{"id":2505,"date":"2023-10-12T13:00:00","date_gmt":"2023-10-12T17:00:00","guid":{"rendered":"https:\/\/inversetech.com\/?p=2505"},"modified":"2023-11-03T13:41:13","modified_gmt":"2023-11-03T17:41:13","slug":"the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone","status":"publish","type":"post","link":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/","title":{"rendered":"The Latest Cyber Attacks \u2013 Just in the First Weeks of September Alone"},"content":{"rendered":"\n\n\n[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;10px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<p><span style=\"font-weight: 400;\">Online publication\u00a0<\/span><span style=\"font-weight: 400;\">Cybercrime Magazine<\/span><span style=\"font-weight: 400;\">\u00a0reports on cyber attacks worldwide. The following list summarizes attacks just since 9\/1\/23 \u2013 9\/22\/23 and US only. You are going to recognize some big names. Hackers don\u2019t care how big (or small you are) or what your business might be \u2013 if your business doesn\u2019t already have a cyber security partner working to keep your company safe, you are vulnerable. Check out the list; you\u2019ll likely recognize most of them. Hackers don\u2019t care who you are, what business you\u2019re in, or even how big you are. Think of all the companies that have been hacked that didn\u2019t make the news. If you don\u2019t already have a cyber security partner, call us. Your business\u2019s survival depends on it. Further details of each incident can be found at the cited source.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p><b>Clorox Warns of Product Shortages Following Cyberattack<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Clorox\u2019s quarterly earnings will take a hit from a recent cyberattack, which has disrupted operations and dented availability of the company\u2019s products. The cleaning-products maker said Sep. 18 in a securities filing that the fallout from the attack will cause a material impact to its current-quarter financial results. The longer-term impact is uncertain, given the continuing recovery. The cyberattack on Clorox\u2019s information technology infrastructure, initially disclosed Aug. 14, prompted the company to take certain systems offline and resort to manually ordering and processing products at a lower rate than normal. Clorox is still operating at a reduced rate, which has recently hurt product availability. \u201cAt this time, the company cannot estimate how long it will take to resume fully normalized operations,\u201d Clorox said.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Source: The Wall Street Journal<\/span><\/i><span style=\"font-weight: 400;\"><br \/><\/span><i><span style=\"font-weight: 400;\">09\/18\/2023<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Billionaire investor Mark Cuban loses $870K in crypto in MetaMask wallet hack<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Entrepreneur and investor Mark Cuban, whose net worth is over $5 billion, fell victim to a hack on the night of Sep. 15. Cuban lost crypto assets worth $870,000 in the attack that compromised his MetaMask wallet, according to a DL News report. Cuban confirmed the hack to DL News and said he had lost 5 Ethereum (ETH) tokens, worth around $8,170 at current prices. However, he also lost USD Coin (USDC), Polygon (MATIC), Lido staked Ethereum (stETH), and tokens from SuperRare and Ethereum Name Service. Most of the proceeds from the hack were still lying in the hacker\u2019s wallet at the time of writing. Cuban managed to transfer around $2 million USDC from the wallet to Coinbase Custody and save most assets from being stolen. According to Cuban, he is \u201cpretty sure\u201d he downloaded a malicious version of MetaMask, which led to the hack.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Source: CryptoSlate<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<br \/><\/span><i><span style=\"font-weight: 400;\">09\/16\/2023<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Ransomware attack hits Orbcomm\u2019s BT series of ELDs; paper logs are back<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Orbcomm, a major provider of ELDs (electronic logging devices) to the trucking sector, is dealing with a ransomware attack that has limited the ability of its customers to use its Fleet Manager offering, which includes its Blue Tree ELD systems, the company has confirmed. Resolving the issue may take up to two weeks. \u201cOn Sep. 6, ORBCOMM experienced a ransomware attack that is temporarily impacting our FleetManager platform and BT product line, which is used by some of our customers to track and monitor their transportation assets,\u201d Michelle Ferris, the company\u2019s VP of corporate communications, said in response to an email query from FreightWaves. \u201cUpon discovering the issue, industry-leading external cybersecurity experts were retained to conduct a thorough investigation.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Source: Freight Waves<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<br \/><\/span><i><span style=\"font-weight: 400;\">09\/15\/2023<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Caesars Entertainment Paid Millions to Hackers in Attack<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Caesars Entertainment Inc. paid tens of millions of dollars to hackers who broke into the company\u2019s systems in recent weeks and threatened to release the company\u2019s data, according to two people familiar with the matter. Caesars is expected to disclose the cyberattack in a regulatory filing imminently, the people said. The disclosure of the alleged Caesars breach comes as another Las Vegas entertainment giant, MGM Resorts International, announced that it was hacked earlier this week.The group behind the attack is known as Scattered Spider or UNC 3944, according to the people. Its members are skilled at social engineering in order to gain access to large corporate networks, according to cybersecurity experts. In the case of Caesars, the hackers first breached an outside IT vendor before gaining access to the company\u2019s network.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Source: Bloomberg<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<br \/><\/span><i><span style=\"font-weight: 400;\">09\/13\/2023<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Save the Children hit by Ransomware, 7TB stolen<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cybercrime crew BianLian says it has broken into the IT systems of a top nonprofit. As highlighted by VX-Underground and Emsisoft threat analyst Brett Callow earlier today, BianLian bragged on its website it had hit an organization that, based on the gang&#8217;s description of its unnamed victim, looks to be Save The Children International. The NGO, which employs about 25,000 people, says it has helped more than a billion kids since it was founded in 1919. BianLian added that its victim, &#8220;the world&#8217;s leading nonprofit,&#8221; operates in 116 countries with $2.8 billion in revenues. The extortionists claim to have stolen 6.8TB of data, which they say includes international HR files, personal data, and more than 800GB of financial records. They claim to also have email messages as well as medical and health data. Save the Children has confirmed someone broke into its computer systems, understood to be BianLian.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Source: The Register<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<br \/><\/span><i><span style=\"font-weight: 400;\">09\/12\/2023<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>MGM Resorts Sees Outages Across Properties Due to Cybersecurity Issue<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Hotel and gaming company MGM Resorts is grappling with a cybersecurity issue that has caused an outage across its properties. \u201cOur investigation is ongoing, and we are working diligently to determine the nature and scope of the matter,\u201d the company said in a <\/span><a href=\"https:\/\/twitter.com\/MGMResortsIntl\/status\/1701256032369164399\"><span style=\"font-weight: 400;\">post<\/span><\/a><span style=\"font-weight: 400;\"> on X, formerly Twitter. \u201cWe notified law enforcement and took prompt action to protect our systems and data, including shutting down certain systems,\u201d the company said in the post. The incident has affected various systems, TechCrunch <\/span><a href=\"https:\/\/techcrunch.com\/2023\/09\/11\/mgm-resorts-cybersecurity-issue-outage\/\"><span style=\"font-weight: 400;\">reported<\/span><\/a><span style=\"font-weight: 400;\"> Sep. 11. Guests at MGM\u2019s Las Vegas casinos have reported that ATM cash dispensers and slot machines have been affected, leading to outages, according to the report. Additionally, hotel restaurants are only accepting cash payments, and guests are unable to charge expenses to their rooms. The incident has also rendered digital room keys unusable.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Source: PYMNTS<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<br \/><\/span><i><span style=\"font-weight: 400;\">09\/11\/2023<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Associated Press Stylebook Data Breach Impacts Customers<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The Associated Press (AP) has alerted its customers about a recent data breach that has impacted users of the AP Stylebook. This widely used guide on grammar, punctuation, and writing style for journalists and newsrooms worldwide has suffered a security incident where attackers stole customer data and then launched targeted phishing attacks. The breach occurred between Jul. 16 and 22, 2023, on an old third-party-managed AP Stylebook site that was no longer in use. The stolen information includes customers\u2019 names, email addresses, street addresses, city, state, zip codes, phone numbers, and User IDs. Moreover, customers who entered tax-exempt IDs, such as Social Security Numbers or Employer Identification Numbers, also had these IDs stolen. Journalists\u2019 and media companies\u2019 login credentials are highly sought after by cybercriminals due to the potential for extortion, data theft, and cyber espionage. <\/span><a href=\"https:\/\/isp.page\/news\/associated-press-warns-that-ap-stylebook-data-breach-led-to-phishing-attack-2\/\"><span style=\"font-weight: 400;\">Full Story<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Source: ISP.TODAY<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<br \/><\/span><i><span style=\"font-weight: 400;\">09\/09\/2023<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p><b>IBM Flags Data Breach At J&amp;J&#8217;s Janssen Carepath Portal<\/b><\/p>\n<p><span style=\"font-weight: 400;\">IBM has announced a data breach of Janssen\u2019s CarePath platform and has started informing affected customers. The Janssen CarePath portal provides patients and healthcare professionals in the U.S. with information regarding insurance coverage, out-of-pocket costs, and prescribing information at no cost to the users. The Janssen CarePath systems provider, IBM, indicated that the stolen data may have contained information provided as part of the Janssen CarePath application, including individual names, contact information, date of birth, health insurance information, and information on an individual\u2019s health conditions and medications. Although IBM has identified that a data breach occurred on Aug. 2, the company is unsure of the extent of information that was accessed. Janssen is a Johnson &amp; Johnson company.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Source: Pharmaceutical Technology<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<br \/><\/span><i><span style=\"font-weight: 400;\">09\/07\/2023<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Coffee Meets Bagel Hacked \u2014 Why The App Went Offline &amp; What\u2019s Next<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Coffee Meets Bagel, a popular dating app boasting \u201cover 150 million matches and counting,\u201d is back online as of Sept. 3 after being hacked by an \u201coutside actor who maliciously deleted company data and files,\u201d resulting in the service being down for nearly a week beginning on Aug. 27, 2023. An update shared by the company explained that it \u201cquickly re-established a secure environment for our technology team to restore our production services and notified law enforcement about this incident,\u201d with its team working around the clock to repair the damage. CMB apologized for the service disruption: \u201cIn addition to restoring your experience,\u201d they said, \u201cwe\u2019ve added 1,000 beans [in-app currency] to any accounts that were active 14 days prior to the outage to make up for lost time.\u201d\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Source: Women&#8217;s Health Interactive<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<br \/><\/span><i><span style=\"font-weight: 400;\">09\/05\/2023<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Golf Club Maker Callaway says 1 million Affected by Data Breach<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The company that sells the Callaway brand of golf gear reported a data breach that affected more than 1 million people. Topgolf Callaway Brands Corp. has been notifying customers that some users of its e-commerce websites had information exposed in an \u201cIT system incident\u201d that began Aug. 1. The breach affected customers of the \u201cCallaway, Odyssey, Ogio, and\/or Callaway Golf Preowned sites,\u201d the company said. Exposed information included account passwords and answers to security questions, as well as names, mailing addresses, email addresses, phone numbers and order histories. The company forced a password reset for customers and said it \u201chas taken a number of additional steps to further secure its data. Topgolf Callaway, based in Carlsbad, Calif., did not specify the nature or source of the incident.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Source: The Record<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<br \/><\/span><i><span style=\"font-weight: 400;\">09\/01\/2023<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Forever 21 Data Breach Affects Half a Million People<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Clothing giant Forever 21 said a data breach earlier in the year affects more than half a million individuals. A data breach notice filed with Maine\u2019s attorney general said the fashion giant was hacked over a three-month period beginning early Jan. 2023, during which intruders obtained files from its systems. This data included the personal information of current and former employees, said a spokesperson for Forever 21 via public relations firm FTI Consulting. According to the notice, Forever 21 notified 539,207 people that the breached data included their name, date of birth, bank account number and Social Security number, as well as information regarding employees\u2019 Forever21 health plan, including enrollment and premiums paid. Forever 21 has about 500 retail locations and an online store.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Source: TechCrunch<br \/><\/span><\/i><i><span style=\"font-weight: 400;\">09\/01\/23<\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">No matter what size your business or the industry you\u2019re in, you are at risk if you are connected to the internet and have customer or business data. Think about what would happen if hackers took your customer files hostage. What would you do? Now is the time to call us for a risk assessment and learn how to protect your business and customers. Call us at 800-854-2444 or visit\u00a0<\/span><a href=\"http:\/\/www.inversetech.com\"><span style=\"font-weight: 400;\">www.inversetech.com<\/span><\/a><span style=\"font-weight: 400;\">\u00a0to learn more about our cybersecurity services.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n\n\n","protected":false},"excerpt":{"rendered":"<p>Online publication\u00a0Cybercrime Magazine\u00a0reports on cyber attacks worldwide. The following list summarizes attacks just since 9\/1\/23 \u2013 9\/22\/23 and US only. You are going to recognize some big names. Hackers don\u2019t care how big (or small you are) or what your business might be \u2013 if your business doesn\u2019t already have a cyber security partner working [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2500,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","footnotes":""},"categories":[14,17],"tags":[],"class_list":["post-2505","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Latest Cyber Attacks \u2013 Just in the First Weeks of September Alone - Inverse<\/title>\n<meta name=\"description\" content=\"Stay updated on recent US cyberattacks from 9\/1\/23 to 9\/22\/23. Hackers target all business sizes, and your security matters. Explore the incident list for your company&#039;s safety \u2013 your survival depends on it. Get detailed information at our cited source.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Latest Cyber Attacks \u2013 Just in the First Weeks of September Alone - Inverse\" \/>\n<meta property=\"og:description\" content=\"Stay updated on recent US cyberattacks from 9\/1\/23 to 9\/22\/23. Hackers target all business sizes, and your security matters. Explore the incident list for your company&#039;s safety \u2013 your survival depends on it. Get detailed information at our cited source.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/\" \/>\n<meta property=\"og:site_name\" content=\"Inverse\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-12T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-03T17:41:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"787\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ray Richeson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ray Richeson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/\"},\"author\":{\"name\":\"Ray Richeson\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143\"},\"headline\":\"The Latest Cyber Attacks \u2013 Just in the First Weeks of September Alone\",\"datePublished\":\"2023-10-12T17:00:00+00:00\",\"dateModified\":\"2023-11-03T17:41:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/\"},\"wordCount\":1909,\"publisher\":{\"@id\":\"https:\/\/inversetech.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Cybersecurity.png\",\"articleSection\":[\"Cyber Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/\",\"url\":\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/\",\"name\":\"The Latest Cyber Attacks \u2013 Just in the First Weeks of September Alone - Inverse\",\"isPartOf\":{\"@id\":\"https:\/\/inversetech.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Cybersecurity.png\",\"datePublished\":\"2023-10-12T17:00:00+00:00\",\"dateModified\":\"2023-11-03T17:41:13+00:00\",\"description\":\"Stay updated on recent US cyberattacks from 9\/1\/23 to 9\/22\/23. Hackers target all business sizes, and your security matters. Explore the incident list for your company's safety \u2013 your survival depends on it. Get detailed information at our cited source.\",\"breadcrumb\":{\"@id\":\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#primaryimage\",\"url\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Cybersecurity.png\",\"contentUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Cybersecurity.png\",\"width\":787,\"height\":443},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/inversetech.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Latest Cyber Attacks \u2013 Just in the First Weeks of September Alone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/inversetech.com\/#website\",\"url\":\"https:\/\/inversetech.com\/\",\"name\":\"Inverse\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/inversetech.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/inversetech.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/inversetech.com\/#organization\",\"name\":\"Inverse\",\"url\":\"https:\/\/inversetech.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png\",\"contentUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png\",\"width\":202,\"height\":130,\"caption\":\"Inverse\"},\"image\":{\"@id\":\"https:\/\/inversetech.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143\",\"name\":\"Ray Richeson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g\",\"caption\":\"Ray Richeson\"},\"sameAs\":[\"http:\/\/Inversetech.com\"],\"url\":\"https:\/\/inversetech.com\/author\/inverse\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Latest Cyber Attacks \u2013 Just in the First Weeks of September Alone - Inverse","description":"Stay updated on recent US cyberattacks from 9\/1\/23 to 9\/22\/23. Hackers target all business sizes, and your security matters. Explore the incident list for your company's safety \u2013 your survival depends on it. Get detailed information at our cited source.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/","og_locale":"en_US","og_type":"article","og_title":"The Latest Cyber Attacks \u2013 Just in the First Weeks of September Alone - Inverse","og_description":"Stay updated on recent US cyberattacks from 9\/1\/23 to 9\/22\/23. Hackers target all business sizes, and your security matters. Explore the incident list for your company's safety \u2013 your survival depends on it. Get detailed information at our cited source.","og_url":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/","og_site_name":"Inverse","article_published_time":"2023-10-12T17:00:00+00:00","article_modified_time":"2023-11-03T17:41:13+00:00","og_image":[{"width":787,"height":443,"url":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Cybersecurity.png","type":"image\/png"}],"author":"Ray Richeson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ray Richeson","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#article","isPartOf":{"@id":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/"},"author":{"name":"Ray Richeson","@id":"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143"},"headline":"The Latest Cyber Attacks \u2013 Just in the First Weeks of September Alone","datePublished":"2023-10-12T17:00:00+00:00","dateModified":"2023-11-03T17:41:13+00:00","mainEntityOfPage":{"@id":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/"},"wordCount":1909,"publisher":{"@id":"https:\/\/inversetech.com\/#organization"},"image":{"@id":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#primaryimage"},"thumbnailUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Cybersecurity.png","articleSection":["Cyber Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/","url":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/","name":"The Latest Cyber Attacks \u2013 Just in the First Weeks of September Alone - Inverse","isPartOf":{"@id":"https:\/\/inversetech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#primaryimage"},"image":{"@id":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#primaryimage"},"thumbnailUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Cybersecurity.png","datePublished":"2023-10-12T17:00:00+00:00","dateModified":"2023-11-03T17:41:13+00:00","description":"Stay updated on recent US cyberattacks from 9\/1\/23 to 9\/22\/23. Hackers target all business sizes, and your security matters. Explore the incident list for your company's safety \u2013 your survival depends on it. Get detailed information at our cited source.","breadcrumb":{"@id":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#primaryimage","url":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Cybersecurity.png","contentUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Cybersecurity.png","width":787,"height":443},{"@type":"BreadcrumbList","@id":"https:\/\/inversetech.com\/the-latest-cyber-attacks-just-in-the-first-weeks-of-september-alone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/inversetech.com\/"},{"@type":"ListItem","position":2,"name":"The Latest Cyber Attacks \u2013 Just in the First Weeks of September Alone"}]},{"@type":"WebSite","@id":"https:\/\/inversetech.com\/#website","url":"https:\/\/inversetech.com\/","name":"Inverse","description":"","publisher":{"@id":"https:\/\/inversetech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inversetech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/inversetech.com\/#organization","name":"Inverse","url":"https:\/\/inversetech.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inversetech.com\/#\/schema\/logo\/image\/","url":"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png","contentUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png","width":202,"height":130,"caption":"Inverse"},"image":{"@id":"https:\/\/inversetech.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143","name":"Ray Richeson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inversetech.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g","caption":"Ray Richeson"},"sameAs":["http:\/\/Inversetech.com"],"url":"https:\/\/inversetech.com\/author\/inverse\/"}]}},"_links":{"self":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts\/2505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/comments?post=2505"}],"version-history":[{"count":4,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts\/2505\/revisions"}],"predecessor-version":[{"id":2580,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts\/2505\/revisions\/2580"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/media\/2500"}],"wp:attachment":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/media?parent=2505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/categories?post=2505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/tags?post=2505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}