- Can you watch movies on your TV using a USB stick? You most certainly can
- Will AI replace software engineers? It depends on who you ask
- 칼럼 | AI에 보안 맡겨도 될까?··· CISO의 '에이전틱 AI' 대비 방법
- Tal Saraf (Atlassian): “Construimos una IA interna, nuestro propio patio de recreo para emplearla de forma segura”
- 구글, 제미나이 2.5 플래시 하이브리드 추론 모델 공개
Molson Coors Suffers Suspected Ransomware Attack

Beverage giant Molson Coors has released details of what appears to be a ransomware incident.
The firm, known for big-name brands such as Coors, Miller Lite and Foster’s, revealed the attack in a filing with the Securities and Exchange Commission (SEC) yesterday.
It claimed the firm had experienced a “systems outage caused by a cybersecurity incident” which it was in the process of managing.
“The company has engaged leading forensic information technology firms and legal counsel to assist the company’s investigation into the incident and the company is working around the clock to get its systems back up as quickly as possible,” it said.
“Although the company is actively managing this cybersecurity incident, it has caused and may continue to cause a delay or disruption to parts of the company’s business, including its brewery operations, production and shipments.”
Although the filing is light on detail, a systems outage, delays and disruption would seem to indicate the presence of ransomware.
With revenue of over $10bn in 2019, the firm would certainly seem to represent a lucrative target for such attacks.
Edgard Capdevielle, CEO at Nozomi Networks, noted that such “big game hunting” attacks are increasingly popular.
“Ransomware threat actors typically rely on spear-phishing links or vulnerable public services to gain initial entry into a network. Afterward, they move laterally to gain access to as many nodes of the network as possible, allowing them to increase the magnitude of the disruption,” he continued.
“Cybersecurity best practices such as strong segmentation, user training, proactive cyber-hygiene programs, multi-factor authentication and the use of continuously updated threat intelligence, should be used to protect IT and operational environments from ransomware and other cyber-attacks.”