The Philadelphia Inquirer Newspaper Hacked 

The Philadelphia Inquirer, a major  US newspaper has suffered a large-scale  cyber attack disruption to its operations and rendiering it unable to go to print for the the first time in living memory. 

The company's IT teams along with third-party cyber security experts are working to restore systems after the  attack disrupted operations. The Sunday edition was only available on-line.

With no regular Sunday newspaper and online stories also facing some delays, the cyber attack has triggered the worst disruption to the Inquirer in decades. This attack has been reported to the FBI, and an investigation is on-going.

The attack was first detected when employees found that the newspaper’s content-management system was not working.  

Cyber attacks have become a major threat to media companies, and experts said news organisations can be particularly prized targets because of the nature of their work. Hackers may want to access reporters’ notes and files, for example, or to embarrass a news organisation by leaking emails or Slack messages. Others may want to publish misinformation through real news organisations’ platforms or simply to wreak havoc in a highly visible way. 

News organisations are increasingly being targeted by sophisticated threat actors, as have government agencies, hospitals, universities and the business sector.

Few details about the attack on the Inquirer have been released to staff members or readers. It is unclear whether any personal data has been exposed, exactly which systems had been breached, or who was behind the attack and what motivations they had.

Inquirer:    NBC:    NYPost:    LA Times:   Marketwatch:   CTPost:     Guardian

You Might Also Read: 

Guardian Newspaper Suffers A Large Scale Ransomware Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Breach Will Cost Capita At Least £20m
ABB Struck By Black Basta Ransomware »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

ForeScout Technologies

ForeScout Technologies

ForeScout delivers pervasive network security by allowing organisations to continuously monitor & mitigate security exposures & cyberattacks.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

Network Box

Network Box

Network Box is one of the world's leading Managed Security Service Providers.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Fortified Health Security

Fortified Health Security

Fortified’s team of cybersecurity specialists is dedicated to helping healthcare providers, payers and business associates protect their patient data across the Fortified Healthcare Ecosystem.

Sentrium Security

Sentrium Security

Sentrium is committed to helping organisations protect their technology, information and people. Our range of bespoke services provide solutions to tackle a broad range of cyber security challenges.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

Commission Nationale de l'Informatique et des Libertés (CNIL) - France

Commission Nationale de l'Informatique et des Libertés (CNIL) - France

The mission of CNIL is to protect personal data, support innovation, and preserve individual liberties.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.

Black Duck Software

Black Duck Software

Black Duck (formerly the Synopsys Software Integrity Group) is the market leader in application security testing (AST).

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.

ThreatMate

ThreatMate

ThreatMate empowers businesses with comprehensive tools to detect, protect, and remediate against cyber threats.

AFINE

AFINE

AFINE is a trusted advisor in the field of cybersecurity and pentesting.