Tuesday, March 19, 2024

Leading research and advisory firms Forrester was hacked

Forrester the most leading research and advisory firm in the world announced that Forrester.com experienced a Security Breach last Friday.

Hackers defaced into their website(Forrester.com) and download research reports that are made available for their clients.The advisory firm supports decision makers of its customers by giving patterns, statistics, and other market analysis.

Steven Peltzman, Forrester’s Chief Business Technology Officer, says the attacker stole valid user credentials that gave him access to Forrester.com accounts. Preliminary forensic evidence suggests that the hacker was ultimately detected and shut out of the system; remediation steps were taken.

It’s unique insights are grounded in annual surveys of more than 675,000 consumers and business leaders worldwide.There is no evidence that confidential client data, financial information, or confidential employee data was accessed or exposed as part of the incident.

“We recognize that hackers will attack attractive targets — in this case, our research IP. We also understand there is a tradeoff between making it easy for our clients to access our research and security measures,” said George F. Colony, chairman and chief executive officer.

“We feel that we have taken a common-sense approach to those two priorities; however, we will continuously look at that balance to respond to changing cybersecurity risk.”

Forrester joins the list of business organizations that suffered data breach after Equifax, Deloitte, and the US Securities and Exchange Commission (SEC).

Website

Latest articles

CryptoWire Ransomware Attacking Abuses Schedule Task To maintain Persistence

AhnLab security researchers detected a resurgence of CryptoWire, a ransomware strain originally prevalent in...

E-Root Admin Sentenced to 42 Months in Prison for Selling 350,000 Credentials

Tampa, FL – In a significant crackdown on cybercrime, Sandu Boris Diaconu, a 31-year-old...

WhiteSnake Stealer Checks for Mutex & VM Function Before Execution

A new variant of the WhiteSnake Stealer, a formidable malware that has been updated...

Researchers Hack AI Assistants Using ASCII Art

Large language models (LLMs) are vulnerable to attacks, leveraging their inability to recognize prompts...

Microsoft Deprecate 1024-bit RSA Encryption Keys in Windows

Microsoft has announced an important update for Windows users worldwide in a continuous effort...

Beware Of Free wedding Invite WhatsApp Scam That Steal Sensitive Data

The ongoing "free wedding invite" scam is one of several innovative campaigns aimed at...

Hackers Using Weaponized SVG Files in Cyber Attacks

Cybercriminals have repurposed Scalable Vector Graphics (SVG) files to deliver malware, a technique that...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles