• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

SWK Cybersecurity News Recap April 2022

April 18, 2022 by Hector

Home » Blog » SWK Cybersecurity News Recap April 2022

cybersecurity-news-april-2022-updates-cyber-threat-war-breach-reporting

This month’s cybersecurity news recap of March and April 2022 will cover big changes in the threat landscape, a few noteworthy data breaches and the regulatory response to both along with updates on the cyber war coming out of the ongoing Ukraine conflict. The invasion and its geopolitical implications are heavily affecting conversations on network security throughout the US and Canada, although there are plenty of other factors pushing a new paradigm of cyber hygiene.

The Changing Cyber Threat & Regulatory Landscape

The current cyber threat landscape has been a topic of considerable concern among many public and private institutions, as evidenced by the many warnings coming from all directions in addition to the legislation being crafted in Congress.

Tightening Cyber Incident Reporting Regulations

In early March 2022, the Cyber Incident Reporting for Critical Infrastructure Act of 2022 was passed and signed into law, paving the way to greater visibility into cyber incidents for law enforcement and a bigger obligation for victims of cyber attack. The regulation was built on momentum generated from the SolarWinds hack and other breaches, and entered into full swing once tensions with Russia re-escalated during the invasion of Ukraine.

You May Be Part of the US Critical Infrastructure Sector

While much of the language around the Cyber Incident Reporting for Critical Infrastructure Act has centered on energy firms, who are under constant attack, many other industries are likely to be covered by this regulation. The final list could still be decided by which agency ends up winning the fight to handle reporting, but as CISA is the likely candidate as of this writing, it could be any of those they define as a Critical Infrastructure Sector. Here are some examples:

  • Chemical manufacturers and distributors
  • Telecommunications firms
  • Financial services firms
  • IT and cybersecurity firms
  • Hospitals and other healthcare facilities
  • Food manufacturers, distributors and retailers
  • Colleges and other educational facilities
  • Various discrete manufacturing companies

Healthcare Must Watch Medical Device Cybersecurity

Medical device cybersecurity has come under FDA scrutiny since at least 2014, but with the changing threat landscape more targeted – and stringent – regulations are emerging. The FDA has brought their concerns before Congress, and now another bill is moving through both chambers – the Protecting and Transforming Cyber Health Care (PATCH) Act – which puts the emphasis on manufacturers to address security gaps in their products.

Financials Services in the Spotlight

While the Senate was still debating House amendments the Cyber Incident Reporting for Critical Infrastructure Act of 2022, the SEC was introducing its own new proposals for shortening breach reporting deadlines among its constituents. This additional regulation would put financial services organizations in the compliance crosshairs of multiple agencies, as they also occupy a Critical Infrastructure Sector covered by CISA.

List of Data Breaches March – April 2022

There were many reported data breaches (and likely many more that went unreported) throughout the first few months of 2022. A couple of these are especially noteworthy as the perpetrating gangs were thought to have dissipated in both cases. Here are some standout examples of recent breaches:

  • Municipal government of East Windsor, NJ shut down systems after suspicious activity was discovered
  • City of Cleveland, OH, alerted employees of a compromised account discovery
  • Christie Clinic of Illinois informed over 500,000 patients that their PHI had been compromised by a third party
  • HubSpot released a statement notifying customers that an internal account was breached
  • MailChimp uncovered an external actor in their systems using an internal customer support tool
  • Cash App was the subject of a SEC notification alerting customers to a massive PII exposure

cyber-security-news-russia-ukraine-anonymous-conti-lapsus-fbi-sec-fda

Not Even Arrests Stop Lapsus$

A threat actor only active since at least November 2021, Lapsus$ (alternatively spelled LAPSUS$) has made several headlines in recent months for three big reasons: (1) breaching several large organizations, (2) operating while members where being arrested and (3) seemingly being made up of mostly teenagers. The even more concerning factor is the gang’s focus on social engineering, including trying extensively to recruit insiders among targets. Lapsus$’s victims so far include:

  • Microsoft
  • Nvidia
  • Samsung
  • Globant
  • Okta
  • Electronic Arts (EA)
  • Ubisoft
  • Ministry of Health of Brazil

Conti Ransomware Still Active

At the onset of Russia’s 2022 invasion of Ukraine, the Conti ransomware gang found itself in the news for at first proclaiming solidarity with the Russian side of the conflict and then having to dismantle operations after an undercover security researcher leaked their files. However, it appears that the group may resumed activities and has taken credit for several breaches between March and April.

NJ Faces 10 Million Cyber Attacks a Day

The state of New Jersey revealed during a presentation in March 2022 that NJ government networks are subject to over 10 million cyber attack attempts per day. It was noted that rates have increased over recent years, as well as that the majority of these seem to originate from Russia.

You Can Be Sued for a Breach

Companies that have been breached are also increasingly subjected to lawsuits over it – the healthcare sector makes up the majority of these currently, but other industries are quickly seeing a rise in both irate customers and employees. The trend is pushing the legal system into figuring out exactly where culpability lies, with experts and even courts divided on the level of liability. Here are some examples of recent data breach lawsuits:

  • Ultimate Kronos Group faces class-action suit for payroll software cloud breach
  • Lakeview Loan Servicing has 2 separate lawsuits over breach that exposed over 2.5 million customers
  • Creative Services, Inc., a background check firm, contends with multiple lawsuits after data leaked
  • Shopify in the middle of continuous suits over cryptocurrency wallet hack
  • Apple pays nearly $15 million for class-action lawsuit over third-party iCloud breach

Cyber War Updates

The war in Ukraine is still ongoing as of this writing, and though the cyber war front seemed quiet in the first few weeks of the invasion, officials and experts suspect that the increase in cyber attacks outlined above can be tied to actors within Russia. However, what is clear is that the many – including the US government – are much more alert to cyber threats than ever before, and taking proactive action.

Law Enforcement Goes After Russian Hacking

US law enforcement agencies are cracking down on hacking operations tied to Russia, from individual indictments and business sanctions to outright removing malware from infected victims. The latter is one of the most potentially impactful – and controversial – of these activities, as the FBI and Justice Department directly intervened with the networks of private businesses that were not moving fast enough to counter the compromise.

New Cyber Attacks on Ukraine Power Grid

A cyber attack that many predicted and feared seemed to materialize as Ukraine’s power grid suffered its third major breach attempt in 7 years; however, as with many of the other digital assaults on the onset of the war, widespread damage was averted this time. With help from Microsoft and others, Ukrainian officials claimed they were able to fight back against a malware infection targeting both IT and OT systems.

Russia Gets Hacked

After hacktivist collective Anonymous declared a campaign against Russia in opposition to the invasion, an affiliate hacker group claimed to have managed to breached Russia’s space agency among other targets antivirus provider Kaspersky (suspected by some to be tied to Russian intelligence services). It was revealed that some of their attacks used the code leaked from the Conti ransomware gang, which had also proven their direct contact with Russian officials.

Get More Cybersecurity News from SWK Technologies

Keep an eye on the evolving cybersecurity situation – from new regulations to fallout from the ongoing conflict – by staying up to date on the latest news with SWK Technologies. If you have any questions or concerns in particular, feel free to reach out to us and have a conversation with one of our experts.

Contact SWK here to learn more about the current state of cybersecurity, recent updates in the field and what you can do to protect your business from cyber attack.

Discover More Cyber News Updates


Category: Blog, Cybersecurity, IT Services

Sidebar

Recent Posts

  • How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
  • Why Financial Services Firms Need Phishing Defense
  • Acumatica General Ledger Training – Key Tips & Tricks
  • Sage Intacct vs. Sage 500: Best ERP for CFOs and Financial Leaders
  • What is the Relationship Between Cybersecurity and Cyber Insurance? 
  • Guide for Sage Intacct Credit Card Management
  • Minimize Tariff Impacts on Your Technology Costs in the Cloud

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Recreational Play Structure

How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth

Read moreHow a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
Hands holding an open silver padlock over a laptop keyboard, symbolizing cybersecurity vulnerabilities that phishing attacks exploit in financial services firms

Why Financial Services Firms Need Phishing Defense

Read moreWhy Financial Services Firms Need Phishing Defense
Black laptop displaying Acumatica General Ledger journal transactions screen on a desk with coffee mug and notepad, showcasing the financial management interface on a computer in an office setting.

Acumatica General Ledger Training – Key Tips & Tricks

Read moreAcumatica General Ledger Training – Key Tips & Tricks

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy