Hackers breach Electronic Arts, stealing game source code and tools – CNN20 min read

https://www.cnn.com/2021/06/10/tech/electronic-arts-hack/index.html

‘);$vidEndSlate.removeClass(‘video__end-slate–inactive’).addClass(‘video__end-slate–active’);}};CNN.autoPlayVideoExist = (CNN.autoPlayVideoExist === true) ? true : false;var configObj = {thumb: ‘none’,video: ‘business/2021/06/10/electronic-arts-hack.cnnbusiness’,width: ‘100%’,height: ‘100%’,section: ‘domestic’,profile: ‘expansion’,network: ‘cnn’,markupId: ‘large-media_0’,adsection: ‘const-article-carousel-pagetop’,frameWidth: ‘100%’,frameHeight: ‘100%’,posterImageOverride: {“mini”:{“width”:220,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/210610132829-electronic-arts-file-restricted-small-169.jpg”,”height”:124},”xsmall”:{“width”:307,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/210610132829-electronic-arts-file-restricted-medium-plus-169.jpg”,”height”:173},”small”:{“width”:460,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/210610132829-electronic-arts-file-restricted-large-169.jpg”,”height”:259},”medium”:{“width”:780,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/210610132829-electronic-arts-file-restricted-exlarge-169.jpg”,”height”:438},”large”:{“width”:1100,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/210610132829-electronic-arts-file-restricted-super-169.jpg”,”height”:619},”full16x9″:{“width”:1600,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/210610132829-electronic-arts-file-restricted-full-169.jpg”,”height”:900},”mini1x1″:{“width”:120,”type”:”jpg”,”uri”:”//cdn.cnn.com/cnnnext/dam/assets/210610132829-electronic-arts-file-restricted-small-11.jpg”,”height”:120}}},autoStartVideo = false,isVideoReplayClicked = false,callbackObj,containerEl,currentVideoCollection = [{“title”:”Electronic Arts breached by hackers”,”duration”:”02:15″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/06/10/electronic-arts-hack.cnnbusiness/index.xml”,”videoId”:”business/2021/06/10/electronic-arts-hack.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210610132829-electronic-arts-file-restricted-large-169.jpg”,”videoUrl”:”/videos/business/2021/06/10/electronic-arts-hack.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”Hackers broke into the systems of Electronic Arts, one of the world’s biggest video game publishers, and stole game source code. CNN’s Alex Marquardt reports.”,”descriptionText”:”Hackers broke into the systems of Electronic Arts, one of the world’s biggest video game publishers, and stole game source code. CNN’s Alex Marquardt reports.”},{“title”:”FireEye CEO: Digital currency enables cybercrime”,”duration”:”06:43″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/06/10/fireeye-ceo-cybersecurity-ransomware.cnnbusiness/index.xml”,”videoId”:”business/2021/06/10/fireeye-ceo-cybersecurity-ransomware.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210610100641-fireeye-ceo-kevin-mandia-large-169.jpg”,”videoUrl”:”/videos/business/2021/06/10/fireeye-ceo-cybersecurity-ransomware.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”FireEye CEO Kevin Mandia talks with CNN’s Julia Chatterley about the acceleration of cybercrime and the risks of paying ransoms. “,”descriptionText”:”FireEye CEO Kevin Mandia talks with CNN’s Julia Chatterley about the acceleration of cybercrime and the risks of paying ransoms. “},{“title”:”See how cybersecurity experts trace ransom payments “,”duration”:”03:18″,”sourceName”:”CNN”,”sourceLink”:”https://www.cnn.com/”,”videoCMSUrl”:”/video/data/3.0/video/business/2021/06/10/cyberattack-europe-pandemic-elliptic-nick-paton-walsh-pkg-intl-hnk-vpx.cnn/index.xml”,”videoId”:”business/2021/06/10/cyberattack-europe-pandemic-elliptic-nick-paton-walsh-pkg-intl-hnk-vpx.cnn”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210610131900-screengrab-elliptic-large-169.jpg”,”videoUrl”:”/videos/business/2021/06/10/cyberattack-europe-pandemic-elliptic-nick-paton-walsh-pkg-intl-hnk-vpx.cnn/video/playlists/business-cybersecurity/”,”description”:”As we moved online in the pandemic, crime moved with us. In the European Union last year, new figures obtained by CNN show significant cyberattacks doubled. u003ca href=”http://www.cnn.com/profiles/nick-paton-walsh” target=”_blank”>CNN’s Nick Paton Walsh u003c/a>reports.”,”descriptionText”:”As we moved online in the pandemic, crime moved with us. In the European Union last year, new figures obtained by CNN show significant cyberattacks doubled. u003ca href=”http://www.cnn.com/profiles/nick-paton-walsh” target=”_blank”>CNN’s Nick Paton Walsh u003c/a>reports.”},{“title”:”White House urges companies to take cyberattack threat more seriously”,”duration”:”02:42″,”sourceName”:”CNN”,”sourceLink”:”https://www.cnn.com/”,”videoCMSUrl”:”/video/data/3.0/video/business/2021/06/03/companies-ransomware-white-house-marquardt-dnt-vpx.cnn/index.xml”,”videoId”:”business/2021/06/03/companies-ransomware-white-house-marquardt-dnt-vpx.cnn”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/201029151522-ransomware-attacks-target-hospitals-election-voter-databases-ferrante-nr-vpx-00000102-large-169.jpg”,”videoUrl”:”/videos/business/2021/06/03/companies-ransomware-white-house-marquardt-dnt-vpx.cnn/video/playlists/business-cybersecurity/”,”description”:”The White House has issued a rare open letter to companies calling on them to treat the threat of ransomware attacks with greater urgency, following back-to-back attacks by Russian hackers on key oil and food processing companies. CNN’s Alex Marquardt reports. “,”descriptionText”:”The White House has issued a rare open letter to companies calling on them to treat the threat of ransomware attacks with greater urgency, following back-to-back attacks by Russian hackers on key oil and food processing companies. CNN’s Alex Marquardt reports. “},{“title”:”Cybersecurity expert: Defense isn’t perfect in this game”,”duration”:”01:47″,”sourceName”:”CNNBusinses”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/06/03/cybersecurity-ransomware-companies-fireeye.cnnbusinses/index.xml”,”videoId”:”business/2021/06/03/cybersecurity-ransomware-companies-fireeye.cnnbusinses”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210511105547-01-cyber-attacks-ransom-payments-colonial-pipeline-large-169.jpg”,”videoUrl”:”/videos/business/2021/06/03/cybersecurity-ransomware-companies-fireeye.cnnbusinses/video/playlists/business-cybersecurity/”,”description”:”FireEye’s John Hultquist says ransomware is putting companies “in an impossible position” and that the government needs to step-up in order to deal with the threat.”,”descriptionText”:”FireEye’s John Hultquist says ransomware is putting companies “in an impossible position” and that the government needs to step-up in order to deal with the threat.”},{“title”:”Microsoft says SolarWinds hackers have struck again”,”duration”:”02:52″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/05/28/microsoft-solarwinds-hackers-russia.cnnbusiness/index.xml”,”videoId”:”business/2021/05/28/microsoft-solarwinds-hackers-russia.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/201218161649-solarwinds-headquarters—stock-large-169.jpg”,”videoUrl”:”/videos/business/2021/05/28/microsoft-solarwinds-hackers-russia.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”The hackers behind the SolarWinds attack have launched a new global cyberattack on more than 150 government agencies, think tanks and other organizations, according to Microsoft. CNN’s Matthew Chance reports.”,”descriptionText”:”The hackers behind the SolarWinds attack have launched a new global cyberattack on more than 150 government agencies, think tanks and other organizations, according to Microsoft. CNN’s Matthew Chance reports.”},{“title”:”IBM CEO: Cybersecurity needs to be a collective effort led by government”,”duration”:”02:47″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/05/11/ibm-ceo-cybersecurity.cnnbusiness/index.xml”,”videoId”:”business/2021/05/11/ibm-ceo-cybersecurity.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210511110228-arvind-krishna-ibm-ceo-large-169.jpg”,”videoUrl”:”/videos/business/2021/05/11/ibm-ceo-cybersecurity.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”Arvind Krishna, CEO of IBM, tells CNN’s Julia Chatterley that a NASA-style public/private partnership is needed to improve cyber resilience.”,”descriptionText”:”Arvind Krishna, CEO of IBM, tells CNN’s Julia Chatterley that a NASA-style public/private partnership is needed to improve cyber resilience.”},{“title”:”Cybersecurity expert on why ransomware attacks are becoming more common”,”duration”:”03:10″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/05/10/cybersecurity-ransomware-colonial-pipeline-dragos-ceo.cnnbusiness/index.xml”,”videoId”:”business/2021/05/10/cybersecurity-ransomware-colonial-pipeline-dragos-ceo.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210510105025-dragos-ceo-rob-lee-large-169.jpg”,”videoUrl”:”/videos/business/2021/05/10/cybersecurity-ransomware-colonial-pipeline-dragos-ceo.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”A cyberattack forced the largest US fuel pipeline to shut down. Dragos CEO Rob Lee says systems are getting compromised as industries becomes more digitally connected.”,”descriptionText”:”A cyberattack forced the largest US fuel pipeline to shut down. Dragos CEO Rob Lee says systems are getting compromised as industries becomes more digitally connected.”},{“title”:”FireEye CEO on how the SolarWinds hack was discovered”,”duration”:”03:24″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/02/24/fireeye-ceo-solarwinds-hack.cnnbusiness/index.xml”,”videoId”:”business/2021/02/24/fireeye-ceo-solarwinds-hack.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210225093138-video-thumbnail-fireeye-ceo-large-169.jpg”,”videoUrl”:”/videos/business/2021/02/24/fireeye-ceo-solarwinds-hack.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”Kevin Mandia, CEO of FireEye, explains how the company identified unauthorized access on their network but that they still don’t know how SolarWinds was breached.”,”descriptionText”:”Kevin Mandia, CEO of FireEye, explains how the company identified unauthorized access on their network but that they still don’t know how SolarWinds was breached.”},{“title”:”Cybersecurity expert: Groups like Proud Boys need to be treated like ISIS online”,”duration”:”02:50″,”sourceName”:”CNN”,”sourceLink”:”https://www.cnn.com/”,”videoCMSUrl”:”/video/data/3.0/video/business/2021/01/17/extremist-groups-media-alex-stamos-rs-stelter-vpx.cnn/index.xml”,”videoId”:”business/2021/01/17/extremist-groups-media-alex-stamos-rs-stelter-vpx.cnn”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210117114056-computer-scientist-alex-stamos-large-169.jpg”,”videoUrl”:”/videos/business/2021/01/17/extremist-groups-media-alex-stamos-rs-stelter-vpx.cnn/video/playlists/business-cybersecurity/”,”description”:”Computer scientist Alex Stamos and former DHS official Chris Krebs speak to CNN’s Brian Stelter about how extremist groups should be monitored on social media and online platforms. “,”descriptionText”:”Computer scientist Alex Stamos and former DHS official Chris Krebs speak to CNN’s Brian Stelter about how extremist groups should be monitored on social media and online platforms. “},{“title”:”US government agencies breached by Russian-linked hackers”,”duration”:”01:30″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2020/12/16/us-government-hack-solarwinds.cnnbusiness/index.xml”,”videoId”:”business/2020/12/16/us-government-hack-solarwinds.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/181127151625-01-protection-hacks-cybersecurity-112718-stock-large-169.jpg”,”videoUrl”:”/videos/business/2020/12/16/us-government-hack-solarwinds.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”The US government is reeling from multiple data breaches at top federal agencies, the result of a worldwide hacking campaign with possible ties to Russia.”,”descriptionText”:”The US government is reeling from multiple data breaches at top federal agencies, the result of a worldwide hacking campaign with possible ties to Russia.”},{“title”:”Analyst explains why hospitals are vulnerable to hackers”,”duration”:”04:22″,”sourceName”:”CNN”,”sourceLink”:”http://www.cnn.com”,”videoCMSUrl”:”/video/data/3.0/video/tech/2020/10/29/ransomware-attacks-target-hospitals-election-voter-databases-ferrante-nr-vpx.cnn/index.xml”,”videoId”:”tech/2020/10/29/ransomware-attacks-target-hospitals-election-voter-databases-ferrante-nr-vpx.cnn”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/201029151522-ransomware-attacks-target-hospitals-election-voter-databases-ferrante-nr-vpx-00000102-large-169.jpg”,”videoUrl”:”/videos/tech/2020/10/29/ransomware-attacks-target-hospitals-election-voter-databases-ferrante-nr-vpx.cnn/video/playlists/business-cybersecurity/”,”description”:”u003ca href=”http://www.cnn.com/2020/10/28/politics/hospitals-targeted-ransomware-attacks/index.html” target=”_blank”>Hackers are targeting hospitalsu003c/a>, health care providers and u003ca href=”http://www.cnn.com/2020/10/15/tech/ransomware-2020-election/index.html” target=”_blank”>voter databasesu003c/a> in what cybersecurity experts believe to be a massive attack. CNN’s u003ca href=”http://www.cnn.com/profiles/brianna-keilar-profile” target=”_blank”>Brianna Keilaru003c/a> speaks with CNN law enforcement analyst Anthony Ferrante about the implications of this happening not only in the middle of a pandemic, but also days before the election.”,”descriptionText”:”u003ca href=”http://www.cnn.com/2020/10/28/politics/hospitals-targeted-ransomware-attacks/index.html” target=”_blank”>Hackers are targeting hospitalsu003c/a>, health care providers and u003ca href=”http://www.cnn.com/2020/10/15/tech/ransomware-2020-election/index.html” target=”_blank”>voter databasesu003c/a> in what cybersecurity experts believe to be a massive attack. CNN’s u003ca href=”http://www.cnn.com/profiles/brianna-keilar-profile” target=”_blank”>Brianna Keilaru003c/a> speaks with CNN law enforcement analyst Anthony Ferrante about the implications of this happening not only in the middle of a pandemic, but also days before the election.”},{“title”:”A hacker stole $1 million from him by tricking his cell phone provider”,”duration”:”05:14″,”sourceName”:”CNN”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2020/03/12/sim-swap-hacker-stole-one-million-sg-orig.cnn/index.xml”,”videoId”:”business/2020/03/12/sim-swap-hacker-stole-one-million-sg-orig.cnn”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/200312155545-rob-ross-still-1-large-169.jpg”,”videoUrl”:”/videos/business/2020/03/12/sim-swap-hacker-stole-one-million-sg-orig.cnn/video/playlists/business-cybersecurity/”,”description”:”Rob Ross lost his life savings when a hacker tricked his cell phone provider into an illegal SIM swap. Here’s how you can protect yourself.”,”descriptionText”:”Rob Ross lost his life savings when a hacker tricked his cell phone provider into an illegal SIM swap. Here’s how you can protect yourself.”},{“title”:”Watch how a social engineering hack works”,”duration”:”04:35″,”sourceName”:”CNN Business”,”sourceLink”:”http://www.cnn.com/business”,”videoCMSUrl”:”/video/data/3.0/video/business/2019/10/17/hacked-tech-reporter-social-engineer-orig.cnn-business/index.xml”,”videoId”:”business/2019/10/17/hacked-tech-reporter-social-engineer-orig.cnn-business”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/191018101636-gfx-social-engineering-hack-donie-02-large-169.jpg”,”videoUrl”:”/videos/business/2019/10/17/hacked-tech-reporter-social-engineer-orig.cnn-business/video/playlists/business-cybersecurity/”,”description”:”CNN tech reporter Donie O’Sullivan thought he was being safe on social media. Watch social engineer & SocialProof Security CEO Rachel Tobac prove him very, very wrong.”,”descriptionText”:”CNN tech reporter Donie O’Sullivan thought he was being safe on social media. Watch social engineer & SocialProof Security CEO Rachel Tobac prove him very, very wrong.”},{“title”:”5 of the biggest data breaches​”,”duration”:”01:43″,”sourceName”:”CNN Business”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2018/09/25/biggest-data-breaches-equifax-orig.cnn-business/index.xml”,”videoId”:”business/2018/09/25/biggest-data-breaches-equifax-orig.cnn-business”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/170907212808-typing-on-laptop-blue-light-large-169.jpg”,”videoUrl”:”/videos/business/2018/09/25/biggest-data-breaches-equifax-orig.cnn-business/video/playlists/business-cybersecurity/”,”description”:”In 2017, credit-reporting company Equifax disclosed it had experienced a major data breach, affecting up to 143 million people. The company joined Yahoo, Myspace, Target, LinkedIn and more on the list of largest data breaches in history.​”,”descriptionText”:”In 2017, credit-reporting company Equifax disclosed it had experienced a major data breach, affecting up to 143 million people. The company joined Yahoo, Myspace, Target, LinkedIn and more on the list of largest data breaches in history.​”},{“title”:”A new approach to cybersecurity: Let the hackers in”,”duration”:”02:54″,”sourceName”:”CNN Business”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2018/10/01/work-transformed-cybersecurity-jlm-lon-orig.cnn-business/index.xml”,”videoId”:”business/2018/10/01/work-transformed-cybersecurity-jlm-lon-orig.cnn-business”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/181001174022-work-transformed-cyber-large-169.jpg”,”videoUrl”:”/videos/business/2018/10/01/work-transformed-cybersecurity-jlm-lon-orig.cnn-business/video/playlists/business-cybersecurity/”,”description”:”With the number of high-profile hacks growing, some cybersecurity experts are thinking of new and creative ways to stop these attacks. One example: don’t stop them at all. Set a trap.”,”descriptionText”:”With the number of high-profile hacks growing, some cybersecurity experts are thinking of new and creative ways to stop these attacks. One example: don’t stop them at all. Set a trap.”}],currentVideoCollectionId = ”,isLivePlayer = false,mediaMetadataCallbacks,mobilePinnedView = null,moveToNextTimeout,mutePlayerEnabled = false,nextVideoId = ”,nextVideoUrl = ”,turnOnFlashMessaging = false,videoPinner,videoEndSlateImpl;if (CNN.autoPlayVideoExist === false) {autoStartVideo = true;autoStartVideo = typeof CNN.isLoggedInVideoCheck === ‘function’ ? CNN.isLoggedInVideoCheck(autoStartVideo) : autoStartVideo;if (autoStartVideo === true) {if (turnOnFlashMessaging === true) {autoStartVideo = false;containerEl = jQuery(document.getElementById(configObj.markupId));CNN.VideoPlayer.showFlashSlate(containerEl);} else {CNN.autoPlayVideoExist = true;}}}configObj.autostart = CNN.Features.enableAutoplayBlock ? false : autoStartVideo;CNN.VideoPlayer.setPlayerProperties(configObj.markupId, autoStartVideo, isLivePlayer, isVideoReplayClicked, mutePlayerEnabled);CNN.VideoPlayer.setFirstVideoInCollection(currentVideoCollection, configObj.markupId);var videoHandler = {},isFeaturedVideoCollectionHandlerAvailable = (CNN !== undefined &&CNN.VIDEOCLIENT !== undefined &&CNN.VIDEOCLIENT.FeaturedVideoCollectionHandler !== undefined);if (!isFeaturedVideoCollectionHandlerAvailable) {CNN.INJECTOR.executeFeature(‘videx’).done(function () {jQuery.ajax({dataType: ‘script’,cache: true,url: ‘//www.i.cdn.cnn.com/.a/2.263.2/js/featured-video-collection-player.min.js’}).done(function () {initializeVideoAndCollection();}).fail(function () {throw ‘Unable to fetch /js/featured-video-collection-player.min.js’;});}).fail(function () {throw ‘Unable to fetch the videx bundle’;});}function initializeVideoAndCollection() {videoHandler = new CNN.VIDEOCLIENT.FeaturedVideoCollectionHandler(configObj.markupId,”cn-featured-1ezqm4a”,’js-video_description-featured-1ezqm4a’,[{“title”:”Electronic Arts breached by hackers”,”duration”:”02:15″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/06/10/electronic-arts-hack.cnnbusiness/index.xml”,”videoId”:”business/2021/06/10/electronic-arts-hack.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210610132829-electronic-arts-file-restricted-large-169.jpg”,”videoUrl”:”/videos/business/2021/06/10/electronic-arts-hack.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”Hackers broke into the systems of Electronic Arts, one of the world’s biggest video game publishers, and stole game source code. CNN’s Alex Marquardt reports.”,”descriptionText”:”Hackers broke into the systems of Electronic Arts, one of the world’s biggest video game publishers, and stole game source code. CNN’s Alex Marquardt reports.”},{“title”:”FireEye CEO: Digital currency enables cybercrime”,”duration”:”06:43″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/06/10/fireeye-ceo-cybersecurity-ransomware.cnnbusiness/index.xml”,”videoId”:”business/2021/06/10/fireeye-ceo-cybersecurity-ransomware.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210610100641-fireeye-ceo-kevin-mandia-large-169.jpg”,”videoUrl”:”/videos/business/2021/06/10/fireeye-ceo-cybersecurity-ransomware.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”FireEye CEO Kevin Mandia talks with CNN’s Julia Chatterley about the acceleration of cybercrime and the risks of paying ransoms. “,”descriptionText”:”FireEye CEO Kevin Mandia talks with CNN’s Julia Chatterley about the acceleration of cybercrime and the risks of paying ransoms. “},{“title”:”See how cybersecurity experts trace ransom payments “,”duration”:”03:18″,”sourceName”:”CNN”,”sourceLink”:”https://www.cnn.com/”,”videoCMSUrl”:”/video/data/3.0/video/business/2021/06/10/cyberattack-europe-pandemic-elliptic-nick-paton-walsh-pkg-intl-hnk-vpx.cnn/index.xml”,”videoId”:”business/2021/06/10/cyberattack-europe-pandemic-elliptic-nick-paton-walsh-pkg-intl-hnk-vpx.cnn”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210610131900-screengrab-elliptic-large-169.jpg”,”videoUrl”:”/videos/business/2021/06/10/cyberattack-europe-pandemic-elliptic-nick-paton-walsh-pkg-intl-hnk-vpx.cnn/video/playlists/business-cybersecurity/”,”description”:”As we moved online in the pandemic, crime moved with us. In the European Union last year, new figures obtained by CNN show significant cyberattacks doubled. u003ca href=”http://www.cnn.com/profiles/nick-paton-walsh” target=”_blank”>CNN’s Nick Paton Walsh u003c/a>reports.”,”descriptionText”:”As we moved online in the pandemic, crime moved with us. In the European Union last year, new figures obtained by CNN show significant cyberattacks doubled. u003ca href=”http://www.cnn.com/profiles/nick-paton-walsh” target=”_blank”>CNN’s Nick Paton Walsh u003c/a>reports.”},{“title”:”White House urges companies to take cyberattack threat more seriously”,”duration”:”02:42″,”sourceName”:”CNN”,”sourceLink”:”https://www.cnn.com/”,”videoCMSUrl”:”/video/data/3.0/video/business/2021/06/03/companies-ransomware-white-house-marquardt-dnt-vpx.cnn/index.xml”,”videoId”:”business/2021/06/03/companies-ransomware-white-house-marquardt-dnt-vpx.cnn”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/201029151522-ransomware-attacks-target-hospitals-election-voter-databases-ferrante-nr-vpx-00000102-large-169.jpg”,”videoUrl”:”/videos/business/2021/06/03/companies-ransomware-white-house-marquardt-dnt-vpx.cnn/video/playlists/business-cybersecurity/”,”description”:”The White House has issued a rare open letter to companies calling on them to treat the threat of ransomware attacks with greater urgency, following back-to-back attacks by Russian hackers on key oil and food processing companies. CNN’s Alex Marquardt reports. “,”descriptionText”:”The White House has issued a rare open letter to companies calling on them to treat the threat of ransomware attacks with greater urgency, following back-to-back attacks by Russian hackers on key oil and food processing companies. CNN’s Alex Marquardt reports. “},{“title”:”Cybersecurity expert: Defense isn’t perfect in this game”,”duration”:”01:47″,”sourceName”:”CNNBusinses”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/06/03/cybersecurity-ransomware-companies-fireeye.cnnbusinses/index.xml”,”videoId”:”business/2021/06/03/cybersecurity-ransomware-companies-fireeye.cnnbusinses”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210511105547-01-cyber-attacks-ransom-payments-colonial-pipeline-large-169.jpg”,”videoUrl”:”/videos/business/2021/06/03/cybersecurity-ransomware-companies-fireeye.cnnbusinses/video/playlists/business-cybersecurity/”,”description”:”FireEye’s John Hultquist says ransomware is putting companies “in an impossible position” and that the government needs to step-up in order to deal with the threat.”,”descriptionText”:”FireEye’s John Hultquist says ransomware is putting companies “in an impossible position” and that the government needs to step-up in order to deal with the threat.”},{“title”:”Microsoft says SolarWinds hackers have struck again”,”duration”:”02:52″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/05/28/microsoft-solarwinds-hackers-russia.cnnbusiness/index.xml”,”videoId”:”business/2021/05/28/microsoft-solarwinds-hackers-russia.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/201218161649-solarwinds-headquarters—stock-large-169.jpg”,”videoUrl”:”/videos/business/2021/05/28/microsoft-solarwinds-hackers-russia.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”The hackers behind the SolarWinds attack have launched a new global cyberattack on more than 150 government agencies, think tanks and other organizations, according to Microsoft. CNN’s Matthew Chance reports.”,”descriptionText”:”The hackers behind the SolarWinds attack have launched a new global cyberattack on more than 150 government agencies, think tanks and other organizations, according to Microsoft. CNN’s Matthew Chance reports.”},{“title”:”IBM CEO: Cybersecurity needs to be a collective effort led by government”,”duration”:”02:47″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/05/11/ibm-ceo-cybersecurity.cnnbusiness/index.xml”,”videoId”:”business/2021/05/11/ibm-ceo-cybersecurity.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210511110228-arvind-krishna-ibm-ceo-large-169.jpg”,”videoUrl”:”/videos/business/2021/05/11/ibm-ceo-cybersecurity.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”Arvind Krishna, CEO of IBM, tells CNN’s Julia Chatterley that a NASA-style public/private partnership is needed to improve cyber resilience.”,”descriptionText”:”Arvind Krishna, CEO of IBM, tells CNN’s Julia Chatterley that a NASA-style public/private partnership is needed to improve cyber resilience.”},{“title”:”Cybersecurity expert on why ransomware attacks are becoming more common”,”duration”:”03:10″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/05/10/cybersecurity-ransomware-colonial-pipeline-dragos-ceo.cnnbusiness/index.xml”,”videoId”:”business/2021/05/10/cybersecurity-ransomware-colonial-pipeline-dragos-ceo.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210510105025-dragos-ceo-rob-lee-large-169.jpg”,”videoUrl”:”/videos/business/2021/05/10/cybersecurity-ransomware-colonial-pipeline-dragos-ceo.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”A cyberattack forced the largest US fuel pipeline to shut down. Dragos CEO Rob Lee says systems are getting compromised as industries becomes more digitally connected.”,”descriptionText”:”A cyberattack forced the largest US fuel pipeline to shut down. Dragos CEO Rob Lee says systems are getting compromised as industries becomes more digitally connected.”},{“title”:”FireEye CEO on how the SolarWinds hack was discovered”,”duration”:”03:24″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2021/02/24/fireeye-ceo-solarwinds-hack.cnnbusiness/index.xml”,”videoId”:”business/2021/02/24/fireeye-ceo-solarwinds-hack.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210225093138-video-thumbnail-fireeye-ceo-large-169.jpg”,”videoUrl”:”/videos/business/2021/02/24/fireeye-ceo-solarwinds-hack.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”Kevin Mandia, CEO of FireEye, explains how the company identified unauthorized access on their network but that they still don’t know how SolarWinds was breached.”,”descriptionText”:”Kevin Mandia, CEO of FireEye, explains how the company identified unauthorized access on their network but that they still don’t know how SolarWinds was breached.”},{“title”:”Cybersecurity expert: Groups like Proud Boys need to be treated like ISIS online”,”duration”:”02:50″,”sourceName”:”CNN”,”sourceLink”:”https://www.cnn.com/”,”videoCMSUrl”:”/video/data/3.0/video/business/2021/01/17/extremist-groups-media-alex-stamos-rs-stelter-vpx.cnn/index.xml”,”videoId”:”business/2021/01/17/extremist-groups-media-alex-stamos-rs-stelter-vpx.cnn”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/210117114056-computer-scientist-alex-stamos-large-169.jpg”,”videoUrl”:”/videos/business/2021/01/17/extremist-groups-media-alex-stamos-rs-stelter-vpx.cnn/video/playlists/business-cybersecurity/”,”description”:”Computer scientist Alex Stamos and former DHS official Chris Krebs speak to CNN’s Brian Stelter about how extremist groups should be monitored on social media and online platforms. “,”descriptionText”:”Computer scientist Alex Stamos and former DHS official Chris Krebs speak to CNN’s Brian Stelter about how extremist groups should be monitored on social media and online platforms. “},{“title”:”US government agencies breached by Russian-linked hackers”,”duration”:”01:30″,”sourceName”:”CNNBusiness”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2020/12/16/us-government-hack-solarwinds.cnnbusiness/index.xml”,”videoId”:”business/2020/12/16/us-government-hack-solarwinds.cnnbusiness”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/181127151625-01-protection-hacks-cybersecurity-112718-stock-large-169.jpg”,”videoUrl”:”/videos/business/2020/12/16/us-government-hack-solarwinds.cnnbusiness/video/playlists/business-cybersecurity/”,”description”:”The US government is reeling from multiple data breaches at top federal agencies, the result of a worldwide hacking campaign with possible ties to Russia.”,”descriptionText”:”The US government is reeling from multiple data breaches at top federal agencies, the result of a worldwide hacking campaign with possible ties to Russia.”},{“title”:”Analyst explains why hospitals are vulnerable to hackers”,”duration”:”04:22″,”sourceName”:”CNN”,”sourceLink”:”http://www.cnn.com”,”videoCMSUrl”:”/video/data/3.0/video/tech/2020/10/29/ransomware-attacks-target-hospitals-election-voter-databases-ferrante-nr-vpx.cnn/index.xml”,”videoId”:”tech/2020/10/29/ransomware-attacks-target-hospitals-election-voter-databases-ferrante-nr-vpx.cnn”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/201029151522-ransomware-attacks-target-hospitals-election-voter-databases-ferrante-nr-vpx-00000102-large-169.jpg”,”videoUrl”:”/videos/tech/2020/10/29/ransomware-attacks-target-hospitals-election-voter-databases-ferrante-nr-vpx.cnn/video/playlists/business-cybersecurity/”,”description”:”u003ca href=”http://www.cnn.com/2020/10/28/politics/hospitals-targeted-ransomware-attacks/index.html” target=”_blank”>Hackers are targeting hospitalsu003c/a>, health care providers and u003ca href=”http://www.cnn.com/2020/10/15/tech/ransomware-2020-election/index.html” target=”_blank”>voter databasesu003c/a> in what cybersecurity experts believe to be a massive attack. CNN’s u003ca href=”http://www.cnn.com/profiles/brianna-keilar-profile” target=”_blank”>Brianna Keilaru003c/a> speaks with CNN law enforcement analyst Anthony Ferrante about the implications of this happening not only in the middle of a pandemic, but also days before the election.”,”descriptionText”:”u003ca href=”http://www.cnn.com/2020/10/28/politics/hospitals-targeted-ransomware-attacks/index.html” target=”_blank”>Hackers are targeting hospitalsu003c/a>, health care providers and u003ca href=”http://www.cnn.com/2020/10/15/tech/ransomware-2020-election/index.html” target=”_blank”>voter databasesu003c/a> in what cybersecurity experts believe to be a massive attack. CNN’s u003ca href=”http://www.cnn.com/profiles/brianna-keilar-profile” target=”_blank”>Brianna Keilaru003c/a> speaks with CNN law enforcement analyst Anthony Ferrante about the implications of this happening not only in the middle of a pandemic, but also days before the election.”},{“title”:”A hacker stole $1 million from him by tricking his cell phone provider”,”duration”:”05:14″,”sourceName”:”CNN”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2020/03/12/sim-swap-hacker-stole-one-million-sg-orig.cnn/index.xml”,”videoId”:”business/2020/03/12/sim-swap-hacker-stole-one-million-sg-orig.cnn”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/200312155545-rob-ross-still-1-large-169.jpg”,”videoUrl”:”/videos/business/2020/03/12/sim-swap-hacker-stole-one-million-sg-orig.cnn/video/playlists/business-cybersecurity/”,”description”:”Rob Ross lost his life savings when a hacker tricked his cell phone provider into an illegal SIM swap. Here’s how you can protect yourself.”,”descriptionText”:”Rob Ross lost his life savings when a hacker tricked his cell phone provider into an illegal SIM swap. Here’s how you can protect yourself.”},{“title”:”Watch how a social engineering hack works”,”duration”:”04:35″,”sourceName”:”CNN Business”,”sourceLink”:”http://www.cnn.com/business”,”videoCMSUrl”:”/video/data/3.0/video/business/2019/10/17/hacked-tech-reporter-social-engineer-orig.cnn-business/index.xml”,”videoId”:”business/2019/10/17/hacked-tech-reporter-social-engineer-orig.cnn-business”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/191018101636-gfx-social-engineering-hack-donie-02-large-169.jpg”,”videoUrl”:”/videos/business/2019/10/17/hacked-tech-reporter-social-engineer-orig.cnn-business/video/playlists/business-cybersecurity/”,”description”:”CNN tech reporter Donie O’Sullivan thought he was being safe on social media. Watch social engineer & SocialProof Security CEO Rachel Tobac prove him very, very wrong.”,”descriptionText”:”CNN tech reporter Donie O’Sullivan thought he was being safe on social media. Watch social engineer & SocialProof Security CEO Rachel Tobac prove him very, very wrong.”},{“title”:”5 of the biggest data breaches​”,”duration”:”01:43″,”sourceName”:”CNN Business”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2018/09/25/biggest-data-breaches-equifax-orig.cnn-business/index.xml”,”videoId”:”business/2018/09/25/biggest-data-breaches-equifax-orig.cnn-business”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/170907212808-typing-on-laptop-blue-light-large-169.jpg”,”videoUrl”:”/videos/business/2018/09/25/biggest-data-breaches-equifax-orig.cnn-business/video/playlists/business-cybersecurity/”,”description”:”In 2017, credit-reporting company Equifax disclosed it had experienced a major data breach, affecting up to 143 million people. The company joined Yahoo, Myspace, Target, LinkedIn and more on the list of largest data breaches in history.​”,”descriptionText”:”In 2017, credit-reporting company Equifax disclosed it had experienced a major data breach, affecting up to 143 million people. The company joined Yahoo, Myspace, Target, LinkedIn and more on the list of largest data breaches in history.​”},{“title”:”A new approach to cybersecurity: Let the hackers in”,”duration”:”02:54″,”sourceName”:”CNN Business”,”sourceLink”:””,”videoCMSUrl”:”/video/data/3.0/video/business/2018/10/01/work-transformed-cybersecurity-jlm-lon-orig.cnn-business/index.xml”,”videoId”:”business/2018/10/01/work-transformed-cybersecurity-jlm-lon-orig.cnn-business”,”videoImage”:”//cdn.cnn.com/cnnnext/dam/assets/181001174022-work-transformed-cyber-large-169.jpg”,”videoUrl”:”/videos/business/2018/10/01/work-transformed-cybersecurity-jlm-lon-orig.cnn-business/video/playlists/business-cybersecurity/”,”description”:”With the number of high-profile hacks growing, some cybersecurity experts are thinking of new and creative ways to stop these attacks. One example: don’t stop them at all. Set a trap.”,”descriptionText”:”With the number of high-profile hacks growing, some cybersecurity experts are thinking of new and creative ways to stop these attacks. One example: don’t stop them at all. Set a trap.”}],’js-video_headline-featured-1ezqm4a’,”,”js-video_source-featured-1ezqm4a”,true,true,’business-cybersecurity’);if (typeof configObj.context !== ‘string’ || configObj.context.length

Leave a Reply

Your email address will not be published. Required fields are marked *