• Avantia Threat Update



What Is Cyber Vulnerability Management?; Ransomware attacks on businesses are on the increase; the Australian Government wants the power to run Cyber-Response for businesses under attack; The EMOJET BOTNET malware upgrade has added an Email attachment stealer; 1,050 Data Breaches reported to the Australian Privacy Commissioner in the past 12 months; Carnival can’t sail out of a ransomware attack; Instacart has a second security stumble Rising breach penalties include legal troubles for a former Uber executive; Meet Graphus: a fresh automated phishing defense solution that’s the perfect addition to our digital risk protection platform as well as Major Breaches in UNITED STATES; CANADA; UNITED KINGDOM; INDIA; SOUTH AFRICA; AUSTRALIA.

The Dark Web’s Top Threats this past week:

Top Source Hits: ID Theft Forum

Top Compromise Type: Domain

Top Industry: Education & Research

Top Employee Count: 500+



Some people still believe their IT infrastructure is unflawed simply because they’ve never experienced a cybersecurity incident – until something goes wrong and the company becomes the victim of a malware attack or a serious data leak. This is why proactively finding security flaws and minimizing loopholes is an utter necessity for organisations large and small, which is where vulnerability management comes into play. Vulnerability Management aims to simplify your overall cybersecurity. However, for some security specialists, it still turns out to be an exercise in frustration. First, for context, we will take a look at some basic concepts related to Vulnerability Management. The International Organization for Standardization defines vulnerabilities as follows: “In the contexts of information technology and cybersecurity, a vulnerability is a behavior or set of conditions present in a system, product, component, or service that violates an implicit or explicit security policy. A vulnerability can be thought of as a weakness or exposure that allows a security impact or consequence.” Exploited vulnerabilities may lead to the disturbance of IT systems, potentially resulting in expensive data breaches and service disruptions.This brings us to the definition of vulnerability management: Vulnerability Management refers to the security practices that proactively identify, prevent, mitigate, and classify vulnerabilities within an IT system, being an important part of any cybersecurity strategy.

Vulnerability Management 2019-2020 Statistics - In recent years, the number of documented vulnerabilities has skyrocketed. With businesses utilising more and more devices and tools and due to the accelerated growth of the Internet of Things, it’s no surprise that security vulnerabilities have also followed in their footsteps. Below are some eye-opening vulnerability management stats, that will hopefully paint a quick picture of today’s security landscape. There have been 10363 security vulnerabilities (CVEs) published so far in 2020. In 2019 there were 16033. SkyBox Security stated that: The number of new vulnerabilities found in Windows increased by 66% between 2018 and 2019, which made Microsoft’s operating system the most vulnerable in the industry. The top ten vulnerabilities by the number of associated malware programs are each used by around 50 types of malware. The most used one, CVE-2018-8174 (dubbed DoubleKill), is currently being leveraged by 62 such malicious programs.

The Service ‘Now 2019’ Security study found that:

60% of breaches were related to unpatched vulnerabilities.

There was a 34% increase in weekly costs spent on patching compared to 2018.

There was 30% more downtime in 2019 due to delays in patching vulnerabilities.

On a more positive note, it’s reassuring to see that companies are starting to recognize the importance of having a vulnerability management process in place. Based on the 2019 SANS Vulnerability Management Survey:

84% of respondents have created a vulnerability management program.

25% perform weekly or more frequent vulnerability scanning.

82% of those who patch do it on a monthly or more frequent basis.

Why Vulnerability Management is crucial : As you can probably already tell by now, vulnerability management should not be missing from any organization, as it enables you to efficiently manage the dangers posed by unaddressed flaws found in IT environments. In cybersecurity, exploits represent a serious aspect that should not be ignored. In short, exploits are malicious programs that capitalise on vulnerabilities in applications or operating systems. These vulnerabilities threaten both enterprises and consumers, which is why vendors frequently release updates to address them. What’s more, exploits often open the way for malware (such as Trojans, spyware that can steal sensitive information, ransomware that will lock up your systems, etc.) allowing it to further spread on vulnerable endpoints. In the cybercriminal world, exploit kits are commonly sold in underground marketplaces, which makes it easy for malicious actors to conduct attacks. Exploits generally target software such as Microsoft Office, Adobe Flash, Java, etc., which are oftentimes left unpatched. Cyber-crime development and related threats are pushing companies to spend more on cybersecurity. As part of an organization’s attempt to monitor threats, a vulnerability detection mechanism must be included, which would allow an enterprise to have access to an ongoing analysis of its IT systems’ weaknesses. Apart from instilling basic security hygiene measures in your company (such as training your employees to be vigilant when downloading and opening email attachments from unknown senders), reducing the dangers of exploit-based attacks always starts with regular patching. For regulatory and compliance reasons, most companies do periodically upgrade their software/operating systems. However, all those who fail to apply their patches in a timely manner not only become uncompliant and are likely to face high fines, but also subject themselves to serious cybersecurity risks. Along with all newly-released security updates, vendors also typically issue details on how each addressed vulnerability could be leveraged in the real-world. Using this knowledge, cybercriminals may create subsequent exploits and initiate attacks on vulnerable devices that have not been updated yet. The new patches will protect machines against threats based on documented vulnerabilities. However, there is also the risk of zero-day vulnerabilities – which are flaws only known by the attackers who abuse them and yet unknown and unpatched by the vendor. As mentioned above, patching is the first recommended step that prevents exploits. The second one is traffic filtering and scanning that prevents communication with command & control servers. How are vulnerabilities discovered? In all organisations, vulnerabilities can be both known and unknown. A good vulnerability management process should cover all potential vulnerabilities and their impact on a company. Vendors and 3rd parties (independent security researches/pentesters/users/etc.) must always disclose vulnerabilities in a proper manner to avoid the risk of cyber attackers taking advantage of them. Developers do their utmost to develop stable software, but might not always be able to detect all vulnerabilities in a product before the go-to-market date. Postponing the release is not always an option, so businesses will oftentimes launch the software and then push the security updates (also known as patches) later on, as bugs are discovered. For instance, Microsoft releases a batch of security updates on a monthly basis (commonly referred to as Patch Tuesday, as the security fixes are published on the second Tuesday of each month). We cover the topic in this section of our blog – make sure to check it out if you are a Microsoft user!In any case, it’s crucial that those who discover vulnerabilities cooperate, come up with solutions, and release the patches – and if applicable, also publish a temporary workaround for companies unable to install the updates as soon as possible (even though this practice is highly not recommended).

According to the International Organization for Standardisation (ISO/IEC 29147:2018), the main objectives of vulnerability disclosure should include the following:

Reducing risk by solving vulnerabilities and communicating the potential impact on users.

Minimizing disclosure-related risks and costs.

Offering the appropriate information to users so they can evaluate risks caused by vulnerabilities.

Defining standards to promote collaboration and communication between stakeholders.

Nevertheless, please keep in mind that the procedures described above are aimed at reducing threats, expenses, and impact on everyone involved and that they should not be treated as a fixed process. Each vendor should adapt them on a case by case basis, in accordance with their needs. What should Vulnerability Management include? Vulnerability Management is an ongoing, proactive prevention mechanism that should include steps like:

Vulnerability scanning – network scanning, firewall logging, penetration testing, or using an automated tool like a vulnerability scanner.

Finding vulnerabilities – analyzing the results of your vulnerability scans and firewall logs and searching for anomalies that may prove an attack has taken place in your environment.

Checking vulnerabilities – determining how the bugs found may potentially be abused on computers, software, networks, etc. It often requires the assessment of a vulnerability’s magnitude and the danger it poses to the company.

Mitigating vulnerabilities – deciding how to prevent the vulnerabilities’ exploitation prior to patches being released.

Patching vulnerabilities – the most important part of a vulnerability management process is actually remediating vulnerabilities through patching.

Now that you’ve grasped the importance of managing your organization’s vulnerabilities, here are some steps that you will hopefully benefit from when setting up your vulnerability management process.

#1. Define your objectives - The main objective of any vulnerability management exercise will be finding and mitigating vulnerabilities as quickly as possible. Then, you should establish secondary objectives, such as determining the frequency of your vulnerability scanning. One of the mistakes encountered in vulnerability scanning is not conducting this process regularly, which leaves your company exposed if any vulnerabilities linger too long without being detected. Thus, if scanning is performed in a timely fashion, the risks will be highly reduced.

#2. Define the roles within your organisation - Another important aspect you should take care of is assigning roles and responsibilities and clearly defining all stakeholders’ roles in the vulnerability management process. Everyone involved must comprehend the need for such a process. For an effective vulnerability management process, CISA proposes the following types of roles to be assigned in an organization:

Monitoring roles – the people responsible should analyze the severity of vulnerabilities, log the vulnerability information into a repository, and alert the remediation team.

Remediation roles – employees in charge should perform actions such as analyzing the impact of patches on the organization and developing in-house workarounds to the vulnerability (if none are available).

Authorization roles – they are part of the change management process personnel and should undertake corrective actions to determine if there may be any adverse effects.

#3. Choose a reliable Vulnerability Management tool - The vulnerability management procedure, from vulnerability discovery to remediation, should become as automated as possible. This way, operations will be more effective and repetitive tasks and processes will be reduced, allowing staff to focus on other essential tasks. Thanks to an automated approach, businesses will be able to efficiently mitigate vulnerabilities that pose threats, while avoiding unnecessary damage to business operations. Automated vulnerability management tools allow you to monitor your infrastructure continuously and assess the status of your environment in real-time.

#4. Assess the effectiveness of your vulnerability management program - Maintaining and supporting a continuous vulnerability management program allows an organization to assess the effectiveness of its vulnerability discovery, analysis, and mitigation, and provides guidance in future decision-making. You should always make the necessary adjustments in your processes along the way, ensuring that your company maintains an exhaustive understanding of its critical assets and keeps its infrastructure secured.

Conclusion - One legacy of implementing a vulnerability management process will be less stress for IT teams and enhanced security for your organization. Join us in the race to patch all newly-discovered vulnerabilities and avoid unnecessary interruptions caused by cyber-attacks, which never seem to be slowing down, not even during the current global crisis. It’s up to you whether your vulnerability management journey will be a tale of failure or success –  it only depends on how you approach it.


Ransomware, one of the biggest security problems on the Internet today, is a type of malware that encrypts data, on anything from your PC to entire networks and servers, and then holds that data for ransom until specified demands are met, usually some form of financial payment. Those financial payments can range from hundreds to thousands to even millions of dollars. For anyone, including businesses, the effects of a ransomware attack can be devastating and the road to recovery long and costly. The July 2020 ransomware attack on multinational tech company, Garmin, provides a pertinent example of the type of devastation just such an attack can cause.  The tech giant reportedly paid a $10 million ransom fee in order to get the decryption key that would give it back its data. Not surprisingly, however, the depth of the attack’s impact is still unclear, as the damage caused by a ransomware attack goes beyond the cost of the ransom fee. For Garmin, the attack also crippled its website and disrupted its online services for millions of users, including the Garmin Connect service, which syncs user activity and data to the cloud. In addition, the cyber attack also downed Garmin’s communication, aviation navigation, and route-planning services.  Of course, Garmin is by no means the only large business to suffer such a serious ransomware attack. There have been scores of them. For example, Cognizant, another multinational tech company, suffered a ransomware attack just a few months prior. Although the company claims that only their internal network and not its customer systems were impacted by the attack, its recovery and mitigation costs are still estimated to be as high as $50 to $70 million.  Ransomware might be big business, but small businesses are big targets Yet, it’s not just large businesses that are under attack. While ransomware attacks on big corporations like these are headline grabbers, owners of small businesses should not let those types of headlines lull them into thinking that criminals will not target them. In fact, quite the opposite is true: industry experts report that 71% of ransomware attacks target small businesses. Indeed, some hackers prefer to target small businesses because they have the valuable data, but rarely the resources or know-how to withstand an attack. Furthermore, ransomware is big business now: ransomware-as-a-service can even be purchased on the dark web making it easier and easier for cyber criminals to target any business they want, large and small alike. And the attacks keep coming The fact is, neither large businesses nor small businesses can afford to be complacent about their cybersecurity especially now. Ransomware attacks are on the rise and so are the ransom fees. According to, in 2019 there was a 41% increase in ransomware attacks over the previous year and the average payment for regaining access to the encrypted files more than doubled. The FBI also reported that ransomware attacks have become ‘more targeted, sophisticated, and costly’.  In addition, recovery costs, which rise in relation to the sophistication and duration of an attack, have gotten higher too. According to, the average cost of recovery from a ransomware attack more than doubled in the last quarter of 2019 alone. Recovery costs include such things as hardware repair and replacement, lost revenues, damage to reputation, notification and reporting costs etc.  Of course, recovering from a ransomware attack also means removing the ransomware. But the question is can ransomware be removed? Fortunately, it can; an advanced cybersecurity product can detect and remove ransomware and disinfect your devices, although removal doesn’t guarantee that you’ll get all of your files back. The better approach is to establish a strong security posture before you’re attacked. This means following password best practices, creating a strong security work culture through employee training and awareness programs, and installing an advanced endpoint security solution that, among other features, has an anti-ransomware shield.   No time for complacency Ransomware has been around for a long time, even long enough to have developed a history. And over the course of that history, the world has come to hear about many large-scale ransomware attacks with far-reaching and devastating consequences. The success of these attacks has only served to invigorate and motivate hackers to launch more of them. When it comes to cybersecurity, therefore, this is no time for complacency. Businesses must take a strong security posture, or risk the consequences.


Australia’s Government has proposed giving itself the power to take over private enterprises’ response to cyber-attacks on critical infrastructure. A new Consultation Paper titled Protecting Critical Infrastructure and Systems of National Significance [PDF] notes that critical infrastructure is vulnerable to cyber attack, that such attacks are already happening and that the nation needs a plan so that if something nasty happens – like a hack taking out energy suppliers - other industries don;t go down like dominoes. The government’s plan is mostly to define more industries as critical infrastructure and make them “legally obliged to manage risks that may impact business continuity and Australia’s economy, security and sovereignty”. The government proposes to develop baselines that critical industries can use to help them meet their obligations. But a few recommendations are rather more spicy, among them the suggestion that when an attack is detected “ …. Government be able to provide reasonable, proportionate and time-sensitive directions to entities to ensure action is taken to minimise its impact.” Or the government could just kick the infrastructure operator out of the driver’s seat and take control. “In an emergency, we see a role for Government to use its enhanced threat picture and unique capabilities to take direct action to protect a critical infrastructure entity or system in the national interest,” the paper suggests. “These powers would be exercised with appropriate immunities and limited by robust checks and balances. The primary purpose of these powers would be to allow Government to assist entities take technical action to defend and protect their networks and systems, and provide advice on mitigating damage, restoring services and remediation.” Another says that critical infrastructure operators must not be allowed to hack back, but should “be empowered to take necessary, preventative and mitigating action against significant threats.” Under such circumstances, critical infrastructure operators should be given “appropriate immunities to ensure they are not limited by concerns of legal redress for simply protecting their business and the community.” The document is a consultation paper and therefore exists to generate debate. Justin Warren, an Australian IT consultant who serves global clients and is a keen observer of Australian Government IT policy, believes the document over-reaches. “Most of the document is vague platitudes,” he said. But he thinks it is also worrisome because the definition of an “emergency” that would allow government intervention is broad. “It requires you make guesses about the likely future behavior of this and future governments,” he said. Noting recent flimsy government oversight of other sectors in Australia, and harm that followed, he also raised the point that if infrastructure is sufficiently critical that it must be forced to comply with government regulations and permit government intervention, it should perhaps be run by the government. “The document foresees a situation so bad that you need to qumsi-nationalise a piece of infrastructure,” he said


Emotet's massive botnet was dormant for several months, but on July 17th, 2020, it suddenly rumbled back to life. It started spewing out massive numbers of phishing emails aimed at installing Trickbot payloads on anyone unfortunate enough to open one of their poisoned emails. The emails are often described as invoices, manifests, and the like. In recent days, security researchers have noted that Emotet has begun swapping Trickbot payloads out with QakBot payloads, which include the use of the ProLock ransomware strain. Whichever payload is deployed, however, security researchers have noticed something else. Emotet got another upgrade. The upgrade takes the form of an email attachment stealer. Once installed on a target system, it will scan that target's inbox and sent folders looking for email attachments. The malware isn't picky, and will take anything, copying whatever files it finds and sending them to the command and control server so it can recycle and reuse the attachments on future phishing emails. This may not sound like it, but is actually a devastatingly effective strategy. By using live files, the phishing emails gain a further air of authenticity. The data those files contain looks legitimate because it is legitimate in that the file was generated by someone working for a corporation and sent around to others for review. Worse, Emotet doesn't show any signs of slowing down. This week, based on statistics compiled by the interactive malware analysis platform AnyRun, Emotet was ranked as the malware threat of the week. It was measured by uploads, with nearly ten times the total uploads as njRAT, which claimed the #2 spot. Given the size of the Emotet botnet, this is definitely a threat to be mindful of. Make sure your IT staff are aware of the large scale, ongoing phishing campaign by the botnet and be sure to remind all employees not to open any email attachments unless they're absolutely certain where they're coming from.


The total number of reported data breaches in Australia for the 2019-20 financial year totaled 1,050, the first of two half-year reports from the Office of the Australian Information Commissioner (OAIC) has shown. For the six months spanning January to June 2020, 518 breaches were notified under the Notifiable Data Breaches (NDB) scheme, down 3% from the 532 reported in July to December 2019. 124 of those breaches occurred during May, the most reported in any calendar month since the scheme began in February 2018. Most of these were attributed to human error, but OAIC said it has yet to identify a specific cause for the increase, explaining in its report [PDF] it was not aware of any evidence that suggested the increase was related to changed business practices resulting from COVID-19, given that notifications across the period were otherwise broadly consistent with longer term trends. Malicious or criminal activity accounted for 317 notifications during the reported period. Attacks included cyber incidents such as phishing and malware, data breaches caused by social engineering or impersonation, theft of paperwork or storage devices, and actions taken by a rogue employee or insider threat, the OAIC said. The majority of cyber incidents during the reporting period were linked to malicious actors gaining access to accounts either through phishing attacks or by using compromised account details. Compromised credentials were the case for 133 notifications, ransomware attack for 33 notifications, and "hacking" for 29. With ransomware this year taking out beverage company Lion and logistics giant Toll, twice, the OAIC report highlighted they weren't alone, with 33 cases of ransomware reported from January to June 2020. Data breaches resulting from human error was the case for 176 breaches from January through June, with personal information sent to the wrong recipient via email accounting for 68 of those cases. In two cases, a fax with personal information was sent to the wrong recipient. There was a loss of paperwork or storage device on 14 of the reported occasions. System faults accounted for 5% of data breaches during this reporting period. The health sector is again the highest reporting sector, notifying 115 breaches, and finance is next down the line, notifying 75 breaches had occurred during the six-month period. Education reported 44, insurance 35, and legal, accounting, and management services reported 26 breaches. Most NDBs in the period involved the personal information of 100 individuals or fewer. In one instance, the number of individuals affected was over 10 million. The OAIC noted that in counting individuals affected, it also took into consideration the global presence of the reporting entity. In 84% of reported instances, contact information such as an individual's home address, phone number, or email address was breached, while over a third of all breaches notified during the period involved identity information such as passport number, driver license number, or other government identifiers. Data breaches notified in the six-month period also involved tax file numbers; financial details, such as bank account or credit card numbers; and health information. The OAIC said there have been multiple instances of incomplete notifications of data breaches where entities may not have fully met their obligations with regard to the content of the notification to individuals affected by a data breach.



Exploit: Ransomware

Cooke County, TX: Municipal Government 

Risk to Business: 1.972 = Severe - Attackers claimed to have used REvil ransomware on July 4 in a ransomware attack on the Cooke County Sheriff’s Office (CCSO). In the resulting in a data breach, cybercriminals snatching personal identification information from an internal database. The compromised data came from either CCSO reports or cases going back several years. The gang posted their typical announcement about the hack showing data folders with filenames that appeared to reflect archived case files as well as current cases, including a threat that the files would be uploaded in seven days. Individual Risk: 2.201 = Severe - While no financial information was reported as stolen, PII was involved in the breach – not to mention potentially damaging or embarrassing legal records.

Customers Impacted: 2,000+

How it Could Affect Your Business: Ransomware is most commonly delivered via a phishing email, although cybercriminals are expanding their use of phishing through messaging and SMS text.

Breach Risk Levels

1 – 1.5 = Extreme Risk

1.51 – 2.49 = Severe Risk

2.5 – 3 = Moderate Risk

Risk scores are calculated using a formula that considers a wide range of factors related to the assessed breach.

Avantia Cyber Security & ID Agent to the Rescue: Teach staffers to spot phishing attempts fast with BullPhish ID. We continually update our plug-and-play phishing kits so that you can continually update your training against today’s biggest threat. Find out more by phoning Avantia on 07 30109711 or Email


Exploit: Ransomware

University of Utah: Institution of Higher Learning 

Risk to Business: 2.077 = Severe - Netwalker ransomware appears to be the culprit in a data breach at the University of Utah. The school reportedly paid a ransomware gang $457,059 in order to avoid having student information released online. The hack occurred on July 19, and the cybercriminals gained access to the network of the university’s College of Social and Behavioral Science [CSBS].

Individual Risk: 2.224 = Severe - Even when a ransom is paid, there’s never proof that the gang really did destroy the stolen data, instead of copying it or selling it. Students should be aware of this data being used in spear phishing attempts. Customers Impacted: Unknown

How it Could Affect Your Business: Ransomware is a persistent and pernicious threat to any business. Paying the criminals doesn’t guarantee the safety of stolen data – but blocking the initial attack does.

Breach Risk Levels

1 – 1.5 = Extreme Risk

1.51 – 2.49 = Severe Risk

2.5 – 3 = Moderate

Risk Risk scores are calculated using a formula that considers a wide range of factors related to the assessed breach.

Avantia Cyber Security & ID Agent to the Rescue: Ransomware often makes its way into company inboxes in the form of a phishing email. Why not stop that email from ever arriving with our NEWEST addition to our digital risk protection platform: Graphus, a smart AI-driven automated phishing defense solution so unique that it uses a patented algorithm to learn how businesses communicate for exactly the protection they need. Call Avantia on 07 30109711 or email


Exploit: Unauthorized Access to Data

Instacart: Grocery Shopping and Delivery Service 

Risk to Business: 1.775 = Severe - In a statement posted to its website, Instacart has announced that it has suffered another data breach, less than a month after a breach that was widely reported in the media containing user account data. This time, two employees at a third-party service provider accessed accounts that they shouldn’t have, exposing customer information again.

Individual Risk: 2.821 = Moderate - Instacart’s forensic investigation did not find any evidence the two support agents had downloaded or digitally copied data from its systems. The company’s contract with the third-party vendor has been terminated, and impacted accounts have been notified via email.

Customers Impacted: 2,180

How it Could Affect Your Business: Although the pandemic will continue to drive their business as people who are unable to shop in person flock to the service, in other circumstances this would assuredly cause customer dissatisfaction, especially after the information for 278,531 Instacart accounts turned up in a Dark Web marketplace after the first one.

Breach Risk Levels

1 – 1.5 = Extreme Risk

1.51 – 2.49 = Severe Risk

2.5 – 3 = Moderate Risk

Risk scores are calculated using a formula that considers a wide range of factors related to the assessed breach.

Avantia Cyber Security & ID Agent to the Rescue:  Third party risk is a problem that every business faces today. Ensure that business credentials are monitored and protected from endangering companies if they end up in a Dark Web data dump as a result of a third party data breach. Protect your business against Dark Web compromise with a FREE Real Time Dark Web Credential search by calling Avantia on 07 30109711 or Email


Exploit: Unauthorized Database Access (Hacking)

Freepik: Photo and Graphic Library 

Risk to Business: 1.903 = Severe - Photo and graphics giant Freepik the security breach occurred after hackers were able to exploit an SQL vulnerability to gain access to one of its databases storing user data. The unidentified cybercriminals gained access to usernames and passwords for the oldest accounts registered on the Freepik and Flaticon websites, impacting millions of users.

Individual Risk: 2.782 = Moderate - Potentially affected users have been notified via email the company reports that impact varies per account. Not all users had passwords associated with their accounts. The company estimates that number at 4.5 million users who used federated logins (Google, Facebook, or Twitter) to log into their accounts. For the remaining 3.77M users the attacker got their email address and a hash of their password. For 3.55M of those users, the method to hash the password was bcrypt. For 229K users, the method was salted MD5. Since the attack, all users have been updated to bcrypt.

Customers Impacted: 8.3 million

How it Could Affect Your Business: It pays to guard old data too by updating storage security and access security. Many of the oldest databases and accounts involved in this incident had never had their security updated and it had long since become obsolete, making it easier for hackers to break in and steal.

Breach Risk Levels

1 – 1.5 = Extreme Risk

1.51 – 2.49 = Severe Risk

2.5 – 3 = Moderate Risk

Risk scores are calculated using a formula that considers a wide range of factors related to the assessed breach.

Avantia Cyber Security & ID Agent to the Rescue: Protect access points to data and systems with Passly, state-of-the-art security that minimizes threats by minimizing the openings that criminals can use to get at your data – but maximizing the identity and access management controls that keep that data safe. Call Avantia today on 07 30109711 or Email for more information.

THREAT FOCUS: Carnival Corporation - UNITED STATES

Exploit: Ransomware

Carnival Corporation: Cruise Line

Risk to Business: 1.903 = Severe - Carnival has released a statement noting that on August 15 attackers “accessed and encrypted a portion of one brand’s information technology systems,” and that the intruders also downloaded files from the company’s network. preliminary assessment of the incident, Carnival said it expects that the attackers gained access to some guest and employees’ personal data, but it is still investigating the incident. This is Carnival’s second breach this year after another breach was disclosed in March. Individual Risk: 2.312 = Severe - The investigation into exactly what data and what kind of data was stolen is ongoing. Carnival expects that both passenger and employee data has been impacted, but has offered no specifics. Anyone who has traveled on a Carnival cruise and staffers should be wary of phishing and identity theft attempts.

Customers Impacted: Unknown

How it Could Affect Your Business: Protection from ransomware starts with protection from phishing – including adding automated phishing protection and phishing resistance training to your security stack.

Breach Risk Levels

1 – 1.5 = Extreme Risk

1.51 – 2.49 = Severe Risk

2.5 – 3 = Moderate Risk

Risk scores are calculated using a formula that considers a wide range of factors related to the assessed breach.

Avantia Cyber Security & ID Agent to the Rescue: Our digital risk protection platform packs a punch to protect your data from phishing threats through the combined power of BullPhish ID and Graphus. For more information please call Avantia on 07 30109711 or Email

THREAT FOCUS: Royal Military Colleges - CANADA

Exploit: Ransomware

Royal Military Colleges – Military Training Higher Education System 

Risk to Business: 2.045 = Severe - A DoppelPaymer ransomware incident was reported last month affecting Canada’s military college system. Now that data from the Royal Military College (RMC) of Canada has appeared on the Dark Web this week. The Department of National Defense (DND) did not confirm the leak contains RMC information. Reports from analysts who have seen the data say that the files appear genuine and include student progress reports and acceptance letters, as well as a myriad of financial documents like tax receipts and budgets for various departments.

Individual Risk: 2.603 = Moderate - No personally identifiable information or financial data for students appears to have been affected. Financial data appears to be concentrated in official channels. Exposure of student disciplinary records could potentially be embarrassing, and data could be used for spear phishing or blackmail attempts

Customers Impacted: Unknown

How it Could Affect Your Business: No institution is immune to phishing – not even a huge government entity with access to cutting-edge technology and training. Every business of every size needs phishing resistance training.

Breach Risk Levels

1 – 1.5 = Extreme Risk

1.51 – 2.49 = Severe Risk

2.5 – 3 = Moderate Risk

Risk scores are calculated using a formula that considers a wide range of factors related to the assessed breach.