services firm Ernst & Young (EY). The exposure has become one of the most talked-about topics in cybersecurity circles this week. Cybersecurity researchers discovered 4TB of publicly accessible EY data on Microsoft Azure during a routine network and cloud scan. The file carried a .BAK extension, indicating it was a full SQL Server database backup. The exposed backup likely contained sensitive information such as user data, API keys, credentials, authentication tokens and database schemas. Experts warn that such a large volume of exposed data could have serious consequences. With today’s automated scanning tools, countless threat actors could have easily found and accessed the files.

Talk to a BarberaIT team member today about implementing IT strategy plan for your business.

Robert Brown
7/11/2025

Related Articles:
Lock Down Your Business Logins
Stable Connection Is Essential for Your Business

The post Security Report – 7 Nov 2025 appeared first on Barbera IT.

]]>
Security Report – 31 Oct 2025 https://tct.com.au/blog/security-report-31-oct-2025/ Fri, 31 Oct 2025 04:37:25 +0000 https://tct.com.au/?p=13185 The cyberthreat landscape is evolving at breakneck speed. The challenge businesses face, the way budgets are allocated and the expectations...

The post Security Report – 31 Oct 2025 appeared first on Barbera IT.

]]>
The cyberthreat landscape is evolving at breakneck speed. The challenge businesses face, the way budgets are allocated and the expectations clients place on their providers are all shifting. Businesses see human error and social engineering as their biggest threat vectors in the next 12 months. This vulnerability is driven by poor user practices, lack of end-user training and limited cybersecurity expertise, which remain the leading causes of cyber incidents. Phishing continues to reign as the most damaging and persistent cybersecurity challenge. As attackers grow more sophisticated, email remains both the most common entry point and the biggest opportunity for AI-powered defenses to make a real impact.

Recent Breaches

 

Australia – Western Sydney University – Education 

Exploit: Hacking

Risk to Business: Severe: Western Sydney University has confirmed a major cyberattack that stole sensitive student data, including tax file numbers, passport details and private health and disability information. On October 23, the university revealed that the breach occurred through its student management system, which is hosted by a third-party provider on a cloud-based platform. Its investigation found that a daisy chain of suppliers had been exploited during the breach, starting at an additional external system, which itself was linked to the third-party cloud platform. The breach of the third- and fourth-party systems allowed hackers to access and exfiltrate data from the student management system. The stolen information includes names, dates of birth, ethnicity, employment and payroll details, bank account numbers, tax file and driver’s license numbers, passport and visa information, and even complaint, health, disability and legal records — making it one of the most severe education-sector breaches in recent months.

North America – Gmail – Technology

Exploit: Hacking

Risk to Business: Moderate: A massive email breach has been uncovered, reportedly compromising more than 183 million email accounts, including millions of Gmail users. Data breach notification service Have I Been Pwned revealed that the stolen emails and passwords were collected through infostealer malware. The breach, which occurred in April, saw cybercriminals quietly gather login details over time. The discovery has raised serious concerns across the tech industry about personal data security and the growing threat of infostealers that harvest sensitive information undetected for sale on the dark web.

Talk to a BarberaIT team member today about implementing IT strategy plan for your business.

 

Robert Brown
31/10/2025

Related Articles:
Lock Down Your Business Logins
Stable Connection Is Essential for Your Business

The post Security Report – 31 Oct 2025 appeared first on Barbera IT.

]]>
Security Report – 24 Oct 2025 https://tct.com.au/blog/security-report-24-oct-2025/ Fri, 24 Oct 2025 05:23:38 +0000 https://tct.com.au/?p=13090 History shows that even the strongest defenses crumble when attackers innovate. Constantinople had walls so thick and high that for...

The post Security Report – 24 Oct 2025 appeared first on Barbera IT.

]]>
History shows that even the strongest defenses crumble when attackers innovate. Constantinople had walls so thick and high that for centuries no army could get past them. Yet the Ottomans brought cannons that eventually broke through those walls. The defenders believed their defenses were enough, and that false sense of security cost them their city. Now think of the Battle of Cannae. Hannibal, outnumbered by the Romans by almost two to one, didn’t sit behind walls. He planned an offensive maneuver that surrounded the Roman army and crushed it. Hannibal won not with numbers but with strategy. Cybersecurity is no different. You simply cannot stack defenses and hope attackers give up. You need a plan that combines prevention with an active, rapid response when enemies inevitably slip through. Your cybersecurity strategy needs both sides of the battlefield covered. Prevention without response is fragile and response without prevention is chaos. When both work together, you build resilience.

Recent Breaches

 

Australia & New Zealand – Vocus – Telecommunications 

Exploit: Hacking

Risk to Business: Moderate: Vocus, Australia’s fourth-largest telco, announced that 1,600 home internet and mobile customers were affected by a hack targeting its business email and mobile services. On October 17, the company — which owns Dodo and iPrimus — detected suspicious activity in its email system. An investigation revealed unauthorised access to approximately 1,600 email accounts, resulting in SIM swaps on 34 Dodo Mobile accounts. In response, Vocus temporarily suspended certain services to contain the issue and begin recovery efforts. Vocus said it continues to monitor the situation closely and has worked with affected customers to reverse the SIM swaps and restore their services.

Europe – Volkswagen – Manufacturing

Exploit: Hacking

Risk to Business: Moderate: Volkswagen, one of the world’s largest automakers, has reportedly been hit by the ransomware group 8Base. The group publicly claimed in September 2024 that it had breached Volkswagen’s systems. Known for deploying Phobos ransomware and using double-extortion tactics, 8Base claimed to have exfiltrated confidential files on September 23, 2024, threatening to leak them by September 26. Although no data appeared immediately after the deadline, the group later listed the allegedly stolen information on its dark web site, including invoices, accounting records, employee files, contracts, certificates and multiple confidentiality agreements. While Volkswagen maintains that its core IT infrastructure remains unaffected, the limited response has raised questions about the full scope of the incident and whether a third-party system may have been compromised.

Talk to a BarberaIT team member today about implementing IT strategy plan for your business.

 

Robert Brown
24/10/2025

Related Articles:
Lock Down Your Business Logins
Stable Connection Is Essential for Your Business

The post Security Report – 24 Oct 2025 appeared first on Barbera IT.

]]>
Security Report – 17 Oct 2025 https://tct.com.au/blog/security-report-17-oct-2025/ Fri, 17 Oct 2025 03:43:02 +0000 https://tct.com.au/?p=13064 Many businesses view cybersecurity as a series of large expenses — firewalls, endpoint protection, new licenses and consulting work. This...

The post Security Report – 17 Oct 2025 appeared first on Barbera IT.

]]>
Many businesses view cybersecurity as a series of large expenses — firewalls, endpoint protection, new licenses and consulting work. This mindset makes it easy to believe that security carries a heavy price tag. The truth is that when security tools are isolated, duplicated or purchased reactively, budgets increase without improving protection. A better approach is to use an integrated solution that grows with your needs and is easy to monitor. When all your security tools work together in one system, protection becomes simpler to manage and more affordable. An integrated system eliminates much of this waste. Instead of retrofitting multiple tools, it combines endpoint protection, patching, backup and automation into one platform. This brings clear, measurable advantages.

Recent Breaches

 

Australia & New Zealand – Qantas – Aerospace & Defense 

Exploit: Third-Party Data Breach

Risk to Business: Moderate: On October 12, 2025, Qantas Airways confirmed that hackers had released the personal data of more than 5.7 million customers on the dark web. Qantas is among many global companies — including Toyota, Disney, Ikea, Air France and KLM — targeted by the hacker collective Scattered Lapsus$ Hunters. The group reportedly stole nearly 1 billion records in July by targeting customers of cloud technology giant. While the hackers did not breach Salesforce itself, they instead impersonated legitimate Salesforce employees in calls to IT helpdesks of the affected companies to gain access. In Qantas’ case, a call center in the Philippines was reportedly exploited to obtain access. The exposed passenger data includes dates of birth, phone numbers, addresses, emails and frequent flyer numbers. Qantas confirmed that no credit card, financial or passport details were compromised and that frequent flyer accounts remain secure.

United States – SonicWall – Technology

Exploit: Hacking

Risk to Business: Moderate: SonicWall’s disclosure last month of a data breach on its cloud backup service appears to be far more serious than initially believed. On October 8, following a full investigation conducted with Google’s Mandiant, SonicWall announced that an unauthorised party accessed firewall configuration backup files for all customers who have used SonicWall’s cloud backup service. This is a significant escalation from the company’s earlier assessment on September 17, when it believed only 5% of its firewall install base was affected. Meanwhile, SonicWall reaffirmed that the exposed files contain encrypted credentials and configuration data. The company urges all customers to log in and review their devices immediately. It has also started notifying partners and users directly and released tools to help assess and remediate affected systems.

Talk to a BarberaIT team member today about implementing IT strategy plan for your business.

 

Robert Brown
17/10/2025

Related Articles:
Secure AI and Productivity
Stable Connection Is Essential for Your Business

The post Security Report – 17 Oct 2025 appeared first on Barbera IT.

]]>
Security Report – 10 Oct 2025 https://tct.com.au/blog/security-report-10-oct-2025/ Fri, 10 Oct 2025 03:02:03 +0000 https://tct.com.au/?p=13019 Microsoft 365 has become an essential tool for businesses of all sizes. Its widespread adoption and deeply integrated suite of...

The post Security Report – 10 Oct 2025 appeared first on Barbera IT.

]]>
Microsoft 365 has become an essential tool for businesses of all sizes. Its widespread adoption and deeply integrated suite of tools offer immense value not just to its users, but also to attackers looking to exploit them. They understand that one compromised account can open the doors to emails, documents, collaboration tools, calendars and sensitive business information. To threat actors, this means a huge payout potential. And they’re exploiting every possible entry point — from sophisticated phishing campaigns and OAuth app abuse to session token hijacking. The more integrated and vital M365 becomes to your business, the more attractive it becomes as a target for theirs. To better protect your Microsoft 365 accounts, you need a proactive defense strategy. Defending your organisation’s mission-critical Microsoft 365 accounts is possible with the right mix of strong policies, strict MFA enforcement and constant vigilance.

Recent Breaches

 

Japan – Asahi Group Holdings, Ltd. – Agriculture & Food 

Exploit: Ransomware & Malware

Risk to Business: Moderate: Asahi Group Holdings, Ltd., one of Japan’s largest beverage companies, has confirmed that it was the victim of a ransomware attack. The company shared the update on October 3, about a week after disclosing the cyberattack, which forced it to suspend some domestic operations. During its ongoing investigation, Asahi discovered a potential unauthorised transfer of data from its systems. The company has not yet determined the nature or scope of the compromised information, nor has it disclosed whether the attackers issued a ransom demand.

United States – Cisco – Technology

Exploit: Third-Party Data Breach

Risk to Business: Moderate: Cybersecurity agencies worldwide, including CISA and the U.K. National Cybersecurity Center (NCSC), warned of an “advanced threat actor” actively targeting devices running Cisco’s Adaptive Security Appliances (ASA) firewall software. According to the agencies, the “widespread” campaign exploits zero-day vulnerabilities in Cisco devices, allowing attackers to run malicious code and deploy malware. Impacted equipment includes certain Cisco ASA 5500-X Series devices, which act as firewalls protecting corporate networks from intrusions. In a statement, Cisco analysts said they have “high confidence” the campaign is tied to ArcaneDoor — a state-sponsored threat actor the vendor first identified in 2024. In an emergency directive issued last Thursday, CISA ordered government cyber teams to locate all affected devices within just over one day, scan them for malicious activity and apply the security updates designed to patch the vulnerabilities.

Talk to a BarberaIT team member today about implementing IT strategy plan for your business.

Robert Brown
10/10/2025

Related Articles:
Invest Smart, Grow Fast
Copilot in Microsoft Teams

The post Security Report – 10 Oct 2025 appeared first on Barbera IT.

]]>
Security Report – 19 Sep 2025 https://tct.com.au/blog/security-report-19-sep-2025/ Wed, 24 Sep 2025 05:14:03 +0000 https://tct.com.au/?p=12921 Money matters, but it’s no longer the scarcest resource for IT teams. Time is. Budgets can be adjusted and licenses...

The post Security Report – 19 Sep 2025 appeared first on Barbera IT.

]]>
Money matters, but it’s no longer the scarcest resource for IT teams. Time is. Budgets can be adjusted and licenses renegotiated, but lost hours are gone forever. And now, how those hours are spent has a greater impact than ever on productivity, security and overall business costs. IT leaders are beginning to treat time like money, and the endpoint strategy is the first place they’re looking to make meaningful gains. Endpoint strategy is often the first area targeted for meaningful gains because endpoints—like laptops, mobile devices, and servers—are the most common entry points for cyberattacks. With remote work expanding the attack surface and legacy tools falling short, organisations prioritise endpoint detection and response to improve security, reduce risk, and consolidate fragmented tools. This approach also supports compliance and prepares for emerging threats like IoT vulnerabilities and AI-powered attacks.

Recent Breaches

 

Australia – NSW Health – Government 

Exploit: Misconfiguration

Risk to Business: Moderate: The New South Wales Ministry of Health (NSW Health) confirmed an accidental leak of confidential documents belonging to nearly 600 medical staff members. The exposed data reportedly included personal details of current and former senior medical officers and other staff members. Due to an undisclosed misconfiguration on the South Eastern Sydney and Illawarra Shoalhaven local health districts’ websites, sensitive documents such as passports, driver’s licences, Medicare cards, professional credentials, registrations and work histories were accessible online. All exposed documents have since been removed from the websites, and a full investigation is underway. NSW Health has stated that forensic analysis is being conducted to determine the extent of the incident.

United States – US HealthConnect – Heathcare

Exploit: Third-Party Data Breach

Risk to Business: Moderate: Earlier this month, US HealthConnect, a provider of continuing medical education and promotional education to healthcare providers, disclosed a cybersecurity incident to the Texas Attorney General. The report indicated that an unauthorised third party may have accessed sensitive personal and protected health information. On January 25, 2025, the company identified suspicious activity within its computer network and brought in third-party cybersecurity specialists to investigate. The inquiry confirmed that an unauthorised actor had gained access to its systems and may have obtained certain data, including names and Social Security numbers. In response, US HealthConnect enhanced its security policies and procedures, adding further administrative and technical safeguards to defend against similar threats. The organisation is also offering affected individuals up to 24 months of complimentary credit monitoring and identity theft protection services.

Talk to a BarberaIT team member today about implementing IT strategy plan for your business.

 

Robert Brown
19/09/2025

Related Articles:
Invest Smart, Grow Fast
Copilot in Microsoft Teams

The post Security Report – 19 Sep 2025 appeared first on Barbera IT.

]]>
Security Report – 12 Sep 2025 https://tct.com.au/blog/security-breach-12-sep-2025/ Fri, 12 Sep 2025 04:15:08 +0000 https://tct.com.au/?p=12847 Phishing works because it exploits people, not technology. Security systems are built to block suspicious code and detect intrusions, but...

The post Security Report – 12 Sep 2025 appeared first on Barbera IT.

]]>
Phishing works because it exploits people, not technology. Security systems are built to block suspicious code and detect intrusions, but people are far easier to influence. Employees are conditioned to trust familiar names, respond quickly to requests from authority and act fast when something feels urgent. Attackers take advantage of these instincts, knowing that even the best defenses can be bypassed if a single person makes the wrong move.  Phishing attacks often disguise themselves as legitimate emails, texts, or websites to trick users into revealing sensitive information like passwords or financial details. The best defense starts with recognising red flags—such as suspicious links, unexpected attachments, poor grammar, or urgent requests—and never clicking on unknown links or downloading unsolicited files. Organisations should train staff regularly, implement multi-factor authentication, and use email security tools that filter out malicious content.

Recent Breaches

 

United Kingdom – Jaguar Land Rover – Manufacturing 

Exploit: Hacking

Risk to Business: Moderate: Jaguar Land Rover (JLR) has suspended production at multiple sites following a cyberattack that infiltrated its internal IT systems, with disruptions expected to last into October. Thousands of workers at JLR’s Halewood, Solihull and Wolverhampton. U.K. plants have been told to stay home until the issue is resolved, though they will continue to be paid. Similar pauses affect JLR operations in Slovakia, Brazil and India. While dealerships and garages remain open, suppliers including WHS Plastics, Evtec, OPmobility and SurTec have also been impacted. A Telegram channel linked to hacking groups Scattered Spider, Lapsus$ and ShinyHunters has posted screenshots of what appear to be JLR’s internal systems. Scattered Spider, previously tied to attacks on M&S, Co-op and Harrods, is suspected of involvement.

United States – Salesloft Drift – Technology 

Exploit: Hacking

Risk to Business: Moderate: Cloudflare, Zscaler and Palo Alto Networks confirmed this week that they were affected by a hacking campaign exploiting integrations with Salesloft Drift, an AI platform connected to Salesforce systems. The campaign, attributed to threat actor UNC6395, ran between August 8 -18 and may have impacted more than 700 companies. Salesloft said attackers used stolen credentials to exfiltrate customer data via its Drift chatbot tool, acquired last year. While Salesforce disconnected Salesloft as a precaution, the company said it has seen no evidence of malicious activity within the platform itself.

Talk to a BarberaIT team member today about implementing IT strategy plan for your business.

 

Robert Brown
12/09/2025

Related Articles:
Stay Safe with Encryption
Copilot in Microsoft Teams

The post Security Report – 12 Sep 2025 appeared first on Barbera IT.

]]>