<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xmlns:tt="http://teletype.in/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>pation</title><generator>teletype.in</generator><description><![CDATA[pation]]></description><image><url>https://img1.teletype.in/files/47/ce/47cede5b-5c6a-4abc-82f2-33e467e1f554.png</url><title>pation</title><link>https://teletype.in/@pation</link></image><link>https://teletype.in/@pation?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=pation</link><atom:link rel="self" type="application/rss+xml" href="https://teletype.in/rss/pation?offset=0"></atom:link><atom:link rel="next" type="application/rss+xml" href="https://teletype.in/rss/pation?offset=10"></atom:link><atom:link rel="search" type="application/opensearchdescription+xml" title="Teletype" href="https://teletype.in/opensearch.xml"></atom:link><pubDate>Mon, 06 Apr 2026 03:48:55 GMT</pubDate><lastBuildDate>Mon, 06 Apr 2026 03:48:55 GMT</lastBuildDate><item><guid isPermaLink="true">https://teletype.in/@pation/accenture-ransomware-attack-specialists-annotation</guid><link>https://teletype.in/@pation/accenture-ransomware-attack-specialists-annotation?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=pation</link><comments>https://teletype.in/@pation/accenture-ransomware-attack-specialists-annotation?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=pation#comments</comments><dc:creator>pation</dc:creator><title>Accenture Ransomware Attack – Specialists Annotations</title><pubDate>Fri, 13 Aug 2021 13:45:31 GMT</pubDate><media:content medium="image" url="https://img4.teletype.in/files/bd/a2/bda2a609-64f9-4bf4-b3fd-9aaf208a5f0e.jpeg"></media:content><description><![CDATA[<img src="https://img2.teletype.in/files/93/f9/93f9c832-6edb-4c32-8ba3-2237540d2b9a.jpeg"></img>VX resistance is claiming that Accenture has been struck by the Lockbit ransomware group, having left delicate data exposed and that Lockbit intends to leak the data. Further, cybersecurity researchers with Hudson Rock have disclosed findings of compromised Accenture and partner computers.]]></description><content:encoded><![CDATA[
  <figure class="m_column">
    <img src="https://img2.teletype.in/files/93/f9/93f9c832-6edb-4c32-8ba3-2237540d2b9a.jpeg" width="2480" />
  </figure>
  <p>VX resistance is <a href="https://u7061146.ct.sendgrid.net/ls/click?upn=4tNED-2FM8iDZJQyQ53jATUQ95z6XyDDZ5OSEfZhO8gRWF1GjQFs7Rf6i5xNLgwuiOVGjWpjGh9TGXlrsOKa-2Flf9Wm9YhIyVoHztWJtc2p0Fw-3DSxSQ_S3RA1gMvL7v1TdZrqvF2X48vY2LyH9KYdxKxBaPFp6Fl1TEEsXDQbgk-2FWPw9Ah5nwh5z3HPLIw79cePUeHvYGbACtpGEOUo9gKA7RdPV7CHYnRZ1BgjoepqPsAq5T4X7OPHmw4iuricWSmMEgE-2BxhVTonqsExASc-2BtfwKbtmF2k-2FbfFYCh81vkEmRdyr32-2F8-2B7ZhlutL7Fukz7FrcI307MDiywXaCq1o54guoUClhAYNsv2MOvDDYi8LcJy06rMrYcZPWHt1d-2Fd0ztR9TiZ8wMBWqTV74OOzB6fGhMmRjqvBEgvaCsFPbxCz7On-2FjikYuPC50qoDJ3LWEU2MAI8l-2B1vHUkW-2Fs4MagrfoSl6b-2FPGay9VFElYDYsyqub1mpqHn" target="_blank">claiming</a> that Accenture has been struck by the Lockbit <a href="https://informationsecuritybuzz.com/articles/prevention-is-better-than-cure-the-ransomware-evolution/" target="_blank">ransomware</a> group, having left delicate data exposed and that Lockbit intends to leak the data. Further, cybersecurity researchers with Hudson Rock have <a href="https://u7061146.ct.sendgrid.net/ls/click?upn=4tNED-2FM8iDZJQyQ53jATURRNwRlFgNu4AvwlJsCKJtetYRLKqV8fMn-2FY-2FDEb3SJawxLO9Szr-2Fz9d0kh82ZjPiwwFeHNixEQDSERCUEBbniQ-3DVd2N_S3RA1gMvL7v1TdZrqvF2X48vY2LyH9KYdxKxBaPFp6Fl1TEEsXDQbgk-2FWPw9Ah5nwh5z3HPLIw79cePUeHvYGbACtpGEOUo9gKA7RdPV7CHYnRZ1BgjoepqPsAq5T4X7OPHmw4iuricWSmMEgE-2BxhVTonqsExASc-2BtfwKbtmF2k-2FbfFYCh81vkEmRdyr32-2F8-2B7ZhlutL7Fukz7FrcI307MDiywXaCq1o54guoUClhAaRHvgndUQadG-2FhRGUdbzy2Yn7-2FYO5x453jWpWjGAlBWps2OU14wawQcrf3P5du0W6L8hAuPBR6ghsv8qZUuClzvMEamPJXMEMCMy5JjAGfRM08pwUwyym8sa-2BKQ-2B8ROlHXz96ZIg8-2FVBCkfYm2clWS" target="_blank">disclosed findings</a> of compromised Accenture and <a href="https://informationsecuritybuzz.com/expert-comments/experts-warn-of-vetting-third-part-partners-in-light-og-promo-com-breach/" target="_blank">partner</a> computers.</p>
  <figure class="m_column">
    <img src="https://img4.teletype.in/files/bd/09/bd09e456-4bc5-4491-b808-ba3817ca8bd7.jpeg" width="200" />
    <figcaption>Ron Bradley (VP) Shared assessments</figcaption>
  </figure>
  <p><a href="https://www.linkedin.com/in/ronaldbradley/" target="_blank">Ron Bradley</a></p>
  <p>VP</p>
  <p>This is a prime illustration of the difference between market resiliency and business continuity. Business resiliency is like being in a boxing match, you take a body blow but can continue the fight. Enterprise sequence comes into play when operations have ceased or are severely impaired and you have to make major efforts to recover.</p>
  <p>This particular example with Accenture is interesting in the fact that it was a known/published vulnerability. It highlights the importance of making sure systems are properly patched promptly. The ability for Accenture to manage the reverberations of potentially stolen data will be an important lesson for many organizations going forward.</p>

]]></content:encoded></item></channel></rss>