Recently Tupperware which is a well-known home products line company got struck by a credit card skimmer attack. Due to this cyberattack, the primary Tupperware site along with its several localized versions was compromised by digital credit card skimmer disguised inside an image file. The cybercriminals were successful in placing malicious code on Tupperware’s website to collect credit card details from the online site buyers. The researchers at Malwarebytes Labs stated that the malicious code had been running on the Tupperware homepage for at least five days, this shows a low level of security measures been taken by the Tupperware security team. This cyberattack led to put on average 1 million customers at risk who visits one of the most popular websites ranked in the Alexa top 100,000 most popular sites.
At Cyble, the research team provides clear visibility to various third-party cyber threats and risks through automation, integration and intelligence. They tend to increase the security level of the company which assists the organizations to be prevented from cyberattacks. For instance, recently the Cyble Research Unit (CRU) identified the Sekhmet ransomware group who leaked the files of Sociedad Anónima Damm, a Spanish brewery which got founded in Barcelona in 1876. This cyberattack led to the exposure of over 24,5GB of files.
As noticed the attacks just similar to which struck Tupperware is increasing at a rapid pace, in reply to these attacks’ organizations should start to take security measures with utmost seriousness.
Cyble Inc.’s mission is to provide organizations with a real-time view of their supply chain cyber threats and risks. Their SaaS-based solution powered by machine learning and human analysis provides organizations’ insights to cyber threats introduced by suppliers and enables them to respond to them faster and more efficiently.
Cyble strives to be a reliable partner/facilitator to its clients allowing them with unprecedented security scoring of suppliers through cyber intelligence sourced from open and closed channels such as OSINT, the dark web and deep web monitoring and passive scanning of internet presence. Furthermore, the intelligence clubbed with machine learning capabilities fused with human analysis also allows clients to gain real-time cyber threat intel and help build better and stronger resilience to cyber breaches and hacks. Due to the nature of the collected data, the company also offer threat intelligence capabilities out-of-box to their subscribers.