forked from danyalshah09/Cyber_Blog_Blackbaud_attack
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathblogpost.html
More file actions
128 lines (108 loc) · 10.1 KB
/
blogpost.html
File metadata and controls
128 lines (108 loc) · 10.1 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<link rel="stylesheet" href="css/utils.css">
<link rel="stylesheet" href="css/style.css">
<link rel="stylesheet" href="css/blogpost.css">
<link rel="stylesheet" href="css/mobile.css">
<title>Cyber Scope</title>
</head>
<body>
<nav class="navigation max-width-1 m-auto">
<div class="nav-left">
<a href="/">
<span><img src="img/logo.png" width="94px" alt=""></span>
</a>
<ul>
<li><a href="/">Home</a></li>
<li><a href="#">About</a></li>
<li><a href="/contact.html">Contact</a></li>
</ul>
</div>
<div class="nav-right">
<form action="/search.html" method="get">
<input class="form-input" type="text" name="query" placeholder="Article Search">
<button class="btn">Search</button>
</form>
</div>
</nav>
<div class="max-width-1 m-auto">
<hr>
</div>
<div class="post-img">
<img src="img/cyber.jpg" alt="">
</div>
<div class="m-auto blog-post-content max-width-2 m-auto my-2">
<h1 class="font1"></h1>
<div class="blogpost-meta">
<div class="author-info">
<div>
<b>
Author - Security Staff
</b>
</div>
<div>04 January. 6 min read</div>
</div>
<div class="social">
<svg width="29" height="29" class="hk"><path d="M22.05 7.54a4.47 4.47 0 0 0-3.3-1.46 4.53 4.53 0 0 0-4.53 4.53c0 .35.04.7.08 1.05A12.9 12.9 0 0 1 5 6.89a5.1 5.1 0 0 0-.65 2.26c.03 1.6.83 2.99 2.02 3.79a4.3 4.3 0 0 1-2.02-.57v.08a4.55 4.55 0 0 0 3.63 4.44c-.4.08-.8.13-1.21.16l-.81-.08a4.54 4.54 0 0 0 4.2 3.15 9.56 9.56 0 0 1-5.66 1.94l-1.05-.08c2 1.27 4.38 2.02 6.94 2.02 8.3 0 12.86-6.9 12.84-12.85.02-.24 0-.43 0-.65a8.68 8.68 0 0 0 2.26-2.34c-.82.38-1.7.62-2.6.72a4.37 4.37 0 0 0 1.95-2.51c-.84.53-1.81.9-2.83 1.13z"></path></svg>
<svg style="background: black;
border-radius: 21px;" width="29" height="29" viewBox="0 0 29 29" fill="none" class="hk"><path d="M5 6.36C5 5.61 5.63 5 6.4 5h16.2c.77 0 1.4.61 1.4 1.36v16.28c0 .75-.63 1.36-1.4 1.36H6.4c-.77 0-1.4-.6-1.4-1.36V6.36z"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M10.76 20.9v-8.57H7.89v8.58h2.87zm-1.44-9.75c1 0 1.63-.65 1.63-1.48-.02-.84-.62-1.48-1.6-1.48-.99 0-1.63.64-1.63 1.48 0 .83.62 1.48 1.59 1.48h.01zM12.35 20.9h2.87v-4.79c0-.25.02-.5.1-.7.2-.5.67-1.04 1.46-1.04 1.04 0 1.46.8 1.46 1.95v4.59h2.87v-4.92c0-2.64-1.42-3.87-3.3-3.87-1.55 0-2.23.86-2.61 1.45h.02v-1.24h-2.87c.04.8 0 8.58 0 8.58z" fill="#fff"></path></svg>
<svg width="29" height="29" class="hk"><path d="M23.2 5H5.8a.8.8 0 0 0-.8.8V23.2c0 .44.35.8.8.8h9.3v-7.13h-2.38V13.9h2.38v-2.38c0-2.45 1.55-3.66 3.74-3.66 1.05 0 1.95.08 2.2.11v2.57h-1.5c-1.2 0-1.48.57-1.48 1.4v1.96h2.97l-.6 2.97h-2.37l.05 7.12h5.1a.8.8 0 0 0 .79-.8V5.8a.8.8 0 0 0-.8-.79"></path></svg>
</div>
</div>
<p class="font1">Blackbaud has agreed to settle charges due to misleading information regarding a ransomware attack the company suffered in 2020. The SEC found that when Blackbaud announced the attack they claimed that the ransomware did not access donor bank account information or social security numbers.
Within days of these statements, according to the SEC, the company’s technology and customer relations personnel learned that the attacker had in fact accessed and exfiltrated this sensitive information. According to the SEC, the employees did not communicate this information to senior management responsible for its public disclosure because the company failed to maintain disclosure controls and procedures. </p>
<p class="font1">In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communication channel or storage in a storage medium. An early example is the invention of language, which enabled a person, through speech, to communicate what they thought, saw, heard or felt to others. But speech limits the range of communication to the distance a voice can carry, and limits the audience to those present when the speech is uttered . The invention of writing, which converted spoken language into visual symbols, extended the range of communication across space and time.
The process of encoding converts information from a source into symbols for communication or storage. Decoding is the reverse process, converting code symbols back into a form that the recipient understands, such as English or/and Spanish.
One reason for coding is to enable communication in places where ordinary plain language, spoken or written, is difficult or impossible. For example, semaphore, where the configuration of flags held by a signaler or the arms of a semaphore tower encodes parts of the message, typically individual letters and numbers. Another person standing a great distance away can interpret the flags and reproduce the words sent.</p>
<p class="font1">In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communication channel or storage in a storage medium. An early example is the invention of language, which enabled a person, through speech, to communicate what they thought, saw, heard or felt to others. But speech limits the range of communication to the distance a voice can carry, and limits the audience to those present when the speech is uttered . The invention of writing, which converted spoken language into visual symbols, extended the range of communication across space and time.
The process of encoding converts information from a source into symbols for communication or storage. Decoding is the reverse process, converting code symbols back into a form that the recipient understands, such as English or/and Spanish.
One reason for coding is to enable communication in places where ordinary plain language, spoken or written, is difficult or impossible. For example, semaphore, where the configuration of flags held by a signaler or the arms of a semaphore tower encodes parts of the message, typically individual letters and numbers. Another person standing a great distance away can interpret the flags and reproduce the words sent.</p>
<p class="font1">In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communication channel or storage in a storage medium. An early example is the invention of language, which enabled a person, through speech, to communicate what they thought, saw, heard or felt to others. But speech limits the range of communication to the distance a voice can carry, and limits the audience to those present when the speech is uttered . The invention of writing, which converted spoken language into visual symbols, extended the range of communication across space and time.
The process of encoding converts information from a source into symbols for communication or storage. Decoding is the reverse process, converting code symbols back into a form that the recipient understands, such as English or/and Spanish.
One reason for coding is to enable communication in places where ordinary plain language, spoken or written, is difficult or impossible. For example, semaphore, where the configuration of flags held by a signaler or the arms of a semaphore tower encodes parts of the message, typically individual letters and numbers. Another person standing a great distance away can interpret the flags and reproduce the words sent.</p>
</div>
<div class="max-width-1 m-auto"><hr></div>
<div class="home-articles max-width-1 m-auto font2">
<h2>People who read this also read</h2>
<div class="row">
<div class="home-article more-post">
<div class="home-article-img">
<img src="img/55.jpg" alt="article">
</div>
<div class="home-article-content font1 center">
<a href="/blogpost.html"><h3>Precationary Measures the company practised after getting back control</h3></a>
<div>Sara Merken</div>
<span>07 Febuary | 15 min read</span>
</div>
</div>
<div class="home-article more-post">
<div class="home-article-img">
<img src="img/33.jpg" alt="article">
</div>
<div class="home-article-content font1 center">
<a href="/blogpost.html"><h3>Who Might be the hackers and what did they rally</h3></a>
<div>Author Name</div>
<span>07 January | 6 min read</span>
</div>
</div>
<div class="home-article more-post">
<div class="home-article-img">
<img src="img/11.jpg" alt="article">
</div>
<div class="home-article-content font1 center">
<a href="/blogpost.html"><h3>Blackbaud must face data breach claims over 2020 ransomware attack</h3></a>
<div>David Janabodi</div>
<span>1 January | 30 min read</span>
</div>
</div>
</div>
</div>
<div class="footer">
<p>Copyright © iBlog.com </p>
<a href="https://www.vecteezy.com/free-vector/typewriter">Vector Credits: Vecteezy</a>
</div>
</body>
</html>