Cyber attack on Christies halts auction services to a certain extent

Christie's, the renowned British auction house founded in 1766 by James Christie, has reportedly fallen victim to a cyber attack, potentially impacting its online auction services.
Despite this setback, the London-based auction house remains optimistic that its phone and in-house services will continue uninterrupted.
A subsidiary of Groupe Artemis, Christie's is working diligently to restore website operations promptly.
They have assured clients that they will receive regular updates as the investigation progresses.
Simultaneously, the security teams are actively enhancing cybersecurity measures to prevent such incidents in the future.
While the website is undergoing restoration, the auction remains open for bidding.
Currently, the spotlight is on rare luxury watches once owned by racing car legend Michael Schumacher, who is currently in a vegetative state.
Christie's New York auction, which commenced on Tuesday, features a collection from art collector Rosa De La Cruz.
This collection includes 20th and 21st-century watches, featuring pieces from renowned artists such as Pablo Picasso, Andy Warhol, and Georgia O'Keeffe.
These items are available for viewing on a temporary website hosted for a few weeks.
From a hacker's perspective, disrupting the services of an auction website may not yield significant gains.
Stolen data, especially rare and valuable information, could be of interest to certain parties on the dark web, albeit to a limited extent.
Such attacks can result in substantial financial losses for public companies like Christie's, which generate profits from commissions earned through high-profile auctions.
In an era where digital transactions are crucial for revenue generation, every minute is vital for organizations to mitigate such risks effectively.


This Cyber News was published on www.cybersecurity-insiders.com. Publication date: Tue, 14 May 2024 16:13:06 +0000


Cyber News related to Cyber attack on Christies halts auction services to a certain extent

Cyber attack on Christies halts auction services to a certain extent - Christie's, the renowned British auction house founded in 1766 by James Christie, has reportedly fallen victim to a cyber attack, potentially impacting its online auction services. Despite this setback, the London-based auction house remains ...
1 year ago Cybersecurity-insiders.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
3 months ago Cybersecuritynews.com
CVE-2024-27080 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
CVE-2024-26794 - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race between ordered extent completion and fiemap For fiemap we recently stopped locking the target extent range for the whole duration of the fiemap call, in order to ...
1 year ago Tenable.com
25 Best Cloud Service Providers (Public and Private) in 2025 - Oracle Cloud offers a variety of services, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS), to help organizations build, deploy, and run applications in the cloud. Oracle Cloud is a cloud ...
4 months ago Cybersecuritynews.com
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023 - Don't wait until it's too late - get cyber insurance today and secure your business for tomorrow. According to the U.S. Federal Trade Commission, cyber insurance is a particular type of insurance that helps businesses mitigate financial losses ...
1 year ago Cyberdefensemagazine.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
1 year ago Scmagazine.com
CVE-2021-46989 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2022-49547 - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix deadlock between concurrent dio writes when low on free data space When reserving data space for a direct IO write we can end up deadlocking if we have multiple tasks ...
7 months ago Tenable.com
CVE-2022-49999 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
CVE-2024-35784 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Wargames director Jackie Schneider on why cyber is one of 'the most interesting scholarly puzzles' - In other games, we had people from Silicon Valley who were leading AI companies or cyber companies. What we found is those who had expertise in cyber operations were more likely to be more nuanced about how they used the cyber capability. On a larger ...
1 year ago Therecord.media
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
1 year ago Cyberdefensemagazine.com Akira
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
1 year ago Cyberdefensemagazine.com
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
5 months ago Cybersecuritynews.com
Does Pentesting Actually Save You Money On Cyber Insurance Premiums? - Way back in the cyber dark ages of the early 1990s as many households were buying their first candy-colored Macintoshes and using them to play Oregon Trail and visit AOL chat rooms, many businesses started venturing into the digital realm as well by ...
1 year ago Securityboulevard.com Rocke
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
1 year ago Techrepublic.com
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
1 year ago Techrepublic.com
CVE-2022-48833 - In the Linux kernel, the following vulnerability has been resolved: ...
9 months ago
Cyber Insights 2023: The Geopolitical Effect - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. The Russia/Ukraine war that started in early 2022 has been mirrored by a ...
2 years ago Securityweek.com
New York's cyber chief on keeping cities and states safe from cyberattacks | The Record from Recorded Future News - And so we think that that'll continue to evolve the security posture of New York State in a way that first and foremost provides the public good, which is, if a government service is not secure, it can't be considered reliable. We're ...
6 months ago Therecord.media
Cyber Insights 2023: Cyberinsurance - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. In 2022, Russia invaded Ukraine with the potential for more serious and more ...
2 years ago Securityweek.com
CVE-2024-40943 - In the Linux kernel, the following vulnerability has been resolved: ...
9 months ago

Cyber Trends (last 7 days)