![]() ![]() We then did a deep data dive and determined on 18th of January that hackers had been inside these systems and had access to the data on them. ![]() But most of the malicious files deployed were specifically crafted to bypass our anti-malware solutions, and it was only when we installed advanced endpoint detection and response (EDR) agents as part of our planned enhancement programme that this intrusion was detected.Ī specialist cyber security company hired by ICRC to support us in protecting our systems detected an anomaly on ICRC servers that contained information relating to the global Red Cross and Red Crescent Movement's Restoring Family Links services.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |