Saturday, May 24, 2025
HomeCyber Security NewsHackers Gained Unauthorized Network Access to Casio Networks

Hackers Gained Unauthorized Network Access to Casio Networks

Published on

SIEM as a Service

Follow Us on Google News

Casio Computer Co., Ltd. has confirmed that a third party illegally accessed its network on October 5th, leading to significant disruptions in its services.

The company disclosed the breach after conducting an internal investigation. The investigation revealed that the unauthorized access resulted in a system failure, affecting the availability of some services.

Investigation Underway

In response to the breach, Casio has launched a thorough investigation to determine the full scope and impact of the unauthorized access. An external specialist agency has been engaged to assist in this process.

- Advertisement - Google News

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

The primary focus of the investigation is to ascertain whether any personal information or other critical data has been compromised.”We are currently investigating the details,” a Casio spokesperson stated.

“Our priority is to understand the extent of the breach and ensure that any potential risks are mitigated.”

Immediate Response and Security Measures

Upon discovering the unauthorized access, Casio promptly reported the incident to the relevant authorities. The company has also implemented immediate security measures to prevent further unauthorized access.

These measures include restricting external access to their networks and enhancing monitoring systems to detect suspicious activities.

Casio assures its customers and partners that it is taking all necessary steps to secure its network and prevent future incidents.

The company explained, “We have taken swift action to address this situation and are working diligently with experts to enhance our security infrastructure. “

Apology and Commitment

Casio has issued a public apology for the inconvenience and concern caused by this security breach. “We deeply apologize for causing great concern and inconvenience to all those involved,” the company stated in its official release.

“We are committed to resolving this issue promptly and ensuring that our systems are secure.”

The company has pledged to keep stakeholders informed as more information becomes available from the ongoing investigations. Customers are encouraged to remain vigilant and report any suspicious activity related to their interactions with Casio.

Upgrade Your Cybersecurity Skills With 100+ Premium Cyber Security Courses Online - Enroll Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...