{"id":136443,"date":"2025-08-11T08:11:09","date_gmt":"2025-08-11T08:11:09","guid":{"rendered":"https:\/\/www.europesays.com\/us\/136443\/"},"modified":"2025-08-11T08:11:09","modified_gmt":"2025-08-11T08:11:09","slug":"it-essentials-so-long-silly-season","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/136443\/","title":{"rendered":"IT Essentials: So long silly season"},"content":{"rendered":"<p>        Will cyber teams ever catch a break?<\/p>\n<p>            <img decoding=\"async\" loading=\"lazy\" alt=\"\" src=\".\/media_11b3a6fcd204d1d1b7a4a1af97e721ef83bdd52d2.jpg?width=750&amp;format=jpg&amp;optimize=medium\" width=\"724\" height=\"482\"\/><br \/>\n          <br \/><strong>Gone are the days when August marked the start of the &#8220;silly season,&#8221; when the news was all skateboarding dogs and ducks crossing the road. Simpler if more boring times.<\/strong>\n        <\/p>\n<p>Today, it\u2019s one of the busiest times for cybersecurity teams as, with the workforce on holiday, attackers see a prime opportunity to strike. Instead of being able to knock off early for a well-deserved pint, defenders &#8211; and perpetrators &#8211; are in overdrive.<\/p>\n<p>This summer&#8217;s party pooper is a group called ShinyHunters (UNC6040). ShinyHunters has dominated the headlines this week, stealing customer data from Google, Cisco and Chanel, and likely from Pandora, <a href=\"https:\/\/www.computing.co.uk\/news\/2025\/security\/air-france-and-klm-hit-by-third-party-data-breach\" target=\"_blank\" rel=\"noopener\">Air France and KLM<\/a> too. Their modus operandi? Impersonating IT support to trick teams into installing malware, giving them access to sensitive data which they then ransom or sell.<\/p>\n<p>Rather than targeting companies directly, they exploit third-party providers, with Salesforce their current focus. Previously, they\u2019ve also breached GitHub, cloud storage, websites and developer tools.<\/p>\n<p>ShinyHunters\u2019 spree follows closely on the heels of Scattered Spider, which compromised the technology supply chains of M&amp;S, The Co-op, Harrods and others just weeks ago. Security experts believe there\u2019s cross-pollination between these and other profit-driven groups, who learn from and compete with each other, operating as a transnational, amorphous threat.<\/p>\n<p>The fact that a company as large and well defended as Google should be a victim show us that even tech giants aren&#8217;t immune from attacks by people who, when arrested, often turn out to be barely out their teens, tells us something about the porosity of enterprise infrastructure. We really need to be securing data, not just systems.<\/p>\n<p>        Recommended Reads<\/p>\n<p>In her <a href=\"https:\/\/www.computing.co.uk\/research\/2025\/cooling-the-cloud\" target=\"_blank\" rel=\"noopener\">latest report<\/a> into the sustainability of cloud services, Penny Horwood takes a deep dive into water usage. While new zero-water datacentre cooling designs are emerging, wasteful evaporative methods are still common. Just how much water do they use? Well the exact figures are something the hyperscalers are keen to keep to themselves, but it&#8217;s up significantly year-on-year.<\/p>\n","protected":false},"excerpt":{"rendered":"Will cyber teams ever catch a break? Gone are the days when August marked the start of the&hellip;\n","protected":false},"author":3,"featured_media":136444,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[745,13337,22356,78539,82050,158,67,132,68],"class_list":{"0":"post-136443","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-computing","9":"tag-cybercrime","10":"tag-ransomware","11":"tag-shinyhunters","12":"tag-social-engineering","13":"tag-technology","14":"tag-united-states","15":"tag-unitedstates","16":"tag-us"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115009125427778311","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/136443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=136443"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/136443\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/136444"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=136443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=136443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=136443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}