Elite Supplements: The Latest Aussie Business to Fall Victim to a Cyber Attack

Consumers of a popular Australian supplement brand are being alerted about the possibility that the company's hack exposed their personal data.
Instead, the attackers stole names, shipping addresses, email addresses, and phone numbers of online customers.
The business stated that since hiring a cybersecurity provider, the data it possesses has been secured.
Customers were advised in the email to be cautious of any correspondence from Elite Supplements going forward, as information had been acquired during the breach.
One major worry is frauds; as of 2022, Australians had lost more than $48 million to investment scams.
Scams have cost victims around $72 million in total in 2022.
1 in 4 Australians have experienced identity theft.
Generally speaking, Australians are among the wealthiest people on the planet.
A study of the median wealth per adult put Australians at the top of the affluent list, with a median worth of $273,900 - ahead of Belgium and New Zealand.
This may help to understand why Australian people and businesses are the target of cybercriminals.
A significant data breach at Optus, a telecommunications business, took place in September 2022, affecting about 2.1 million users.
9.8 million individual records-including names, dates of birth, residences, and, in certain situations, passport numbers-were pilfered.
The hack failed to access any financial data.


This Cyber News was published on www.cysecurity.news. Publication date: Tue, 06 Feb 2024 15:43:04 +0000


Cyber News related to Elite Supplements: The Latest Aussie Business to Fall Victim to a Cyber Attack

Elite Supplements: The Latest Aussie Business to Fall Victim to a Cyber Attack - Consumers of a popular Australian supplement brand are being alerted about the possibility that the company's hack exposed their personal data. Instead, the attackers stole names, shipping addresses, email addresses, and phone numbers of online ...
1 year ago Cysecurity.news
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023 - Don't wait until it's too late - get cyber insurance today and secure your business for tomorrow. According to the U.S. Federal Trade Commission, cyber insurance is a particular type of insurance that helps businesses mitigate financial losses ...
1 year ago Cyberdefensemagazine.com
Cyber Insights 2023: Cyberinsurance - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. In 2022, Russia invaded Ukraine with the potential for more serious and more ...
2 years ago Securityweek.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
1 year ago Scmagazine.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
1 year ago Securityzap.com
Beyond Traditional Cyber Defences: The Rise of Outcome-Based Security In Modern Business - Cyber security is no longer just about keeping systems and devices safe, it's also become central in enabling business to achieve their strategic objectives. Paul Brucciani, Cyber Security Advisor at WithSecure™, has important information about ...
1 year ago Cyberdefensemagazine.com
CVE-2022-30426 - There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow ...
3 years ago
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
1 year ago Cyberdefensemagazine.com Akira
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
8 months ago Cybersecuritynews.com
Does Pentesting Actually Save You Money On Cyber Insurance Premiums? - Way back in the cyber dark ages of the early 1990s as many households were buying their first candy-colored Macintoshes and using them to play Oregon Trail and visit AOL chat rooms, many businesses started venturing into the digital realm as well by ...
2 years ago Securityboulevard.com Rocke
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
1 year ago Cyberdefensemagazine.com
Understanding Cyber Risk Appetite - A CISO’s Approach to Risk Management - By articulating the organization’s tolerance for cyber risk, CISOs can bridge the gap between technical security considerations and business objectives, creating a balanced approach that protects the organization without impeding innovation or ...
8 months ago Cybersecuritynews.com
Wargames director Jackie Schneider on why cyber is one of 'the most interesting scholarly puzzles' - In other games, we had people from Silicon Valley who were leading AI companies or cyber companies. What we found is those who had expertise in cyber operations were more likely to be more nuanced about how they used the cyber capability. On a larger ...
1 year ago Therecord.media
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
2 years ago Techrepublic.com
Cyber Risk Quantification - Turning Security into Business Language - Cyber Risk Quantification calculates risk exposure and its potential financial impact on an organization in business-relevant terms, providing a way for organizations to drive alignment between security strategy and business objectives. By expressing ...
8 months ago Cybersecuritynews.com
CVE-2021-38691 - A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the ...
3 years ago
CVE-2021-38690 - A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the ...
3 years ago
CVE-2021-38689 - A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the ...
3 years ago
CVE-2021-38682 - A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the ...
3 years ago
CVE-2021-38692 - A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the ...
3 years ago
Hackers abuse leaked Shellter red team tool to deploy infostealers - Shellter Project, the vendor of a commercial AV/EDR evasion loader for penetration testing, confirmed that hackers used its Shellter Elite product in attacks after a customer leaked a copy of the software. In a report on July 3rd, Elastic Security ...
6 months ago Bleepingcomputer.com
Business Continuity Planning - CISO’s Critical Role - In the evolving landscape of cyber threats, the Chief Information Security Officer (CISO) plays a critical role in strengthening organizational resilience and advancing Business Continuity Planning to ensure sustained business operations. When CISOs ...
8 months ago Cybersecuritynews.com
Cyber Insights 2023: The Geopolitical Effect - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. The Russia/Ukraine war that started in early 2022 has been mirrored by a ...
2 years ago Securityweek.com
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
2 years ago Techrepublic.com