NOT FOR REPRINT
Page Printed from: propertycasualty360.com/author/profile/michael-riley/
The news contradicts earlier reports that said the company had no intention of paying an extortion fee to restore operations.
Bank hacks in Vietnam and Bangladesh have sparked concerns within global banks, some of which are privately pressing the Swift interbank network to shore up security at its 11,000 members.
A key figure is missing in the court documents outlining the biggest computer attack ever of the U.S. financial system: the actual hacker.
Russian computer attacks have become more brazen and more destructive as the country grows increasingly at odds with the U.S. and European nations over military goals first in Ukraine and now Syria.
Sabre confirmed that its systems were breached recently, while American Airlines said it is investigating whether hackers had entered its computers.
The previously unreported breach adds airlines to a growing list of strategic U.S. industries and institutions that have been compromised.
Some investigators suspect the attacks were part of a sweeping campaign to create a database on Americans that could be used to obtain commercial and government secrets.
Concern is data could be used to target workers with sensitive information who could be subjects of traditional blackmail tools.
Investigators of Anthem Inc.s data breach are pursuing evidence that points to Chinese state-sponsored hackers who are stealing personal information from health-care companies for purposes other than pure profit.
Sony was warned a year ago that hackers had infiltrated its network and were stealing gigabytes of data several times a week.
{ "author": { "name": "Michael Riley", "webUrl": "/author/profile/michael-riley/", "description": "", "imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g", "estimate": 17, "social": [], "articles": [ { "uri": "/2021/05/13/colonial-pipeline-paid-nearly-5-million-in-ransom-to-hackers/", "title": "Colonial Pipeline paid nearly $5 million in ransom to hackers", "byline": "William Turton, Michael Riley and Jennifer Jacobs", "kicker": "News", "prettyDate": "May 13, 2021", "timeToRead": "4 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2021/05/Colonial-Pipeline-2-Bloomberg.jpg", "width": "620", "height": "372" }, "authors": [ { "webUrl": "/author/profile/william-turton-michael-riley/", "name": "William Turton, Michael Riley" }, { "webUrl": "/author/profile/jennifer-jacobs/", "name": "Jennifer Jacobs" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "The news contradicts earlier reports that said the company had no intention of paying an extortion fee to restore operations.", "body": null }, { "uri": "/2016/05/17/global-lenders-on-edge-as-hacks-embroil-growing-list-of-banks/", "title": "Global lenders on edge as hacks embroil growing list of banks", "byline": "Michael Riley, Jordan Robertson, Alan Katz", "kicker": "News", "prettyDate": "May 17, 2016", "timeToRead": "7 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/michael-riley-jordan-robertson-alan-katz/", "name": "Michael Riley, Jordan Robertson, Alan Katz" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Bank hacks in Vietnam and Bangladesh have sparked concerns within global banks, some of which are privately pressing the Swift interbank network to shore up security at its 11,000 members.", "body": null }, { "uri": "/2015/11/13/mystery-remains-of-who-had-fingers-on-keyboard-in-jpmorgan-hack/", "title": "Mystery remains of who had fingers on keyboard in JPMorgan hack", "byline": "Michael Riley, Chris Strohm, Bloomberg", "kicker": "News", "prettyDate": "November 13, 2015", "timeToRead": "7 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/michael-riley-chris-strohm-bloomberg/", "name": "Michael Riley, Chris Strohm, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "A key figure is missing in the court documents outlining the biggest computer attack ever of the U.S. financial system: the actual hacker.", "body": null }, { "uri": "/2015/10/14/russian-cyber-attacks-have-become-more-brazen-and-more-destructive/", "title": "Russian cyber attacks have become more brazen and more destructive", "byline": "Michael Riley and Jordan Robertson", "kicker": "News", "prettyDate": "October 14, 2015", "timeToRead": "13 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/michael-riley/", "name": "Michael Riley" }, { "webUrl": "/author/profile/jordan-robertson/", "name": "Jordan Robertson" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Russian computer attacks have become more brazen and more destructive as the country grows increasingly at odds with the U.S. and European nations over military goals first in Ukraine and now Syria.", "body": null }, { "uri": "/2015/08/07/american-airlines-sabre-allegedly-hit-in-hacks-backed-by-china/", "title": "American Airlines, Sabre allegedly hit in hacks backed by China", "byline": "Jordan Robertson, Bloomberg, Michael Riley, Bloomberg", "kicker": "News", "prettyDate": "August 07, 2015", "timeToRead": "7 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/jordan-robertson-bloomberg-michael-riley-bloomberg/", "name": "Jordan Robertson, Bloomberg, Michael Riley, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Sabre confirmed that its systems were breached recently, while American Airlines said it is investigating whether hackers had entered its computers.", "body": null }, { "uri": "/2015/07/29/hackers-that-hit-u-s-office-of-personnel-managemen/", "title": "Hackers that hit U.S. Office of Personnel Management said to breach United Airlines", "byline": "Michael Riley, Bloomberg, Jordan Robertson, Bloomberg", "kicker": "News", "prettyDate": "July 29, 2015", "timeToRead": "6 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/michael-riley-bloomberg-jordan-robertson-bloomberg/", "name": "Michael Riley, Bloomberg, Jordan Robertson, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "The previously unreported breach adds airlines to a growing list of strategic U.S. industries and institutions that have been compromised.", "body": null }, { "uri": "/2015/07/13/the-vast-cyber-attack-in-washington-began-with-travel-reservations/", "title": "The vast cyber attack in Washington began with travel reservations", "byline": "Chris Strohm, Bloomberg, Michael Riley, Bloomberg, Jordan Robertson, Bloomberg", "kicker": "News", "prettyDate": "July 13, 2015", "timeToRead": "6 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/chris-strohm-bloomberg-michael-riley-bloomberg-jordan-robertson-bloomberg/", "name": "Chris Strohm, Bloomberg, Michael Riley, Bloomberg, Jordan Robertson, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Some investigators suspect the attacks were part of a sweeping campaign to create a database on Americans that could be used to obtain commercial and government secrets.", "body": null }, { "uri": "/2015/06/05/chinas-hack-of-u-s-data-tied-to-health-care-record-thefts/", "title": "China’s hack of U.S data tied to health-care record thefts", "byline": "Michael Riley and John Walcott, Bloomberg", "kicker": "News", "prettyDate": "June 05, 2015", "timeToRead": "5 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/michael-riley/", "name": "Michael Riley" }, { "webUrl": "/author/profile/john-walcott-bloomberg/", "name": "John Walcott, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Concern is data could be used to target workers with sensitive information who could be subjects of traditional blackmail tools.", "body": null }, { "uri": "/2015/02/06/anthem-attack-could-be-work-of-china-backed-hacker/", "title": "Anthem attack could be work of China-backed hackers", "byline": "Michael Riley, Bloomberg, Jordan Robertson, Bloomberg", "kicker": "News", "prettyDate": "February 06, 2015", "timeToRead": "6 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/michael-riley-bloomberg-jordan-robertson-bloomberg/", "name": "Michael Riley, Bloomberg, Jordan Robertson, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Investigators of Anthem Inc.s data breach are pursuing evidence that points to Chinese state-sponsored hackers who are stealing personal information from health-care companies for purposes other than pure profit.", "body": null }, { "uri": "/2014/12/16/sony-was-warned-about-a-large-network-breach-last-year/", "title": "Sony was warned about a large network breach last year", "byline": "Jordan Robertson, Bloomberg, Michael Riley, Bloomberg", "kicker": "News", "prettyDate": "December 16, 2014", "timeToRead": "5 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/jordan-robertson-bloomberg-michael-riley-bloomberg/", "name": "Jordan Robertson, Bloomberg, Michael Riley, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Sony was warned a year ago that hackers had infiltrated its network and were stealing gigabytes of data several times a week.", "body": null } ] } }
From gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download ResourceFrom OneShield
Commercial insurers have faced many challenges in 2023 due to a record number of billion-dollar weather events, inflation and a tightening reinsurance market. The increasing focus on individual risk levels in the reinsurance market requires insurers to embrace new technology, data, and tools to improve loss ratios and customer satisfaction. This eBook explores solutions to navigate these challenges and enhance risk management capabilities.
Download ResourceFrom Origami Risk
Explore common pitfalls in core insurance transformations and how to avoid them. Discover comprehensive strategies and best practices to successfully plan and execute a cloud implementation in this comprehensive white paper.
Download ResourceFrom gryphon.ai
This guide empowers insurance carriers and risk managers to navigate complex regulations, safeguarding their brands from costly SMS and text messaging penalties.
Download ResourceFrom Origami Risk
Navigating the complexities of P&C core insurance digitization is no easy task. Explore the critical decisions between building or buying and how to achieve operational excellence in this white paper.
Download ResourceFrom Melissa
As more customers “unbundle” their insurance products and spread their business among many carriers, agents must look for creative strategies to retain and grow business. Download this white paper to learn top strategies to ensure success in 2024.
Download ResourceFrom gryphon.ai
Empower your organization to excel in marketing outreach without compromising compliance. This guide offers a roadmap to implement a best-in-class contact compliance strategy so that your organization can continue successful marketing campaigns, ethically and legally.
Download ResourceFrom gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download ResourceFrom OneShield
Commercial insurers have faced many challenges in 2023 due to a record number of billion-dollar weather events, inflation and a tightening reinsurance market. The increasing focus on individual risk levels in the reinsurance market requires insurers to embrace new technology, data, and tools to improve loss ratios and customer satisfaction. This eBook explores solutions to navigate these challenges and enhance risk management capabilities.
Download ResourceFrom Origami Risk
Explore common pitfalls in core insurance transformations and how to avoid them. Discover comprehensive strategies and best practices to successfully plan and execute a cloud implementation in this comprehensive white paper.
Download ResourceFrom gryphon.ai
This guide empowers insurance carriers and risk managers to navigate complex regulations, safeguarding their brands from costly SMS and text messaging penalties.
Download ResourceFrom Origami Risk
Navigating the complexities of P&C core insurance digitization is no easy task. Explore the critical decisions between building or buying and how to achieve operational excellence in this white paper.
Download ResourceFrom Melissa
As more customers “unbundle” their insurance products and spread their business among many carriers, agents must look for creative strategies to retain and grow business. Download this white paper to learn top strategies to ensure success in 2024.
Download ResourceFrom gryphon.ai
Empower your organization to excel in marketing outreach without compromising compliance. This guide offers a roadmap to implement a best-in-class contact compliance strategy so that your organization can continue successful marketing campaigns, ethically and legally.
Download ResourceFrom gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download Resource