• Products
    • LevelBlue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Pentera
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Delinea
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions
    • Application Whitelisting
    • Automated Pen Testing
    • Archiving
    • Cloud Access Security CASB
    • Data Loss Prevention
    • DNS Security
    • Email Security
    • Encryption
    • Endpoint Protection
    • Essential 8
    • Load Balancing
    • Mobile / EDR
    • Multi-Factor Authentication
    • Next Generation Firewalls
    • Patch Management
    • Privileged Access Management
    • SD WAN
    • Security Awareness Training
    • Security Incident Event Management SIEM
    • Security Orchestration SOAR
    • Web Application Firewall
    • Web Security Gateway
  • News
  • Resources
  • About Us
  • Products
    • LevelBlue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Pentera
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Delinea
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions
    • Application Whitelisting
    • Automated Pen Testing
    • Archiving
    • Cloud Access Security CASB
    • Data Loss Prevention
    • DNS Security
    • Email Security
    • Encryption
    • Endpoint Protection
    • Essential 8
    • Load Balancing
    • Mobile / EDR
    • Multi-Factor Authentication
    • Next Generation Firewalls
    • Patch Management
    • Privileged Access Management
    • SD WAN
    • Security Awareness Training
    • Security Incident Event Management SIEM
    • Security Orchestration SOAR
    • Web Application Firewall
    • Web Security Gateway
  • News
  • Resources
  • About Us
  • Products
    • Akamai
    • Level Blue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Akamai
    • Level Blue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Veeam
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Veeam
    • Pentera (Formerly PCYSYS)
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Pentera (Formerly PCYSYS)
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Delinea (Formerly Thycotic)
    • Webroot
    • KnowBe4
    • ZScaler
    • Thales Safenet
    • Delinea (Formerly Thycotic)
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions and Services

    Solutions and Services

    Network Security

    Endpoint Security

    Cloud Security

    Email & Data Security

    Identity & Access Management

    Security Operations

    Security Awareness

    Essential 8

    Auditing

    Consultation

    • Endpoint Security
      • Endpoint Protection
      • Mobile / EDR (Endpoint Detection and Response)
      • Application Whitelisting
      • Patch Management
    • Cloud Security
      • CASB (Cloud Access Security Broker)
      • SASE (also fits here)
    • Email & Data Security
      • Email Security
      • Encryption
      • Data Loss Prevention (DLP)
      • Archiving
    • Identity & Access Management
      • Multi-Factor Authentication (MFA)
      • Privileged Access Management (PAM)
    • Security Operations
      • Security Information and Event Management (SIEM)
      • Security Orchestration, Automation, and Response (SOAR)
      • Automated Penetration Testing
    • Security Awareness & Best Practices
      • Security Awareness Training
      • Essential 8 (Australian Cyber Security Centre’s framework – covers multiple categories like patching, MFA, etc.)
    • DNS Security
    • Next Generation Firewalls
    • SD-WAN
    • Secure Web Gateway
    • Load Balancing
    • Web Application Firewall (WAF)
    • SASE (Secure Access Service Edge)
    • Endpoint Security
      • Endpoint Protection
      • Mobile / EDR (Endpoint Detection and Response)
      • Application Whitelisting
      • Patch Management
    • Cloud Security
      • CASB (Cloud Access Security Broker)
      • SASE (also fits here)
    • Email & Data Security
      • Email Security
      • Encryption
      • Data Loss Prevention (DLP)
      • Archiving
    • Identity & Access Management
      • Multi-Factor Authentication (MFA)
      • Privileged Access Management (PAM)
    • Security Operations
      • Security Information and Event Management (SIEM)
      • Security Orchestration, Automation, and Response (SOAR)
      • Automated Penetration Testing
    • Security Awareness & Best Practices
      • Security Awareness Training
      • Essential 8 (Australian Cyber Security Centre’s framework – covers multiple categories like patching, MFA, etc.)
    • DNS Security
    • Next Generation Firewalls
    • SD-WAN
    • Secure Web Gateway
    • Load Balancing
    • Web Application Firewall (WAF)
    • SASE (Secure Access Service Edge)

    Business Challenges

    • Next Generation Firewalls
    • Web Application Firewall (WAF)
    • Attack Surface Management
    • Microsegmentation
    • DDOS Protection
    • Load Balancer
    • Application Analytics
    • ZTNA
    • Next Generation Firewalls
    • Web Application Firewall (WAF)
    • Attack Surface Management
    • Microsegmentation
    • DDOS Protection
    • Load Balancer
    • Application Analytics
    • ZTNA
    • Endpoint Protection
    • EDR (Endpoint Detection and Response)
    • XDR
    • Patch Management
    • Application Whitelisting
    • Endpoint Protection
    • EDR (Endpoint Detection and Response)
    • XDR
    • Patch Management
    • Application Whitelisting
    • SASE
    • Cloud Security Posture Management
    • SASE
    • Cloud Security Posture Management
    • Email Security
    • Data Loss Prevention (DLP)
    • Data Security Posture Management (DSPM)
    • Dynamic Data Protection
    • DMARC
    • Hardware Security Module
    • Back-Up
    • Email Security
    • Data Loss Prevention (DLP)
    • Data Security Posture Management (DSPM)
    • Dynamic Data Protection
    • DMARC
    • Hardware Security Module
    • Back-Up
    • Identity Management
    • Identity Management
    • Security Information and Event Management (SIEM)
    • Automated Penetration Testing
    • Security Orchestration, Automation, and Response (SOAR)
    • Security Information and Event Management (SIEM)
    • Automated Penetration Testing
    • Security Orchestration, Automation, and Response (SOAR)
    • Awareness Training
    • Awareness Training
    • Maturity Level One
    • Maturity Level Two
    • Maturity Level Three
    • Maturity Level One
    • Maturity Level Two
    • Maturity Level Three

    Digital Transformation

    Digital Transformation

    Digital Transformation

    Digital Transformation

    Industry Focus

  • Company

    The Sécurité difference for best in class cyber security

    • About Us
    • Why Us
    • About Us
    • Why Us

    Platform Partnership

    • AWS
    • Google Cloud
    • Microsoft
    • Salesforce
  • News
  • Resources
Contact Us
May 07

Toll Group is having to rebuild the core systems that underpin most of its online operations following an infection with a type of ransomware called Nefilim.

  • May 7, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized
https://www.itnews.com.au/news/toll-group-rebuilding-core-systems-used-for-its-online-operations-547829

After Nefilim ransomware infection.

Toll Group is having to rebuild the core systems that underpin most of its online operations following an infection with a type of ransomware called Nefilim.

The logistics giant said on Wednesday afternoon it is manually cleaning affected servers and systems “and restoring files from backups”.

It has already said it will not pay the ransom demanded by attackers.

“As we continue to investigate the details of the ransomware attack that led us to disable various IT systems, we’re making good progress in rebuilding the core systems which underpin most of Toll’s online operations,” it said.

Toll said that freight shipments and parcel deliveries are running “essentially to schedule”, though track-and-trace through MyToll remains offline.

It also said it is prioritising the movement of certain essential items, “including medical and healthcare supplies into the national stockpile for COVID-19 requirements.”

Additionally, the company said it was working with business customers that had been impacted.

It maintained existing guidance to continue with manual processing arrangements “through the week”.

Securite comment: Application #Whitelisting will stop #ransomware executing in the first place stopping malicious encryption dead. Talk to Securite today about the latest cutting edge solutions. #cybersecurity

  • Facebook
  • Twitter
  • Tumblr
  • Pinterest
  • Google+
  • LinkedIn
  • E-Mail

About The Author

Risk Advisor. CISO

Leave a reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020

Our Partners

  • Products
    • LevelBlue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Pentera
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Delinea
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions
    • Application Whitelisting
    • Automated Pen Testing
    • Archiving
    • Cloud Access Security CASB
    • Data Loss Prevention
    • DNS Security
    • Email Security
    • Encryption
    • Endpoint Protection
    • Essential 8
    • Load Balancing
    • Mobile / EDR
    • Multi-Factor Authentication
    • Next Generation Firewalls
    • Patch Management
    • Privileged Access Management
    • SD WAN
    • Security Awareness Training
    • Security Incident Event Management SIEM
    • Security Orchestration SOAR
    • Web Application Firewall
    • Web Security Gateway
  • News
  • Resources
  • About Us

Solutions

  • Akamai
  • Level Blue (Formerly AT & T)
  • Abnormal Security
  • Airlock Digital
  • Check Point
  • Cisco Systems
  • Akamai
  • Level Blue (Formerly AT & T)
  • Abnormal Security
  • Airlock Digital
  • Check Point
  • Cisco Systems
  • Forcepoint
  • Imperva
  • Kemp Technologies
  • Malwarebytes
  • Mimecast
  • Veeam
  • Forcepoint
  • Imperva
  • Kemp Technologies
  • Malwarebytes
  • Mimecast
  • Veeam
  • Akamai
  • Level Blue (Formerly AT & T)
  • Abnormal Security
  • Airlock Digital
  • Check Point
  • Cisco Systems
  • Akamai
  • Level Blue (Formerly AT & T)
  • Abnormal Security
  • Airlock Digital
  • Check Point
  • Cisco Systems
  • Thales Safenet
  • Delinea (Formerly Thycotic)
  • Webroot
  • KnowBe4
  • ZScaler
  • Thales Safenet
  • Delinea (Formerly Thycotic)
  • Webroot
  • KnowBe4
  • ZScaler

Company

  • About Us
  • Why Us
  • About Us
  • Why Us
Schedule Consultation

Seventh Ave, 20th Floor New York, NY 10018 

T: 1-800-356-8933
E: office@tecnologia.com

LinkedIn

Github

Twitter

Facebook

Youtube

© 2025 VamTam. All rights reserved.
  • SASE
  • Cloud Security Posture Management
  • SASE
  • Cloud Security Posture Management