• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

Who Got Hacked This Week? September 8 Edition

What types of cyberattacks were carried out this week, September 8, 2020? Read on to find out about the latest cyberattacks and who got hacked this week.

September 8, 2020 Jonathan Blackwood Leave a Comment

government cyberattacks Google Microsoft
Photos & Slideshow
View the slideshow View the slideshow
View Slideshow

Each week, TechDecisions brings you the latest cyber security news on cyberattacks and who got hacked from around the internet.

Cyber security is becoming a main issue for many companies, and our weekly feature is a good example of why.

Every week there are multiple stories of people, businesses, and products being hacked for fun, for money, and sometimes for evil.

Luckily for you, knowing the enemy is half the battle. In order to prevent getting hacked in the future, you need to understand who got hacked in the past. Cyber security is a constantly evolving threat to any organization, and even individuals.

Make sure to check out a couple of pieces of content to gain a better understanding of cyber security, and how cyberattacks are carried out.

  • The Ultimate Guide to Corporate Cyber Security– Cyber security can be confusing, but after reading our article you’ll be in the clear and ready to stay safe.
  • How Does a Cyber Attack Work?– Hacking and cyberattacks are threats that should concern every company. Here’s how they work.
  • What is the Worst Case Scenario for Cyber Attacks?– Cyberattacks can have serious implications at the individual, company, and country-wide level.

After reading these pieces of content you’ll understand how cyber security works and get a better idea of how these weekly cyberattacks are working. Only by being equipped with the right information can any organization hope to protect themselves against the constant threats out there.

Each week we’ll be sure to get you the information so you know what cyberattacks are going on around the country and around the world.

This week includes:

  • 186,000 customer and staff information of Service NSW leaked in cyberattack
  • Newcastle University suffers cyberattack will take weeks to fix according to school
  • Tower Semiconductor pauses some operations after cyberattack
  • And more!

Click here to find out who got hacked this week, September 8, 2020.

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Cyber Attacks, Cyber Security

Related Content:

  • No More Ransom SMBs Are Grappling with Paying Ransom Demands
  • Tenable Cloud Security with Agentless Assessment and Live Results Tenable Announces Cloud Security Agentless Assessment for Faster…
  • Zerto AWS Zerto Joins AWS ISV Workload Migration Partner Program
  • Bluesound Professional B170S Networked Streaming Stereo Amplifier Bluesound Professional Launches B170S Networked Streaming Stereo Amplifier

Free downloadable guide you may like:

  • Blueprint Series: How to Reduce Shadow IT

    The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Research finds that this distributed work environment is leading to IT management blind spots and shadow IT.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Blueprint Series: How to Reduce Shadow IT

The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Resea...

Hybrid Work webinar
Featured Webcast: Collaboration 2.0 — Where Are We Now?

In this webinar, subject matter experts discuss the transformation of the workplace, the rise of hybrid workers, the importance of open connectivit...

guide to end user training cover
Pro Tips for Conducting End User Training

Effective trainings are the glue that can make the difference following a new technology implementation that your team has spent so much time, effo...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.