CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Document Report

My Book Live Users Wake Up to Wiped Devices, Active RCE Attacks

Reading Time: 1 min read
in Incidents

If you haven’t already, stop reading and go yank your My Book Live storage device offline, let you join the ranks of those who woke up on Thursday to find that years of data had been wiped clean on devices around the world.

Western Digital’s My Book storage device is designed for consumers and businesses. It typically plugs into computers via USB. The specific model involved in the data-demolition incident is known as My Book Live: a model that uses an Ethernet cable to connect to a local network. Users can remotely access files and make configuration changes through Western Digital’s cloud infrastructure.

Western Digital is blaming the remote wipes – which have happened even if the network-attached storage (NAS) devices are behind a firewall or router – on the exploitation of a remote command-execution (RCE) vulnerability.

 

CHECK FULL REPORT

Tags: CyberattackData BreachincidentIncidents 2021
ADVERTISEMENT

Related Posts

ICO Relaxes Breach Reporting for Comms Providers

ICO Relaxes Breach Reporting for Comms Providers

February 6, 2023
Tallahassee Memorial HealthCare has taken IT systems offline after cyberattack

Tallahassee Memorial HealthCare has taken IT systems offline after cyberattack

February 6, 2023
Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT

Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT

February 6, 2023
Data breach at Vice Media involved SSNs, financial info

Data breach at Vice Media involved SSNs, financial info

February 6, 2023

More Articles

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online

October 15, 2020
Alerts

Microsoft releases emergency updates to fix XPS display issues

February 1, 2023
Book

The DevOps Engineer’s Career Guide

January 25, 2022
Quotes

“It’s worrying that increasing awareness…”

February 1, 2021
Document

The Biggest Cyber Security Threats Coming in 2022

August 8, 2022
Document

Protecting Children’s Privacy Under COPPA

March 13, 2021
Book

Security for Cloud Computing (Information Security and Privacy)

March 29, 2022

Modern CTO Podcast

April 25, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.