{"id":566224,"date":"2021-06-03T13:26:24","date_gmt":"2021-06-03T13:26:24","guid":{"rendered":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/"},"modified":"2021-06-03T13:26:24","modified_gmt":"2021-06-03T13:26:24","slug":"cybercriminals-have-created-operations-that-can-rival-major-firms","status":"publish","type":"post","link":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/","title":{"rendered":"Cybercriminals have created operations that can rival major firms"},"content":{"rendered":"<p><a class=\"content-anchor\" id=\"tldr-story-07\"><\/a> <strong>DarkSide, the emerging platform for cyber criminals worldwide:<\/strong> Ransom notes have gotten a lot more sophisticated in recent years, with \u201cransomware-as-a-service\u201d businesses \u2014 subscription based services that allow users to use preexisting ransomware software to execute attacks \u2014 making online extortion available to a wider network of would-be criminals. One such platform, DarkSide, garnered attention after it facilitated a recent <a href=\"https:\/\/enterprise.news\/egypt\/en\/news\/story\/ba540bd1-0b36-412c-9347-7f8f30042707\">cyberattack on the US\u2019 Colonial Pipeline<\/a>, forcing its closure and halting the delivery of almost half of the US East Coast\u2019s fuel supply. Darkside claimed responsibility for the Colonial Pipeline hacking, and even issued a press release saying that they \u201cregret creating problems,\u201d and that the attack had no geopolitical motivations but only aimed at making money, reports <a href=\"https:\/\/www.ft.com\/content\/0afb53f0-f382-442a-9a32-02824ce8bb70\">The Financial Times<\/a>.<\/p>\n<p><strong>And make money they did.<\/strong> DarkSide was paid a USD 4.4 mn ransom to provide a decryption key and delete all stolen sata, Colonial Pipeline\u2019s CEO told <a href=\"https:\/\/www.wsj.com\/articles\/colonial-pipeline-ceo-tells-why-he-paid-hackers-a-4-4-million-ransom-11621435636\">The Wall Street Journal<\/a>, saying it was the right thing to do for the country.<\/p>\n<p><strong>So how does the platform work? <\/strong>DarkSide has put a system in place for hackers to perform cyber attacks on companies, acting as a facilitator for reaching out and asking for a ransom from the firm and ensuring the payment reaches the cyber criminal. DarkSide gets its talent from on the dark web, where CVs and references are solicited, writes <a href=\"https:\/\/www.ft.com\/content\/87887f26-b57e-48d8-b60e-c4eb281ff679\">The FT<\/a>. Once the cyber criminal platform successfully attacks a firm, they use the method of double extortion to demand separate sums for both a digital key needed to unlock any files and servers, and a separate ransom in exchange for a promise to destroy any data stolen from the victim, according to <a href=\"https:\/\/krebsonsecurity.com\/2021\/05\/a-closer-look-at-the-darkside-ransomware-gang\/\">KrebsonSecurity<\/a>. If the ransom is not paid, DarkSide will publish all the data and store it on their content delivery network for at least six months as well as send notifications of the leak to media, partners, and customers.<\/p>\n<p><strong>Cue the ethical hacker manifesto: <\/strong>Following the Colonial Pipeline attack, DarkSide has said it would \u201ccheck each company that our partners want to encrypt to avoid social consequences in the future.\u201d Based \u201con their principles\u201d, the platform has also forbidden affiliates from dropping ransomware on organizations in industries including healthcare, funeral services, education, public sector and non-profits, according to screenshots obtained by <a href=\"https:\/\/www.bbc.com\/news\/business-57050690\">BBC<\/a>. If that doesn\u2019t sound insane enough, Darkside has also said that it only attacks companies that can pay the requested amount, explaining that they analyze targets\u2019 finances before the hack as they \u201cdo not want to kill your business\u201d. If hacked firms have any questions, they can ask DarkSide\u2019s customer support that will help you pay the ransom.<\/p>\n<p><strong>DarkSide has attacked at least three more companies since the Colonial Pipeline incident. <\/strong>The platform announced three more hacks on global firms on the dark web, but none appear to engage in critical infrastructure, writes <a href=\"https:\/\/www.cnbc.com\/2021\/05\/12\/darkside-hacker-group-behind-pipeline-attack-claims-three-new-victims.html\">CNBC<\/a>. The hacked companies are a US technology services reseller, a Brazilian renewable energy products reseller, and a Scottish construction firm, but CNBC did not reveal the names or the amount of ransom asked for. UK firm One Call Insurance has also fallen victim to a DarkSide attack, with <a href=\"https:\/\/www.doncasterfreepress.co.uk\/news\/one-call-cyber-attack-all-you-need-to-know-about-hackers-darkside-and-insurance-boss-john-radford-3244076\">Doncaster Free Press<\/a> writing that a ransom of GBP 15 mn is being requested. The news has not made it into any larger media organizations.<\/p>\n<p><strong>How to save your own firm: <\/strong>We\u2019ve all seen the misspelt scam emails, the clumsy phishing attacks, and pop up virus threats, however, DarkSide and its partners require more effort to stay safe than just being careful where you click. The US\u2019s <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-131a\">Cybersecurity and Infrastructure Security Agency<\/a> released guidelines on the best practices for preventing business disruption from ransomware attacks following the DarkSide hacking. The guidelines include requiring multi-factor authentication, setting up antivirus and antimalware programs to conduct regular scans, and limiting access to resources over networks, among many other mitigation measures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DarkSide, the emerging platform for cyber criminals worldwide: Ransom notes have gotten a lot more sophisticated in recent years, with \u201cransomware-as-a-service\u201d businesses \u2014 subscription based services that allow users to use preexisting ransomware software to execute attacks \u2014 making online extortion available to a wider network of would-be criminals. One such platform, DarkSide, garnered attention [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":566225,"comment_status":"closed","ping_status":"open","sticky":false,"template":"single-feature.php","format":"standard","meta":{"_acf_changed":false,"newspack_ads_suppress_ads":false,"newspack_popups_has_disabled_popups":false,"newspack_sponsor_sponsorship_scope":"","newspack_sponsor_native_byline_display":"inherit","newspack_sponsor_native_category_display":"inherit","newspack_sponsor_underwriter_style":"inherit","newspack_sponsor_underwriter_placement":"inherit","ep_exclude_from_search":false,"_primary_brand":0,"newspack_featured_image_position":"","newspack_post_subtitle":"","newspack_article_summary_title":"Overview:","newspack_article_summary":"","newspack_hide_updated_date":false,"newspack_show_updated_date":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9844],"tags":[377,633,91],"brand":[],"newspack_spnsrs_tax":[],"class_list":["post-566224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-enterprisepm","tag-oil-and-gas","wpautop","entry"],"acf":{"mongo_id":"2e491e8e-a826-4996-a3ea-e618d0867bd1","is_powered_by":true,"story_type":"1","photo_url":"https:\/\/ent.news\/2021\/6\/422.jpg","photo_position":"above","related_issue":[566212],"teaser":"","voice_url":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybercriminals have created operations that can rival major firms - EnterpriseAM Egypt<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminals have created operations that can rival major firms\" \/>\n<meta property=\"og:description\" content=\"DarkSide, the emerging platform for cyber criminals worldwide: Ransom notes have gotten a lot more sophisticated in recent years, with \u201cransomware-as-a-service\u201d businesses \u2014 subscription based services that allow users to use preexisting ransomware software to execute attacks \u2014 making online extortion available to a wider network of would-be criminals. One such platform, DarkSide, garnered attention [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/\" \/>\n<meta property=\"og:site_name\" content=\"EnterpriseAM Egypt\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-03T13:26:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?fit=%2C&ssl=1\" \/>\n<meta name=\"author\" content=\"enterpriseam admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"enterpriseam admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/\"},\"author\":{\"name\":\"enterpriseam admin\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/person\/ca597032db7e4db868359c123cec256d\"},\"headline\":\"Cybercriminals have created operations that can rival major firms\",\"datePublished\":\"2021-06-03T13:26:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/\"},\"wordCount\":648,\"publisher\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#organization\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?fit=%2C&ssl=1\",\"keywords\":[\"cybersecurity\",\"EnterprisePM\",\"oil and gas\"],\"articleSection\":[\"CYBERSECURITY\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/\",\"name\":\"Cybercriminals have created operations that can rival major firms - EnterpriseAM Egypt\",\"isPartOf\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?fit=%2C&ssl=1\",\"datePublished\":\"2021-06-03T13:26:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?fit=%2C&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?fit=%2C&ssl=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/enterpriseam.com\/egypt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercriminals have created operations that can rival major firms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#website\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/\",\"name\":\"EnterpriseAM\",\"description\":\"The State of the Nation\",\"publisher\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enterpriseam.com\/egypt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#organization\",\"name\":\"EnterpriseAM\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ent.news\/internal\/240894.svg\",\"contentUrl\":\"https:\/\/ent.news\/internal\/240894.svg\",\"caption\":\"EnterpriseAM\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/person\/ca597032db7e4db868359c123cec256d\",\"name\":\"enterpriseam admin\",\"sameAs\":[\"http:\/\/enterpriseam.testing.projectsarea.com\"],\"url\":\"https:\/\/enterpriseam.com\/egypt\/author\/enterpriseam\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybercriminals have created operations that can rival major firms - EnterpriseAM Egypt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/","og_locale":"en_US","og_type":"article","og_title":"Cybercriminals have created operations that can rival major firms","og_description":"DarkSide, the emerging platform for cyber criminals worldwide: Ransom notes have gotten a lot more sophisticated in recent years, with \u201cransomware-as-a-service\u201d businesses \u2014 subscription based services that allow users to use preexisting ransomware software to execute attacks \u2014 making online extortion available to a wider network of would-be criminals. One such platform, DarkSide, garnered attention [&hellip;]","og_url":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/","og_site_name":"EnterpriseAM Egypt","article_published_time":"2021-06-03T13:26:24+00:00","og_image":[{"url":"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?fit=%2C&ssl=1","type":"","width":"","height":""}],"author":"enterpriseam admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"enterpriseam admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#article","isPartOf":{"@id":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/"},"author":{"name":"enterpriseam admin","@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/person\/ca597032db7e4db868359c123cec256d"},"headline":"Cybercriminals have created operations that can rival major firms","datePublished":"2021-06-03T13:26:24+00:00","mainEntityOfPage":{"@id":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/"},"wordCount":648,"publisher":{"@id":"https:\/\/enterpriseam.com\/egypt\/#organization"},"image":{"@id":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?fit=%2C&ssl=1","keywords":["cybersecurity","EnterprisePM","oil and gas"],"articleSection":["CYBERSECURITY"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/","url":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/","name":"Cybercriminals have created operations that can rival major firms - EnterpriseAM Egypt","isPartOf":{"@id":"https:\/\/enterpriseam.com\/egypt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#primaryimage"},"image":{"@id":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?fit=%2C&ssl=1","datePublished":"2021-06-03T13:26:24+00:00","breadcrumb":{"@id":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#primaryimage","url":"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?fit=%2C&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?fit=%2C&ssl=1"},{"@type":"BreadcrumbList","@id":"https:\/\/enterpriseam.com\/egypt\/2021\/06\/03\/cybercriminals-have-created-operations-that-can-rival-major-firms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/enterpriseam.com\/egypt\/"},{"@type":"ListItem","position":2,"name":"Cybercriminals have created operations that can rival major firms"}]},{"@type":"WebSite","@id":"https:\/\/enterpriseam.com\/egypt\/#website","url":"https:\/\/enterpriseam.com\/egypt\/","name":"EnterpriseAM","description":"The State of the Nation","publisher":{"@id":"https:\/\/enterpriseam.com\/egypt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enterpriseam.com\/egypt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enterpriseam.com\/egypt\/#organization","name":"EnterpriseAM","url":"https:\/\/enterpriseam.com\/egypt\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/","url":"https:\/\/ent.news\/internal\/240894.svg","contentUrl":"https:\/\/ent.news\/internal\/240894.svg","caption":"EnterpriseAM"},"image":{"@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/person\/ca597032db7e4db868359c123cec256d","name":"enterpriseam admin","sameAs":["http:\/\/enterpriseam.testing.projectsarea.com"],"url":"https:\/\/enterpriseam.com\/egypt\/author\/enterpriseam\/"}]}},"featured_image_src":"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?resize=600%2C400&ssl=1","featured_image_src_square":"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?resize=600%2C600&ssl=1","author_info":{"display_name":"enterpriseam admin","author_link":"https:\/\/enterpriseam.com\/egypt\/author\/enterpriseam\/"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ent.news\/2021\/6\/422.jpg?fit=%2C&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":636649,"url":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/04\/the-darkside-of-the-boy-band-scheme\/","url_meta":{"origin":566224,"position":0},"title":"The darkside of the boy band scheme","author":"enterpriseam admin","date":"4 August 2024","format":false,"excerpt":"Front row seats to the ugly truth of the boy band era","rel":"","context":"In &quot;ENTERPRISE RECOMMENDS&quot;","block_context":{"text":"ENTERPRISE RECOMMENDS","link":"https:\/\/enterpriseam.com\/egypt\/category\/enterprise-recommends-2\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/2024\/8\/198.jpg?fit=%2C&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":572777,"url":"https:\/\/enterpriseam.com\/egypt\/2020\/07\/08\/swvl-security-hack-cybersecurity\/","url_meta":{"origin":566224,"position":1},"title":"Swvl, security, hack, cybersecurity","author":"enterpriseam admin","date":"8 July 2020","format":false,"excerpt":"Swvl was hacked: The mass-transport app said yesterday that it faced a security breach involving \u201cunauthorized access\u201d to its system earlier this month. Swvl claims it has yet to find evidence that customers were \u201cdirectly impacted\u201d by the breach and that sensitive data such as passwords and credit card information\u2026","rel":"","context":"In &quot;Speed Round&quot;","block_context":{"text":"Speed Round","link":"https:\/\/enterpriseam.com\/egypt\/category\/speed-round\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/internal\/536550.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":617569,"url":"https:\/\/enterpriseam.com\/egypt\/2024\/03\/24\/aala-nesbet-moshahda-shows-the-darkside-of-becoming-the-trend\/","url_meta":{"origin":566224,"position":2},"title":"Aala Nesbet Moshahda shows the darkside of becoming the trend","author":"enterpriseam admin","date":"24 March 2024","format":false,"excerpt":"The actors successfully personify their characters\u2019 financial struggle and dreams of making it from get-rich-quick schemes","rel":"","context":"In &quot;ENTERPRISE RECOMMENDS&quot;","block_context":{"text":"ENTERPRISE RECOMMENDS","link":"https:\/\/enterpriseam.com\/egypt\/category\/enterprise-recommends-2\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/2024\/3\/2122.jpeg?fit=%2C&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":550619,"url":"https:\/\/enterpriseam.com\/egypt\/2022\/04\/11\/enterprise-explains-dark-web-marketplaces\/","url_meta":{"origin":566224,"position":3},"title":"Enterprise Explains: Dark Web Marketplaces","author":"enterpriseam admin","date":"11 April 2022","format":false,"excerpt":"Enterprise Explains: Dark Web Marketplaces. German authorities last week shutdown Russian-language darknet platform Hydra, seizing its servers along with USD 25 mn in BTC. The crackdown came in coordination with US authorities and was apparently spurred by Russia\u2019s war in Ukraine. But just what are dark web marketplaces, how widespread\u2026","rel":"","context":"In &quot;WHAT\u2019S NEXT&quot;","block_context":{"text":"WHAT\u2019S NEXT","link":"https:\/\/enterpriseam.com\/egypt\/category\/whats-next-2\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/2022\/4\/464.jpg?fit=%2C&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":565867,"url":"https:\/\/enterpriseam.com\/egypt\/2021\/05\/10\/tonight-us-pipeline-crisis-continues-global-metal-prices-surge-doge-on-the-moon\/","url_meta":{"origin":566224,"position":4},"title":"TONIGHT: US pipeline crisis continues; global metal prices surge; Doge on the moon.","author":"enterpriseam admin","date":"10 May 2021","format":false,"excerpt":"Well, that news slowdown about which we were whining this morning? It didn\u2019t last. THE BIG STORY THIS AFTERNOON is the end of a tie-up that would have seen EGX-listed Cleopatra Hospitals Group and Alameda Healthcare combine their businesses to create the country\u2019s largest healthcare group by far. Neither party\u2026","rel":"","context":"In &quot;WHAT WE\u2019RE TRACKING TONIGHT&quot;","block_context":{"text":"WHAT WE\u2019RE TRACKING TONIGHT","link":"https:\/\/enterpriseam.com\/egypt\/category\/what-were-tracking-tonight\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/internal\/536550.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":562199,"url":"https:\/\/enterpriseam.com\/egypt\/2021\/05\/11\/this-morning-cleo-alameda-and-the-colonial-pipeline-in-the-us-dominate-another-news-cycle\/","url_meta":{"origin":566224,"position":5},"title":"THIS MORNING: Cleo-Alameda and the Colonial Pipeline in the US dominate another news cycle","author":"enterpriseam admin","date":"11 May 2021","format":false,"excerpt":"Welcome to the final business day of Ramadan, wonderful people. Just a few more hours to go and we\u2019re on break.Egypt is closed from Wednesday, 12 May through Sunday, 16 May inclusive. Tomorrow is set to be the last day of Ramadan, with Eid El Fitr running Thursday-Sunday. Banks and\u2026","rel":"","context":"In &quot;What We're Tracking Today&quot;","block_context":{"text":"What We're Tracking Today","link":"https:\/\/enterpriseam.com\/egypt\/category\/what-were-tracking-today\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/internal\/536550.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/posts\/566224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/comments?post=566224"}],"version-history":[{"count":0,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/posts\/566224\/revisions"}],"acf:post":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/afternoon\/566212"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/media\/566225"}],"wp:attachment":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/media?parent=566224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/categories?post=566224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/tags?post=566224"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/brand?post=566224"},{"taxonomy":"newspack_spnsrs_tax","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/newspack_spnsrs_tax?post=566224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}