12 May Security Breach – 9 May 2025
Ransomware and malware are among the most prevalent and debilitating cyberthreats businesses and individuals face. It is an area of cyber-risk that continues to grow more expensive every year. Cyber insurer Coalition determined that there was a 68% increase in the severity of ransomware cyber attack claims in 2024, with the average loss rising to $353,000. This escalation in severity and cost makes it mission-critical for businesses to implement effective strategies to protect users from ransomware and malware threats. Every day, users are the first line of defense — and often the first target — for cyberthreats like malware. Cybercriminals are hungry to exploit user behavior and device vulnerabilities to launch profitable attacks using ransomware or other types of malware, making user protection a top priority for any IT team.
Recent Breaches
Japan – Kintetsu World Express – Shipping & Logistics
Exploit: Ransomware
Risk to Business: Moderate: Major Japanese logistics provider Kintetsu World Express (KWE) confirmed that it fell victim to a ransomware attack that disrupted some of its systems. The incident, first detected on April 23, caused service interruptions for certain customers. KWE has not disclosed whether a ransom was demanded or if it plans to pay. An investigation is ongoing. This marks the second cyberattack on KWE in the past two years.
South Korea – SK Telecom – Telecom
Exploit: Hacking
Risk to Business: Moderate: SK Telecom, South Korea’s top mobile carrier, is grappling with the fallout from a recent hack that saw malware installed on its internal systems. The company removed the malware, isolated the affected equipment and launched an investigation, reporting the incident to regulators. While no misuse of leaked data has been confirmed, SK Telecom is offering free USIM card replacements. Over 70,000 users switched to rival providers within two days of the breach.
Talk to a TCT team member today about implementing cyber security plan for your business.
Robert Brown
9/05/2025
Related Articles:
Guide to Strong Passwords and Authentication
Security Tips for Mobile Application Users