#Cyber-attacks
Explore tagged Tumblr posts
nationallawreview · 4 months ago
Text
OCR Proposed Tighter Security Rules for HIPAA Regulated Entities, including Business Associates and Group Health Plans
As the healthcare sector continues to be a top target for cyber criminals, the Office for Civil Rights (OCR) issued proposed updates to the HIPAA Security Rule (scheduled to be published in the Federal Register January 6). It looks like substantial changes are in store for covered entities and business associates alike, including healthcare providers, health plans, and their business…
0 notes
otiskeene · 8 months ago
Text
All About Advanced Persistent Threat (APT): Definition, Types And Examples
Tumblr media
Have you ever seen the Netflix series Black Mirror? It’s an anthology that delves into the darker side of human nature, often intertwined with technological advancements. The first episode, titled "The National Anthem," presents a shocking scenario where a Prime Minister is forced into a harrowing situation after a member of the royal family, Princess Susannah, is kidnapped. The episode highlights how a leader's vulnerability can have severe consequences on a national level.
Just as the episode explores a national crisis, there are numerous security threats in the digital space. One of the most severe types is Advanced Persistent Threats (APTs), sophisticated cyber-attacks typically supported by organized criminal groups. These attacks aim to infiltrate a network and maintain a long-term presence, causing significant risks for both organizations and governments.
While discussing such topics can be unsettling, it's vital to raise awareness about APTs and their potential impact on our security and privacy. Understanding these threats allows us to better prepare and safeguard ourselves against them.
In this article, we will delve into the concept of Advanced Persistent Threats, exploring their definition, various types, and real-world examples.
What Is an Advanced Persistent Threat?
An Advanced Persistent Threat (APT) is a highly sophisticated cyber-attack conducted by skilled hackers, typically targeting high-profile organizations. Unlike typical cyber-attacks, APTs are not designed to cause immediate damage. Instead, they infiltrate a network and remain undetected for extended periods—sometimes months or even years.
The primary objective of an APT attack is to gain unauthorized access to a network and maintain this access over time, allowing the attackers to extract valuable data or disrupt critical systems. These attacks pose significant risks, including financial losses, reputational damage, and the theft of sensitive information.
Now that we have an overview of what Advanced Persistent Threats are, let's explore the different types of APTs.
Types of Advanced Persistent Threats
Advanced Persistent Threats can manifest in various forms, each posing unique challenges and risks. Here are some common types of APTs:
Account Takeover: This attack involves cybercriminals gaining unauthorized access to an individual's or organization's account, such as email, social media, or banking accounts. Once they gain access, they can steal sensitive data, initiate fraudulent transactions, or spread malware.
Ransomware: A form of malware that encrypts the victim's data, making it inaccessible until a ransom is paid. Ransomware attacks can cripple an organization's operations, leading to significant financial losses.
Data Breach: APTs may infiltrate a network with the intent to steal sensitive data, such as customer information, trade secrets, or intellectual property. Data breaches can result in regulatory fines, legal liabilities, and loss of customer trust.
Social Engineering: In this type of attack, cybercriminals manipulate or deceive individuals into revealing sensitive information or performing actions that compromise security. Tactics like phishing emails, pretexting, or baiting are often used by APTs to gain a foothold within an organization.
Business Email Compromise: In this scam, attackers impersonate executives or trusted entities to trick employees into transferring funds or revealing sensitive information. This can lead to substantial financial losses and damage to an organization's reputation.
Understanding these types of APTs is crucial in defending against them. By implementing robust cybersecurity measures, educating employees, and maintaining vigilance, organizations can reduce their risk of falling victim to these threats.
Next, let's look at some real-world examples of Advanced Persistent Threats to better understand their impact.
Examples of Advanced Persistent Threats
Here are a few real-world examples that demonstrate the complexity and impact of APTs:
Hafnium: This Chinese state-sponsored APT group, discovered by Microsoft, exploited vulnerabilities in Microsoft Exchange Server to access email accounts and steal sensitive data. Hafnium has targeted various industries, including defense, healthcare, and education.
Stuxnet: A highly sophisticated worm designed to disrupt Iran's nuclear program, Stuxnet was delivered via an infected USB device and targeted the industrial control systems used for uranium enrichment, causing significant damage to centrifuges.
GhostNet: Originating in China, this APT used spear-phishing emails containing malware to compromise computers in over 100 countries. The attackers focused on gaining access to government ministries and embassy networks, turning compromised machines into surveillance tools.
These examples highlight the global reach and potentially devastating consequences of APTs. They serve as a reminder of the importance of robust cybersecurity measures and the need for constant vigilance against these sophisticated threats.
Final Thoughts
The episode "The National Anthem" from Black Mirror is a stark reminder of the far-reaching consequences of an APT attack. When critical systems and individuals are compromised, the impact can be devastating. To mitigate these risks, organizations must remain vigilant, implement multi-layered security measures, and foster a culture of cybersecurity awareness.
As Robert Mueller wisely said, "There are only two types of companies: those that have been hacked and those that will be."
Hopefully, this exploration of Advanced Persistent Threats will help you better understand and defend against such cyber threats.
0 notes
nicolae · 10 months ago
Text
Threats of Artificial Intelligence for Cybersecurity
Sfetcu, Nicolae (2024), Threats of Artificial Intelligence for Cybersecurity, IT & C, 3:3, ppp,   Abstract Artificial intelligence enables automated decision-making and facilitates many aspects of daily life, bringing with it improvements in operations and numerous other benefits. However, AI systems face numerous cybersecurity threats, and AI itself needs to be secured, as cases of malicious…
0 notes
signode-blog · 11 months ago
Text
Guard Against Financial Frauds as Data Leakage Becomes Rampant: Insights from RBI Officials
In an era where digital transactions and online banking have become the norm, safeguarding financial information has never been more critical. The Reserve Bank of India (RBI) officials recently highlighted the increasing threats of financial fraud due to rampant data leakage. This blog post delves into the nuances of this pressing issue and offers strategies to protect your financial data. The…
Tumblr media
View On WordPress
0 notes
thxnews · 1 year ago
Text
Wargaming Expertise Shared with International Delegates
Tumblr media
UK and Finland Unite in Wargaming
In an era where the battlefield is as much digital as it is physical, the UK's Defence Experimentation and Wargaming Hub has taken a significant step forward. Recently, it played host to a team from the Hybrid Centre of Excellence (HCoE) in Finland, marking a pivotal moment in defence collaboration and strategic innovation. This gathering was more than a meeting of minds; it was a fusion of cutting-edge methodologies designed to prepare for the future of warfare.  
Key Insights from the Visit
The visit emphasized the importance of combining traditional defence strategies with modern, hybrid approaches. As adversaries become more sophisticated, employing a mix of conventional and unconventional tactics, the need for comprehensive preparedness is undeniable. Moreover, the collaboration between the UK's Strategic Command and Finland's HCoE serves as a testament to the global effort required to stay ahead of emerging threats.   The Role of the Defence Experimentation and Wargaming Hub Located at Southwick Park, Hampshire, the Hub is at the forefront of developing tactical responses to hybrid threats. This encompasses everything from cyber-attacks and disinformation campaigns to economic coercion. Moreover, it's a space where technology meets strategy, and where the UK's defence capabilities are honed for the complexities of modern conflict.   Hybrid Centre of Excellence: A Global Network Established in 2017, the HCoE serves as a beacon of expertise and training for EU and NATO countries. Its involvement with the Wargaming Hub not only brings a wealth of knowledge but also reinforces the importance of international cooperation in defence strategy.  
Future Collaborations and Their Impact
The HCoE is expected to visit the Defence Experimentation and Wargaming Hub, paving the way for ongoing partnerships. Such collaborations are crucial for enhancing the collective capacity to address hybrid threats, ensuring that allied nations possess the knowledge and skills to protect global security.   The Benefits of Wargaming Wargaming is not just about simulating conflict scenarios; rather, it's about anticipation, strategy, and decision-making. The Defence Experimentation and Wargaming Hub offer a state-of-the-art facility where defence personnel can test hypotheses and strategies. Consequently, this leads to faster, evidence-based decisions.  
A Unified Front Against Hybrid Threats
As the world navigates the complexities of 21st-century conflict, the collaboration between the UK's Defence Experimentation and Wargaming Hub and Finland's Hybrid Centre of Excellence stands as a beacon of strategic innovation. Through sharing expertise and resources, these institutions are setting the stage for a more secure future. This demonstrates that in the face of evolving threats, unity and preparedness are our greatest assets.   Sources: THX News & Strategic Command. Read the full article
0 notes
kashif-14 · 1 year ago
Text
Susceptible to cyber-attacks, and Accountants must now consider cyber security as part of their day-to-day work.
“Accountants are well placed to advise on the steps a business should take to protect itself – cyber security isn’t just about technology and computers: it involves people, information, systems, processes and culture too”
John Berriman – PwC
Almost every week, another high-profile cyber security breach affecting firms all around the world is reported. And the number of events is rising: according to a recent global survey performed by PwC, the number of assaults reported by midsize businesses – those with revenues of between £64.5 million ($100 million) and £645.6 million ($1 billion) – increased by 64 percent in 2014 compared to 2013.
These attacks cost a lot of money. According to PwC, a single data breach costs US businesses more than $500,000 on average. According to John Berriman, chairman of PwC’s cyber security practice, “the average cost of the most severe cyber security breach for a big organization now starts at £1.46 million, although that figure doesn’t take into account the impact a breach has on an organization’s reputation and relationship with its stakeholders.”
According to PwC research for the UK’s Department for Business, Innovation and Skills, smaller businesses are just as likely to be harmed, with the cost of a serious breach ranging from £65,000 to £115,000 in the UK.
Cyber criminals are particularly interested in accountants and other financial institutions. Financial institutions, according to PwC, are almost 30% more likely to be targeted than other businesses.
‘It’s because they deal with high-value business data and sensitive financial information on a regular basis,’ Frank Morey, CEO of security company Virtues Risk Management, explains. ‘There have been a series of targeted attacks against the industry, the most recent of which was the Morgan Stanley breach, which exposed the personal information of 900 of its high-net-worth clients online.’
Kaspersky Lab, a Russian security firm, reported the largest organized cyber-attack on financial institutions to date earlier this year. A global gang of cyber hackers entered more than 100 banks and other financial institutions in 30 countries, stealing £645.6 million ($1 billion) in total from the banks rather than their clients.
Accountants, both in practice and in industry, must be able to recognize and respond to cyber security threats, rather than ignoring the matter in the mistaken notion that cyber security is the realm of their IT departments or that their company’s software would protect them from intrusions.
‘While products like SAP and Oracle have built-in cyber security features that can reduce the risk of data breaches, it’s still critical that you remain vigilant in your daily job,’ says Phil Sheridan, managing director of Robert Half UK.
Cyber Attacks
‘Hacking and phishing assaults are frequently launched by an employee clicking on a link in an email,’ explains Matt White, senior manager in KPMG’s cyber security division.
Another typical way for malware to enter an organization is through opening suspicious email attachments. ‘Word, Excel, and PDF documents all make it simple to embed harmful code that can subsequently be abused,’ explains Greg Sim, CEO of security technology firm Glass wall Solutions.
In fact, while cyber-attacks are becoming more sophisticated, lax security knowledge among personnel is the leading cause of security breaches. One example is bad password behavior. According to Medium, a password management company, 90 percent of employee passwords are so predictable that they can be broken in six hours. Furthermore, 18% of employees disclose their passwords with coworkers.
Many employees have their work emails redirected to their personal email accounts. However, because personal email services do not have the same security protections as corporate email services, hackers frequently hunt for corporate data through personal email, which is easily available to them.
Cyber security
While no company is immune to cyber-attacks, there is a lot that can be done to prevent them.
‘Anything linked to the storage or transfer of data – how it is safeguarded and accessible, or how it is prevented from being accessed,’ explains White. ‘Different nations have different policies and laws about how information and data is used, with many “internet-related services” crossing several borders, so it’s not that clear,’ he adds.
Accountants can assist their clients in this area.
‘Accountants are ideally placed to advise on the steps a firm should take to defend itself – cyber security is about people, information, systems, procedures, and culture as well,’ adds Berriman.
PwC is attempting to raise awareness and prepare businesses.
‘For example, our Breach Aid event response service assists organizations in preparing for and responding to large incidents, as well as the legal and regulatory consequences of a breach,’ Berriman notes. ‘We can also monitor, analyses, and respond to threats on our clients’ networks and systems thanks to our London-based cyber security labs.’
Accountants can also take steps to protect themselves and their firms.
‘To be prepared for a wide range of risks, accountants must understand their firm’s IT security policies, including policies and processes for ensuring safe online practices, as well as procedures for reporting and dealing with breaches,’ Brown writes.
‘Accountants may also require additional cyber awareness training. As with most things, prevention is far preferable to cure.’ For information visit https://hmaa.ae/businesses-are-increasingly-susceptible-to-cyber-attacks/
You Can Count On Us!
0 notes
akgvgassociates · 2 years ago
Text
Cyber-Attacks: Understanding the Threat Landscape and Defending Your Digital World
Tumblr media
Cyber-attacks have become an ever-present threat in our increasingly digital world. This comprehensive guide delves into the complex and evolving landscape of cyber threats, providing essential insights into the tactics, techniques, and motivations behind these attacks. Learn how to protect your digital assets and personal information through a deeper understanding of the cybersecurity measures, strategies, and best practices required to safeguard your online presence.
Link:- https://www.akgvg.com/blog/countering-cyber-attacks-with-seqrite-endpoint-security/
Visit our social media platform:- Linkedin:- https://www.linkedin.com/in/akgvg-and-associates-8a2680176/
0 notes
dr-amer · 2 years ago
Text
الأمن السيبراني والتحول في النظام الدولي
الأمن السيبراني والتحول في النظام الدولي الأمن السيبراني والتحول في النظام الدولي المؤلف: هبه جمال الدين أستاذ العلوم السياسية المساعد، معهد التخطيط القومى. مصر المستخلص: يحظى الأمن والقضاء السيبراني باهتمام العديد من الباحثين خاصة مع ظهور تهديدات قد تصل لحرب إلكترونية. وفي هذا السياق، اهتم علماء السياسة بتفسير هذه القضايا، الأمر الذي خلق ساحة من الجدل والنقاش حول تأثير الأمن السيبراني على شكل…
Tumblr media
View On WordPress
1 note · View note
alewaanewspaper1960 · 2 years ago
Text
الأمن السيبراني والتحول في النظام الدولي
الأمن السيبراني والتحول في النظام الدولي الأمن السيبراني والتحول في النظام الدولي المؤلف: هبه جمال الدين أستاذ العلوم السياسية المساعد، معهد التخطيط القومى. مصر المستخلص: يحظى الأمن والقضاء السيبراني باهتمام العديد من الباحثين خاصة مع ظهور تهديدات قد تصل لحرب إلكترونية. وفي هذا السياق، اهتم علماء السياسة بتفسير هذه القضايا، الأمر الذي خلق ساحة من الجدل والنقاش حول تأثير الأمن السيبراني على شكل…
Tumblr media
View On WordPress
0 notes
reality-detective · 2 months ago
Text
What if the cyber attack on X was just a prelude of things to come? 🤔
161 notes · View notes
destielmemenews · 2 months ago
Text
Tumblr media
"Eric Noonan, CEO of cybersecurity provider CyberSheath, told CNN it’s likely too early to tell if an attack caused the issues.
“One of the things that should always be taken with a grain of salt is any statements made in the short period of time, immediately after, or even in this case during an attack,” Noonan said.
Musk has a history of attributing technical snafus to cyberattacks. When his conversation with Donald Trump on X started 42 minutes late in August 2024, he said there was a “probability” of an attack."
CNN
Sky News
POLITICO
189 notes · View notes
otiskeene · 8 months ago
Text
Top 5 Email Encryption Software Of 2024
Tumblr media
Welcome to TechDogs! No, it’s not a mistake, but rather an encrypted message using the Caesar cipher with a shift of one letter. Wondering what that means?
Each letter in the original text is shifted one position forward in the alphabet—so A turns into B, B into C, C into D, and so forth.
Would you like us to encrypt your message now?
Many of us have likely tried this in our childhood to send secret notes to friends. However, with modern technology, several tools can easily decode such simple encryptions. The Caesar cipher is straightforward to break—you managed it, didn’t you?
In today’s digital era, businesses face similar challenges when sending secure messages. With countless sensitive documents and confidential information shared via emails daily, businesses must ensure that these communications are protected, especially given the rising number of cyber-attacks.
Introducing Email Encryption Software—a robust solution that provides end-to-end security for business communications, ensuring sensitive data remains safe during transmission and storage. This software helps organizations comply with regulations and mitigate cyber risks.
If you’re in search of Email Encryption Software for your business, keep reading as we list the top 5 options for 2024!
As businesses face increasing cyber threats in today’s digital age, email encryption becomes essential for protecting sensitive communications. In this guide, we’ll explore the top 5 Email Encryption Software solutions of 2024, offering robust security, compliance support, and peace of mind in an ever-evolving cyber landscape.
Top 5 Email Encryption Software Of 2024
To stay ahead of cyber threats, businesses must prioritize strong cybersecurity measures. Email Encryption Software is a key line of defense, safeguarding sensitive communications and protecting against data breaches. Here are the top 5 Email Encryption Software solutions for 2024.
Tool 1: Proton Mail Founded in 2013 and headquartered in Geneva, Switzerland, Proton is a leading provider of secure email services with over 400 employees. Clients include organizations such as the United Nations and Amnesty International. Proton Mail, making its first appearance on our list, offers end-to-end encrypted email with zero-access encryption. Not even Proton Mail can access user data. It features Swiss privacy protection and integrates with other Proton services like Proton Calendar and VPN.
Tool 2: Proofpoint Email Security And Protection Based in Sunnyvale, California, and founded in 2002, Proofpoint is a leader in email security with over 4,000 employees. The company serves clients like Perrigo and Pacific Life. Proofpoint’s email encryption solution provides advanced threat protection, combining machine learning and sandboxing to block threats in real-time. Its Targeted Attack Protection and Email Authentication tools ensure secure communications.
Tool 3: Avanan Cloud Email Security Avanan, based in New York and founded in 2014, is a rising star in cloud email security. With over 4,000 customers, Avanan offers advanced protection for cloud email services like Office 365. It uses AI/ML to continuously update its detection capabilities and provides unique features like File Sanitization to prevent malware.
Tool 4: Virtru Virtru, founded in 2012 and based in Washington D.C., provides end-to-end encryption for emails and files, serving industries like healthcare and finance. Virtru integrates seamlessly with email clients like Gmail and Outlook, offering features like granular access controls and persistent file protection, ensuring secure communications across platforms.
Tool 5: RMail By RPost Founded in 2000 and headquartered in Chattanooga, RMail provides email encryption, e-signature, and secure file transfer services. RMail’s technology ensures secure email exchanges with robust encryption standards. Its comprehensive tracking and compliance features make it a trusted choice for secure communications.
Conclusion Investing in Email Encryption Software is crucial for businesses to secure their communications and protect against cyber threats. With these top 5 Email Encryption Software solutions, you can ensure your sensitive information remains protected in an increasingly digital world.
0 notes
political-us · 1 month ago
Text
Tumblr media
131 notes · View notes
wanderingcas · 2 years ago
Text
man i wish i could buy each volunteer at ao3 a bottle of the most expensive liquor of their choice because oh my GOD they are tireless today. they are heroes. they are the real ones
2K notes · View notes
dxrkone · 9 months ago
Text
Tumblr media
CYBRR-ATTCKK
185 notes · View notes
cringywhitedragon · 11 months ago
Text
Heads up folks, NicoNicoDouga is currently down due to a large scale cyberattack
The attack happened on the 8th and the site is still down in terms of video streaming. Apparently there were reports of Ransomware being used during the attack.
The site is still “down” but the blog part is back up but from the report, videos and content posted are ok so do not fret. The site is still down as of this post (save for the blog) and it seems they are working their hardest to fix it and do damage control.
Here is a rough translation of their most recent post:
Report and apology regarding cyberattack on our services
As announced in Niconico Info dated June 8th, 2024, Dwango Co., Ltd. (Headquarters: Chuo-ku, Tokyo; President and CEO: Takeshi Natsuno) has been unable to use the entire Niconico service operated by our company since the early morning of June 8th. It has been confirmed that this outage was caused by a large-scale cyberattack, including ransomware, and we are currently temporarily suspending use of the service and conducting an investigation and response to fully grasp the extent of the damage and restore it.
After confirming the cyberattack, we immediately took emergency measures such as shutting down the relevant servers, and have set up a task force to fully clarify the damage, determine the cause, and restore the system. We would like to report the findings of the investigation to date and future responses as follows.
We sincerely apologize to our users and related parties for the great inconvenience and concern caused.
Response history>
Around 3:30 a.m. on June 8, a malfunction occurred that prevented all of our web services, including our "Nico Nico" and "N Preparatory School" services, from working properly. After an investigation, it was confirmed that the malfunction was caused by a cyber attack, including ransomware, at around 8 a.m. on the same day. A task force was set up on the same day, and in order to prevent the damage from spreading, we immediately cut off communication between servers in the data center provided by our group companies and shut down the servers, temporarily suspending the provision of our web services. In addition, since it was discovered that the attack had also extended to our internal network, we suspended the use of some of our internal business systems and prohibited access to the internal network.
As of June 14, we are currently investigating the extent of the damage and formulating recovery procedures, aiming for a gradual recovery.
June 8, 2024
We have begun an investigation into the malfunction that prevented all of our "Nico Nico" services from working properly and the failure of some of our internal systems.
We have confirmed that the cause of the failure was encryption by ransomware. "Nico Nico" services in general and some internal business systems suspended and servers were shut down
A task force was established
First report "Regarding the situation in which Nico Nico services are unavailable" was announced
June 9, 2024
Contacted the police and consulted with external specialist agencies
Kabukiza office was closed
KADOKAWA announced "Regarding the occurrence of failures on multiple KADOKAWA Group websites"
June 10, 2024
Reported to the Personal Information Protection Commission (first report)
Second report "Regarding the situation in which Nico Nico services are unavailable" was announced
June 12, 2024
Reported the occurrence of the failure to the Kanto Regional Financial Bureau (Financial Services Agency)
June 14, 2024
This announcement
This cyber attack by a third party was repeated even after it was discovered, and even after a server in the private cloud was shut down remotely, the third party was observed to be remotely starting the server and spreading the infection. Therefore, the power cables and communication cables of the servers were physically disconnected and blocked. As a result, all servers installed in the data centers provided by the group companies became unusable. In addition, to prevent further spread of infection, our employees are prohibited from coming to the Kabukiza office in principle, and our internal network and internal business systems have also been shut down.
In addition to public cloud services, Niconico uses private cloud services built in data centers provided by KADOKAWA Group companies, to which our company belongs. One of these, a data center of a group company, was hit by a cyber attack, including ransomware, and a significant number of virtual machines were encrypted and became unavailable. As a result, the systems of all of our web services, including Niconico, were shut down.
This cyber attack by a third party was repeated even after it was discovered, and even after a server in the private cloud was shut down remotely, the third party was observed to be remotely starting the server and spreading the infection. Therefore, the power cables and communication cables of the servers were physically disconnected and blocked. As a result, all servers installed in the data centers provided by the group companies became unusable. In addition, to prevent further spread of infection, our employees are prohibited from coming to the Kabukiza office in principle, and our internal network and internal business systems have also been shut down.
The Niconico Video system, posted video data, and video distribution system were operated on the public cloud, so they were not affected. Niconico Live Broadcasting did not suffer any damage as the system itself was run on a public cloud, but the system that controls Niconico Live Broadcasting's video distribution is run on a private cloud of a group company, so it is possible that past time-shifted footage, etc. may not be available. We are also gradually checking the status of systems other than Niconico Douga and Niconico Live Broadcasting.
■ Services currently suspended
Niconico Family services such as Niconico Video, Niconico Live Broadcast, and Niconico Channel
Niconico account login on external services
Music monetization services
Dwango Ticket
Some functions of Dwango JP Store
N Preparatory School *Restored for students of N High School and S High School
Sending gifts for various projects
■ About Niconico-related programs
Until the end of July, official Niconico live broadcasts and channel live broadcasts using Niconico Live Broadcast and Niconico Channel will be suspended.
Considering that program production requires a preparation period and that Niconico Live Broadcast and Niconico Channel are monthly subscription services, we have decided to suspend live broadcasts on Niconico Live Broadcast until the end of July. Depending on the program, the broadcast may be postponed or broadcast on other services.
The date of resumption of Niconico services, including Niconico Live Broadcast and Niconico Channel, is currently undecided.
Niconico Channel Plus allows viewing of free content without logging in. Paid content viewing and commenting are not available.
■ About the new version "Nico Nico Douga (Re: Kari)" (read: nikoniko douga rikari)
While "Nico Nico" is suspended, as the first step, we will release a new version of "Nico Nico Douga (Re: Kari)" at 3:00 p.m. on June 14, 2024. Our development team voluntarily created this site in just three days, and it is a video community site with only basic functions such as video viewing and commenting, just like the early days of Niconico (2006). In consideration of the load on the service, only a selected portion of the videos posted on Niconico Video is available for viewing. The lineup is mainly popular videos from 2007, and you can watch them for free without an account.
■About the Niconico Manga app
We have already confirmed that many systems were not affected, and we are considering resuming the service with a reduced-function version that allows basic functions such as reading manga, commenting, and adding to favorites. We aim to restore the service by June 2024.
If any new facts become known in the future, we will report them on Niconico Info, Official X, our company website, etc. as they become available. We appreciate your understanding and cooperation.
Added 6/10]
Thank you for your continued patronage. This is the Niconico management team.
Due to the effects of a large-scale cyber attack, Niconico has been unavailable since the early morning of June 8th.
We sincerely apologize for the inconvenience.
As of 6:00 p.m. on June 10th, we are working to rebuild the entire Niconico system without being affected by the cyber attack, in parallel with an investigation to grasp the full extent of the damage.
We have received many inquiries from you, such as "Will premium membership fees and paid channel membership fees be charged during the service suspension period?" and "What will happen to the time shift deadline for live broadcasts?". We are currently in the process of investigating the impact, so we cannot answer your questions, but we will respond sincerely, so please wait for further information.
Our executive officer Shigetaka Kurita and CTO Keiichi Suzuki are scheduled to explain the expected time until recovery and the information learned from the investigation up to that point this week.
We will inform you again about this as soon as we are ready.
■ Services currently suspended
Niconico Family Services such as Niconico Video, Niconico Live Broadcast, Niconico Channel, etc.
Niconico Account Login on External Services
[Added 2024/06/10 18:00]
Gifts for various projects (due to the suspension of related systems)
■ Programs scheduled to be canceled/postponed (as of June 10)
Programs from June 10 to June 16
■ Current situation
In parallel with the recovery work, we are investigating the route of the attack and the possibility of information leakage.
No credit card information has been leaked (Niconico does not store credit card information on its own servers).
The official program "Monthly Niconico Info" scheduled for June 11 at 20:00 will be broadcast on YouTube and X at a reduced scale. During this program, we will verbally explain the current situation in an easy-to-understand manner. (※There is no prospect of providing additional information, such as detailed recovery dates, during this program.)
"Monthly Niconico Info" can be viewed at the following URL. YouTube → https://www.youtube.com/@niconico_news X (formerly Twitter) → https://x.com/nico_nico_info
The latest information will be posted on Niconico Info and the official X (formerly Twitter).
We deeply apologize for the inconvenience caused to users and content providers who regularly enjoy our videos and live broadcasts. We ask for your understanding and cooperation until the issue is resolved.
Published on 6/8]
Thank you for your continued patronage. This is the Niconico management team.
Currently, Niconico is under a large-scale cyber attack, and in order to minimize the impact, we have temporarily suspended our services.
We are accelerating our investigation and taking measures, but we cannot begin recovery until we are confident that we have completely eliminated the effects of the cyber attack and our safety has been confirmed. We do not expect to be able to restore services at least this weekend.
We sincerely apologize for the inconvenience.
We will inform you of the latest situation again on Monday (June 10, 2024).
■ Suspended services
Niconico family services such as Niconico Video, Niconico Live Broadcast, and Niconico Channel
Niconico account login on external services
■ Current situation
In parallel with the recovery work, we are investigating the route of the attack and the possibility of information leakage.
No credit card information has been confirmed to have been leaked (Niconico does not store credit card information on its own servers).
Future information will be announced on Niconico Info and Official X (formerly Twitter) as it becomes available.
We deeply apologize to all users who were looking forward to the video posts and live broadcasts scheduled for this weekend. We ask for your understanding and cooperation until the response is complete.
101 notes · View notes