Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»WiFi / Internet & Networking»European Commission data stolen in a cyberattack on the infrastructure hosting its web sites
    WiFi / Internet & Networking

    European Commission data stolen in a cyberattack on the infrastructure hosting its web sites

    adminBy adminMarch 28, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    data breach finger moving data
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The Commission said the Europa websites remain available, and that its “swift response ensured the incident was contained and risk mitigation measures were implemented to protect services and data.” Its internal systems weren’t affected by the attack, the statement added.

    The incident comes after the Commission revealed on January 30 that its central infrastructure for managing mobile devices had “identified traces of a cyber attack” which may have exposed names and mobile number of some staff.

    IAM is hard

    The lack of information about the attack makes it hard for security industry experts to comment. For one thing, it’s unknown how the breach of security controls happened: Did the threat actor take advantage of an unpatched software or hardware vulnerability, find a zero day, or did an employee fall for a phishing attack?

    “There is very little info out,” said Kellman Meghu, chief technology officer of Canadian incident response firm DeepCove Cybersecurity, “but this does sound bad. This is why I force all my users to use AWS Identity Center sign on. No IAM-generated keys, and admin accounts are only activated through a ‘break glass’ strategy, where two people are needed to authenticate.”

    By “break glass” strategy, Meghu said he meant that the AWS root/admin account that controls all of an organization’s cloud infrastructure is stored outside of AWS on a system that requires authorization from both the CEO and CTO, via credentials and hardware tokens. This access generates an alert, so if there was an unauthorized attempt to sign in, the CEO and CTO would know.

    “I personally live in constant fear of this sort of thing happening” he said. “I create multiple separate AWS accounts using the AWS Organizations feature so accounts are completely isolated from each other. For example, there can be a ‘dev ORG’ for testing with no real data, and a ‘uat ORG’ for user testing with some data, and a ‘prod ORG’ where no one is allowed. You can also break things down so different application types get their own Organizations, which limits lateral movement. Azure has similar setup and options, which are called Tenants.

    Commission Cyberattack data European Hosting infrastructure Sites stolen Web
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleBackdoored Telnyx PyPI package pushes malware hidden in WAV audio
    Next Article AI photo restoration is erasing your family’s real history
    admin
    • Website

    Related Posts

    Why Your Search Data Doesn’t Agree (And What To Do About It)

    April 16, 2026

    OpenAI pulls out of a second Stargate data center deal

    April 16, 2026

    Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

    April 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    What Is Answer Engine Optimization? And How to Do It

    April 16, 2026

    Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger

    April 16, 2026

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,345)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (825)
    • Tech Tools & Mobile / Apps (1,610)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    What Is Answer Engine Optimization? And How to Do It

    April 16, 2026

    Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger

    April 16, 2026

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026
    Most Popular
    • What Is Answer Engine Optimization? And How to Do It
    • Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger
    • COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for
    • Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
    • Search Ad Growth Slows As Social & Video Gain Faster
    • I’ve been using Android’s built-in focus modes wrong this whole time, and one setting fixed everything
    • Cisco says critical Webex Services flaw requires customer action
    • This one chart exposes how far Pixel has fallen behind in mobile gaming
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.