O’Leary Ventures -President and ‘Shark Tank’ star Kevin O’Leary responds to Bud Light’s ‘Gruesome Price’ paid for his MarketingControverse, Bitcoin’s Boom and the future of TIKTOK -Dendis.
Organizations that do not adapt to the “treacherous” cyber security landscape will be lured in an ambush “by blind spots over their network,” said Aviatrix Doug Merritt, CEO of Cloud Securice Company.
Recent attacks on major brands such as AT&T, North Face and Cartier emphasize what cyber criminals are capable of today, “in particular with the increased approval of artificial intelligence,” Merritt said.
Amy Bunn, online safety lawyer at computer security company McAfee, described the attacks on large service providers such as airlines and insurance companies as “a clear memory of how productive and advanced contemporary cyber attacks are.”
Hawaiian Airlines was hit by a cyber attack at the end of June. (Kevin Carter / Getty Images / Getty images)
Cyberattack becomes a large airline, up to 6 million customer profiles
Although Bunn said that airlines are a “prime target”, since an enormous amount of sensitive information is stored in one place, every industry is vulnerable.
“From health care and finance to retail and technology, attackers are constantly looking for weak spots to exploit, knowing how valuable consumer data is,” Bunn said. “Cyber criminals can use this wealth of sensitive information to act as people and fraud with stolen identities, or they can pack and sell personal information on the dark web to the highest bidder.”
Hawaiian airlines and Australian carrier Qantas were hit with different cyber attacks within a week in succession. Hawaiian was hit at the end of June, followed by Qantas at the beginning of July.

Qantas Airlines Boeing 737 aircraft are on the domestic terminal of Sydney Airport on a rainy day. (David Gray / AFP via Getty Images / Getty images)
The attacks came around the same time when the FBI placed on X that the cyber crime group “Scattered Spider” “expanded its targeting to record the aviation sector.”
Aflac also warned last month that bad actors stole the personal data of his American customers after the insurance provider was the last hit in a continuous hacking spree Focused on the insurance sector.
The core of the issue is, according to Merritt Cloud protection, of which he said it is a “fundamental paradigm shift that most organizations have not fully recognized.”
The notorious Hackergroep gives sights on the aviation industry in alarming safety threat
Today, Hackers have even more ways to infiltrate a network, according to Merritt.
Previously, most data remained within a secure company network. Now data is moving over the open internet, which means that hackers have the opportunity to intercept, Merritt said, adding that many organizations leave 50% to 80% of their systems “by not properly protecting cloud -working burden communication.”
The problem stems from three critical changes in how computer use works today, Merritt said. For example, he said that if the app gets something out of the cloud, it uses the public internet, not a controlled private network.

Hackers (Annette Riedl / Picture Alliance via Getty Images / Getty Images)
The traditional security peripheral has not disappeared. But instead of protecting a few access points, companies are confronted with thousands or even hundreds of thousands of access points, many of which are connected to the internet, and can be intercepted by hackers, Merritt said.
“This is the new battlefield organizations if they want to stay bad actors who want to use weaknesses in cloud protection,” said Merritt.
This underlines why it is crucial that consumers also ensure that they take steps to protect themselves, according to Bunn, who specified that “staying safe online is not only up to companies.”
Get Fox Business on the Go by clicking here
“Even if you were not directly influenced by a infringement, your data can still be exposed and used in phishing or identity theft,” Bunn said.
To prevent this, Bunn suggested that consumers use strong and unique passwords and, if possible, engage two-factor authentication. It is also important to be careful with entering into unexpected texts or e -mails that require personal information and to use tools to recognize risky links or messages before they cause damage.


