Fujitsu Halted ProjectWEB Following Cybersecurity Incidents in Japanese Administration - Exclusive Coverage by ZDNET
Fujitsu Halted ProjectWEB Following Cybersecurity Incidents in Japanese Administration - Exclusive Coverage by ZDNET
In a statement released on Thursday , Japanese tech giant Fujitsu attributed a Japanese government data breach earlier this year to its ProjectWEB tool.
In May, multiple government agencies – including the Ministry of Land, Infrastructure, Transport, and Tourism; the Cabinet Secretariat; and Narita Airport – were hacked through the software-as-a-service platform .
ZDNET Recommends
A Fujitsu spokesperson at the time confirmed to ZDNet’s Campbell Kwan that there was “unauthorized access to ProjectWEB, a collaboration and project management software, used for Japanese-based projects.” They suspended use of the tool and informed all impacted customers.
After an investigation, Fujitsu said on Thursday that it appointed a CISO in October and put in place “measures to prevent reoccurrence… under a new information security management and operation framework.”
Fujitsu added that the cause of the incident is still being verified by a committee of internal experts as well as Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC), which will sign off on releasing any more information about the incident.
Fujitsu plans to “introduce a new project information sharing tool that addresses the issues raised by this incident with robust information security measures, including those in line with zero-trust practices, and will be migrating project management tasks to the new tool.”
Japanese news outlets said more than 75,000 emails from the Ministry of Land, Infrastructure, Transport, and Tourism were leaked in the attack in May. Information on business partners, employees, and the inner workings of government cybersecurity services, as well as Narita Airport, were also stolen during the attack.
Today’s news was first reported by Bleeping Computer .
Security
The best VPN services of 2024: Expert tested
How to turn on Private DNS Mode on Android (and why you should)
The best antivirus software and apps you can buy
The best VPN routers you can buy
How to find and remove spyware from your phone
- The best VPN services of 2024: Expert tested
- How to turn on Private DNS Mode on Android (and why you should)
- The best antivirus software and apps you can buy
- The best VPN routers you can buy
- How to find and remove spyware from your phone
Also read:
- [New] Navigating Webcam Features on Apple's MacBook for 2024
- [Updated] How to Craft Powerful Tags for Maximum Youtube Engagement for 2024
- [Updated] In 2024, Crafting the Perfect Soundtrack for Your Vimeo Content
- [Updated] In 2024, Unlock 6 Free YouTube Endings for Pros!
- Beyond Similarity: Exploring How Siri Stands Apart From ChatGPT
- In 2024, 3 Solutions to Find Your Itel P40+ Current Location of a Mobile Number | Dr.fone
- In 2024, Unlock Your Disabled iPhone 6s Without iTunes in 5 Ways | Dr.fone
- Is Microsoft Working on Windows 12? Insider Tips and Unforeseen Projections | DigitalChronicle
- Square and Cash App Downtime: Essential Info for Entrepreneurs | Tech News
- Step-by-Step Guide: Switching From Windows to Linux Mint on Your Computer - Tips & Tricks
- Taming the Tangled Web of Linux/Open Source Documentation: Solutions for Clarity
- The Future Is Now: How Cloud Services Are Evolving According to Industry's Premier Technology Visionaries
- Unlock a World of Visual Conversations with LipSync: A Game-Changing Rival to Microsoft Teams and Zoom on ZDNet
- Updated 2024 Approved From Chrome OS to Linux A Beginners Guide to Installation (2023 Edition)
- Title: Fujitsu Halted ProjectWEB Following Cybersecurity Incidents in Japanese Administration - Exclusive Coverage by ZDNET
- Author: Matthew
- Created at : 2024-11-09 02:53:42
- Updated at : 2024-11-14 07:25:11
- Link: https://app-tips.techidaily.com/fujitsu-halted-projectweb-following-cybersecurity-incidents-in-japanese-administration-exclusive-coverage-by-zdnet/
- License: This work is licensed under CC BY-NC-SA 4.0.