logo
#

Latest news with #cyberbreach

Qantas confirms personal data of over a million customers leaked in breach
Qantas confirms personal data of over a million customers leaked in breach

CNA

time09-07-2025

  • Business
  • CNA

Qantas confirms personal data of over a million customers leaked in breach

Australia's Qantas Airways said on Wednesday (Jul 9) more than a million customers had their phone number, birth date or home address accessed in one of the country's biggest cyber breaches in years. The airline operator said that another four million customers had just their name and email address taken during the hack. After disclosing a cyberattack last week, Qantas said on Wednesday that the breached database contained unique personal information of 5.7 million customers, after removing duplicate records from the initial 6 million affected. There is no evidence that any personal data of the customers has been released and the company is actively monitoring the situation, Qantas said in a statement. "Since the incident, we have put in place a number of additional cybersecurity measures to further protect our customers' data, and are continuing to review what happened," Qantas Group CEO Vanessa Hudson said. The breach represents Australia's most high-profile cyberattack since telecommunications giant Optus and health insurer Medibank were hit in 2022, incidents that prompted mandatory cyber resilience laws.

A CISO's guide to securing XIoT in the Middle East
A CISO's guide to securing XIoT in the Middle East

Khaleej Times

time03-07-2025

  • Business
  • Khaleej Times

A CISO's guide to securing XIoT in the Middle East

The rapid expansion of the Internet of Things (IoT) is reshaping the physical and digital contours of modern infrastructure. From biometric gates at international airports to infusion pumps at hospitals, from ubiquitous surveillance devices to office peripherals of a mundane kind — the networked device universe is ubiquitous and exposed. This interconnected network offers clear functional benefits. However, as more devices communicate with each other, there are more entry points for cyberattacks. The numbers are staggering. The Middle East IoT market is projected to grow from $43.99 billion to $241.65 billion by 2030, a 449 per cent increase. Saudi Arabia alone commands nearly 40 per cent of the regional market, generating $10.22 billion in revenues. Yet, as organisations embrace XIoT (extended Internet of Things), security risks escalate. The Middle East saw a 211 per cent rise in Distributed Denial of Service (DDoS) attacks in 2024, while the average cost of a cyber breach now stands at $8.75 million. Mega-breaches — those affecting 50 to 60 million records — have soared to $375 million, up $43 million from 2023. To fully benefit from the tremendous value of IoT devices, they need to be secured and managed effectively. Proper security management ensures devices are protected from cyber threats, minimising vulnerabilities that attackers exploit. This involves comprehensive visibility into device usage, regular updates to firmware, strong authentication methods, and proactive monitoring to detect and respond swiftly to security incidents. Organisations should invest in robust cybersecurity frameworks to harness IoT's full potential safely and sustainably. For the modern CISO, the mandate extends beyond protection to building a resilient cybersecurity strategy — one that ensures rapid detection, response, and recovery. In today's threat landscape, resilience isn't optional; it's a strategic necessity for business continuity and trust. 1. Know what you own: The XIoT visibility challenge You cannot protect what you cannot see. Many organisations have thousands of connected devices, yet few have a complete inventory. From smart cameras to industrial sensors, these silent operators are often neglected, leaving security gaps. S teps to take: • Catalogue every device – Identify all XIoT endpoints across departments, from IT to operational technology (OT). • Assess security measures – Check for outdated firmware, default passwords, and unpatched vulnerabilities. • Engage stakeholders – Hold cross-functional meetings with IT, OT, and physical security teams to ensure all devices are accounted for. Visibility is the foundation of security. Without a real-time asset inventory, XIoT security is a guessing game. 2. Automate security fixes: Stay ahead of the threats Manual patching is a losing battle. With multiple vendors, different operating systems, and legacy devices, keeping up with security updates is impossible without automation. What to automate: • Eliminate default logins – Many devices ship with 'admin/admin' credentials. These must be changed immediately. • Firmware updates – Some vulnerabilities, like those in Z-Wave chipsets, require urgent patching. If updates are unavailable, devices must be segmented. • Standardise security settings – Enforce encryption, secure boot, and endpoint monitoring across all connected devices. • Pro tip: Not all XIoT devices can be patched. If an update is unavailable, limit access and segment networks to reduce risk. 3. Continuous monitoring: The watchtower approach Static defences are not enough. Attackers are evolving, and so must security teams. Continuous monitoring provides real-time visibility into suspicious behaviours, unauthorised access attempts, and misconfigured devices. Best practices: • Monitor device behaviour – Use AI-driven analytics to flag unusual activity, such as an XIoT device suddenly communicating with an unknown server. • Establish incident workflows – Ensure that alerts from security operation centers (SOCs) reach the right teams in real time — whether IT, OT, or physical security. • Leverage threat intelligence – Study patterns of attempted intrusions to adjust defenses accordingly. XIoT security is not just about detection — it's about rapid response. A CISO's playbook for XIoT security Securing XIoT in the Middle East demands a dynamic, strategic approach that matches the scale and speed of the growing threat landscape. The region's digital economy is accelerating, and the volume of connected devices is rapidly multiplying. To stay ahead, CISOs must proactively identify assets, automate defences, consistently monitor threats, and swiftly enforce response frameworks. Speed and scalability are critical organisations must transition swiftly from reactive strategies to proactive, automated, and ultimately autonomous security operations. Ultimately, it is leadership, not just technology, that drives robust xIoT security. By positioning cybersecurity as a long-term strategic investment, organisations can protect infrastructure, ensure operational resilience, maintain trust, and unlock the benefits of digital transformation safely. In our increasingly connected world, proactive protection is no longer optional — it's the smarter path forward. The writer is Middle East & Africa Vice President at Phosphorus Cybersecurity.

Tonga's government mum on health cyber breach
Tonga's government mum on health cyber breach

RNZ News

time25-06-2025

  • Health
  • RNZ News

Tonga's government mum on health cyber breach

A cyber expert from Australia has been in the country for nearly a week and local media report more personnel are being brought in. Photo: 123RF The Tongan government has yet to reveal more details about a cyber breach of its health records that occured 10 days ago. The breach by hackers and their subsequent demand for payment were revealed in parliament four days after the event. A cyber expert from Australia has been in the country for nearly a week, and local media report that more personnel are being brought in. Meanwhile, concern about illegal access to health records is mounting, amid a requirement that patients bring any medical records they have into the country's hospitals as staff are now relying on manual data. Former Prime Minister Siaosi Sovaleni wants a full explanation from the government, but most of the country's leaders are in Ha'apai this week for the annual conference of the Wesleyan Church. Police have said that the hackers have demanded a payment in "the millions". A media conference scheduled for later on Thursday is expected to shed more light on the issue.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store