Redhotcyber<p>Quando la Supply-Chain fa molto male. La IBM è stata violata così come i dati della Janssen Pharmaceutica</p><p><a href="https://mastodon.bida.im/tags/Janssen" class="mention hashtag" rel="tag">#<span>Janssen</span></a> <a href="https://mastodon.bida.im/tags/Pharmaceutica" class="mention hashtag" rel="tag">#<span>Pharmaceutica</span></a>, una filiale di Johnson and Johnson Corporation, ha informato i clienti del suo servizio Janssen <a href="https://mastodon.bida.im/tags/CarePath" class="mention hashtag" rel="tag">#<span>CarePath</span></a> che le loro <a href="https://mastodon.bida.im/tags/informazioni" class="mention hashtag" rel="tag">#<span>informazioni</span></a> sensibili sono state compromesse a seguito di una violazione dei <a href="https://mastodon.bida.im/tags/dati" class="mention hashtag" rel="tag">#<span>dati</span></a> del colosso <a href="https://mastodon.bida.im/tags/IBM" class="mention hashtag" rel="tag">#<span>IBM</span></a>.</p><p>IBM è il fornitore di servizi tecnologici di Janssen. Nello specifico, gestisce l’applicazione CarePath e il database che ne supporta le funzionalità. </p><p> <a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="tag">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="tag">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="tag">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="tag">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="tag">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/quando-la-supply-chain-fa-molto-male-la-ibm-e-stata-violata-cosi-come-i-dati-della-janssen-pharmaceutica/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/quando-la</span><span class="invisible">-supply-chain-fa-molto-male-la-ibm-e-stata-violata-cosi-come-i-dati-della-janssen-pharmaceutica/</span></a></p>