Beleaguered foreign currency exchange company Travelex confirmed on Friday that the first of its U.K.-based customer-facing systems were back up and running after the New Year’s Eve discovery of Sodinokibi ransomware on its network prompted a shutdown of key systems.
Meanwhile, a worrisome report revealed that dozens of major U.S. organizations and businesses have also failed to patch the same Pulse Secure VPN server vulnerability through which Travelex was infected, even though the a fix was issued in April 2019. Citing research from Bad Packets Report, the Wall Street Journal today named several of these potentially affected companies, including Purdue Pharma, Revlon and Texas Instruments.
Other companies included a California utility, a border-police force and an appellate court, said Troy Mursch, Bad Packets’ chief research officer, per the WSJ report.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.