Thursday, January 30, 2025
HomeCyber AttackTargus Hacked: Attackers Gain Access to File Servers

Targus Hacked: Attackers Gain Access to File Servers

Published on

SIEM as a Service

Follow Us on Google News

Targus International, LLC and its affiliates fell victim to a sophisticated cyberattack.

The company, an indirect subsidiary of B. Riley Financial, Inc., announced that an unauthorized entity breached its file systems, prompting an immediate and robust response to mitigate the damage.

Upon detecting the intrusion, Targus wasted no time mobilizing its incident response team.

With the aid of external cybersecurity experts, the company embarked on a thorough investigation to understand the scope and impact of the breach.

Efforts to contain the incident temporarily halted Targus’ business operations, highlighting the severity of the attack and the company’s commitment to security.

Document
Run Free ThreatScan on Your Mailbox

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Recovery and Impact Assessment

Targus has since managed to contain the breach and is currently in the process of recovering its systems.

The company remains vigilant, with ongoing investigations to address all vulnerabilities.

Despite the temporary disruption, Targus and B. Riley Financial, Inc. are confident that the incident will not have a material impact on their financial health or operational results, as reported by the US Securities and Exchange Commission.

Targus has notified the relevant regulatory authorities about the breach, which aligns with its commitment to transparency and legal compliance.

The company also cooperates with law enforcement agencies to trace the perpetrators and prevent future incidents.

This collaborative approach highlights Targus’ dedication to safeguarding its stakeholders’ interests.

Targus’ announcement includes forward-looking statements that caution stakeholders about risks and uncertainties.

These statements reflect the company’s current expectations based on the information available at the time.

However, they are subject to change, and the company commits to updating the public as new information becomes available.

The cyberattack on Targus is a stark reminder of the ever-present threats in the digital world.

While the breach has caused temporary disruptions, Targus’ swift response and comprehensive recovery plan demonstrate strength in adversity.

As the company continues to navigate this challenging time, its actions set a precedent for how businesses can effectively respond to and recover from cyber threats.

Secure your emails in a heartbeat! Take Trustifi's free 30-second assessment and get matched with your ideal email security vendor - Try Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this...

DeepSeek is Now Available With Microsoft Azure AI Foundry

Microsoft has officially added DeepSeek R1, an advanced AI model, to its Azure AI...

New Apple SLAP & FLOP Side-Channel Attacks Let Attackers Steal Login Details From Browser

Researchers from the Georgia Institute of Technology and Ruhr University Bochum have uncovered two...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this...

DeepSeek is Now Available With Microsoft Azure AI Foundry

Microsoft has officially added DeepSeek R1, an advanced AI model, to its Azure AI...