- cross-posted to:
- [email protected]
This is the best summary I could come up with:
A ransomware group known as Cl0p claimed responsibility for breaking into a Sony server in June.
The breach occurred via a vulnerability in the file-sending MOVEit Transfer platform that SIE was using.
After the warning, SIE discovered that a breach occurred on May 28th and that hackers downloaded data off the server.
The server included personally identifiable information of US-based employees, and Sony is providing credit monitoring services to those affected.
Sony confirms this server is located in Japan and is used for internal testing for its Entertainment, Technology and Services business, according to a statement sent to Bleeping Computer.
Hackers that were responsible leaked files that included data from the SonarQube platform, certificates, a license generator, Creators’ Cloud, and more.
The original article contains 266 words, the summary contains 121 words. Saved 55%. I’m a bot and I’m open source!