Business

Major brands face ‘treacherous’ cybersecurity landscape and rising threats, experts warn

According to the “treacherous” cybersecurity scene, an ambush will be set for the “treacherous” cyber security “by blind spots throughout its network,” according to the CEO of Cloud Security COMPANY AVIATRIX DOUG MERRITT.

Merritt said the recent attacks on major brands such as AT & T, North Face and Cartier highlight what the Internet criminals can today, “especially with increased adoption of artificial intelligence.”

Emmy Bon, online safety lawyer at MCAfee Computer Safety Company, described the attacks on major service providers such as airlines and insurance companies as “a clear reminder of the extent of Internet attacks today for the abundant and developed.”

Hawaiian airline was injured in electronic attack in late June. (Kevin Carter / Getty Emmy / Getty Em.

The electronic attack hits a major airline, up to 6 million exposed customer files

While Bon said that airlines are a “major goal” given that a huge amount of sensitive information is stored in one place, every weak industry.

“From health care and financing to retail and technology, attackers are constantly looking for weaknesses to exploit them, knowing the extent of the value of consumer data,” Bonn said. “Electronic criminals can use this treasure from sensitive information to impersonate the personality of people and commit fraud with stolen identities, or they may pack and sell personal data on the dark web network to the highest bid.”

Hawaiian Airlines and Australian carrier companies have been exposed to various electronic attacks within a week of each other. Hawaii was injured at the end of June, followed by Kantas in early July.

Qantas Airlines Boeing 737

Qantas Airlines Boeing 737 lines sit at the local Sydney airport station on a rainy day. (David Gray / AFP via Getty Images / Getty Images)

The attacks came at the same time as the FBI published on X that the “Spider Spider” e -spider group “expanded its targeting to include the aviation sector.”

AFLAC warned last month that bad actors stole the personal data of their customers in the United States after the insurance provider was the latest blow to the ongoing piracy. Targeting the insurance industry.

The essence of the issue, according to Maryet, is cloud security, which he said was “a fundamental shift in the model that most organizations have not been fully recognized.”

The notorious hacker sets scenes on the airline industry in a worrying security threat

Today, infiltrators have more ways to infiltrate into the network, according to Maryet.

Previously, most data remained within a safe company network. Now, the data is moving via the open Internet, which means that the infiltrators have the opportunity to intercept it, adding that many institutions leave 50 % to 80 % of their systems “by not properly securing the cloud work burden communications.”

Meret said that the case stems from three critical changes in how computing works today. For example, he said that the company’s application pulls something from the cloud, as it uses the public internet, not a private network.

You see a man on a computer while you see fake HTML pages and infiltrators programs on screens in front of him.

Infiltrators (Annette Riedl / Picure Alliance via Getty Images / Getty Images)

The traditional security perimeter has not disappeared. But instead of protecting some entry points, companies face thousands or even hundreds of thousands of entry points, many of which are linked to the Internet, and can be intercepted by infiltrators, Merritt said.

“This is the new battlefield organizations to cross if they want to stay at the forefront of bad actors looking to exploit the weaknesses of cloud security,” Merrit said.

This confirms why it is also important for consumers to also guarantee that they take steps to protect themselves, according to Bunn, who have determined that “staying safe online not only returns to companies.”

Get Fox Business on the Go by clicking here

“Even if you are not directly affected by rags, it is still possible to expose your data and use them in deceptive fraud or identity theft,” Bonn said.

To help avoid this, BUNN suggested that consumers use strong and unique passwords and to run a bilateral agency if possible. It is also important to be careful about dealing with unexpected texts or email messages that require personal information and use tools to help discover links or risky messages before causing harm.

Don’t miss more hot News like this! Click here to discover the latest in Business news!

2025-07-13 18:51:00

Related Articles

Back to top button