Press Release
Ransomware attack, according to Rackspace, is what triggered the outage.
Today, Texas-based Rackspace, a supplier of cloud computing services, disclosed that a Hosted Exchange outage that has been called a “isolated incident” is actually the result of a ransomware attack.
In an addendum to the initial incident report, the business stated, “As you know, on Friday, December 2nd, 2022, we became aware of suspicious activity and promptly took aggressive measures to isolate the Hosted Exchange environment to contain the situation.”
Since then, “We’ve found that this unusual activity was caused by a ransomware outbreak.”
The investigation, which is being conducted by a cyber defence company and Rackspace’s internal security team, is still in its early stages, according to Rackspace, and it is unclear “what, if any, data was compromised.”
If the cloud service provider discovers proof that the attackers had access to their sensitive data, it promises to alert the clients.
In a press release, the company noted, “Based on the investigation to far, Rackspace Technology believes that this problem was isolated to its Hosted Exchange business.”
Other services and products offered by Rackspace Technology are fully functional, and the company’s Email product line and platform have not been impacted.
In today’s press release and an 8-K SEC filing, the company also stated that it anticipates a loss of income as a result of the ransomware attack’s effects on its $30 million Hosted Exchange business.
Despite the fact that Rackspace Technology is still investigating the incident, the company stated that it “has caused and may continue to cause an interruption in its Hosted Exchange business and may result in a loss of revenue for the Hosted Exchange business, which generates approximately $30 million in revenue annually in the Apps & Cross Platform segment.”
Additionally, Rackspace Technology may incur additional expenses as a result of its reaction to the event.
All services in Rackspace’s Hosted Exchange environment, including MAPI/RPC, POP, IMAP, SMTP, and ActiveSync, as well as the Outlook Web Access (OWA) user interface that allows access to online email management, are still affected by the outage.
The corporation first reported the outage on its status page on Friday night at 02:49 AM EST, which is four days after today’s notification.
Twenty-four hours later, Rackspace disclosed the real cause of the outage, citing a security incident that was “contained to a piece of our Hosted Exchange platform” and required them to shut down and disconnect the Hosted Exchange environment.
Due to the incomplete information, some of the customer’s suspicions that the downtime might be the result of malware or ransomware attacks were validated today by the company.
Until the outage is fixed, Rackspace has been offering impacted customers free Microsoft Exchange Plan 1 licences and comprehensive instructions on how to migrate their email to Microsoft 365 (details on activating the free licences and moving users’ mailboxes to Microsoft 365 are available in Rackspace’s incident report). This service has been available starting on Friday evening.
Additionally, the business offers customers a stopgap remedy while they transition to Microsoft 365: a forwarding choice that will automatically divert every email sent to a Hosted Exchange user to an outside email account.
“We are unable to give a timeframe for the restoration of the Hosted Exchange environment at this time. Where possible, we are aiming to offer customers inbox archives to eventually import into Microsoft 365 “The update from today includes Rackspace.
Press Release
MICROSOFT IS IN TERMS TO BUY SPEECH TECHNOLOGY COMPANY NUANCE COMMUNICATIONS FOR ABOUT $16 BILLION, OR $56 A SHARE, A 23% OVERPAYMENT TO NUANCE’S FRIDAY CLOSE, According to Sources (BLOOMBERG)
Bloomberg:
According to sources, Microsoft is in advanced talks to acquire Nuance Communications, a provider of speech technology, for about $16 billion, or $56 per share, a 23% premium to Nuance’s Friday close. The proposed price would value Nuance at $56 per share. This week could see the announcement of a deal.
Press Release
Nine widely used WiFi routers had 226 vulnerabilities.
Even when using the most recent firmware, security researchers examined nine widely used WiFi routers and discovered a total of 226 possible vulnerabilities in them.
Millions of people use the tested routers, which are made by Asus, AVM, D-Link, Netgear, Edimax, TP-Link, Synology, and Linksys.
The TP-Link Archer AX6000, which has 32 problems, and the Synology RT-2600ac, which has 30 security flaws, are the two devices with the most vulnerabilities.
The examination process
In partnership with CHIP magazine, researchers at IoT Inspector conducted security tests with a focus on models primarily used by small businesses and residential users.
According to Florian Lukavsky, CTO & Founder at IoT Inspector, “vendors provided them with current models, which were upgraded to the newest firmware version, for Chip’s router review.”
“IoT Inspector automatically examined the firmware versions and searched for more than 5,000 CVEs and other security flaws.”
Although not all defects posed the same risk, the researchers discovered a few widespread issues that impacted the majority of the evaluated models:
The firmware contains an outdated Linux kernel.
stale VPN and multimedia features
over-reliance on BusyBox’s earlier iterations
weak default passwords like “admin” are used
Hardcoded credentials are present in plain text.
Changing the router’s default password when configuring it for the first time is one of the most crucial steps you can take to secure it, according to Jan Wendenburg, CEO of IoT Inspector.
Whether an IoT device is used at home or in a corporate network, changing the password upon first use and turning on automatic updates must be regular procedure, according to Wendenburg.
In addition to manufacturer-introduced vulnerabilities, utilising an IoT device with the adage “plug, play, and forget” poses the greatest risk.
Press Release
Record: hackers scraped information of 500M LinkedIn customers and published it available online; LinkedIn validates the dataset includes publicly viewable details from its site (Katie Canales/Insider).
ReporReport: hackers scraped data of 500M LinkedIn users and posted it for sale online; LinkedIn confirms the dataset includes publicly viewable info from its site (Katie Canales/Insider)
Katie Canales / Insider:
Report: hackers scraped data of 500M LinkedIn users and posted it for sale online; LinkedIn confirms the dataset includes publicly viewable info from its site — – Personal data from 500 million LinkedIn users has been scraped and is reportedly for sale on a hacking forum.t: hackers scraped data of 500M LinkedIn users and posted it for sale online; LinkedIn confirms the dataset includes publicly viewable info from its site (Katie Canales/Insider)
Katie Canales / Insider:
Report: hackers scraped data of 500M LinkedIn users and posted it for sale online; LinkedIn confirms the dataset includes publicly viewable info from its site — – Personal data from 500 million LinkedIn users has been scraped and is reportedly for sale on a hacking forum.
-
Apps1 year ago
Why is Everyone Talking About Hindi Keyboards?
-
Social Media1 year ago
Who is Rouba Saadeh?
-
Apps1 year ago
Things you need to know about Marathi keyboard today
-
Apps1 year ago
Stuck with Your default Bangla keyboard? Isn’t it time for a change?
-
Games1 year ago
Top 7 Popular Puzzle and Card Games for Relaxing Your Brain on Mobile, Featuring Solitaire
-
Social Media1 year ago
Mati Marroni Instagram Wiki (Model’s Age, Net Worth, Body Measurements, Marriage)
-
Entertainment1 year ago
12 Online Streaming Sites that Serve as Best Alternatives to CouchTuner
-
Entertainment1 year ago
Movierulz Website: Movierulzz 2021 Latest Movies on Movierulz.com