SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Reading: Ingram Micro confirms ransomware attack after days of downtime
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > AI > Ingram Micro confirms ransomware attack after days of downtime
AI

Ingram Micro confirms ransomware attack after days of downtime

News Room
Last updated: July 7, 2025 11:48 am
News Room
Share
1 Min Read
SHARE

Meanwhile, downstream retailers appear to have been shielded—at least for now. Several retailers, speaking off the record, said they don’t interact directly with Ingram Micro but rely on regional distributors who typically maintain buffer stock. “At least, these distributors haven’t witnessed any impact yet,” one retailer noted.

Weak links: tech supply chain targeted

This attack on Ingram Micro reflects a broader shift in threat actors focusing on increasingly targeting beyond software development firms to broader tech supply chain nodes to maximize disruption.

Jain added that entities like distributors, MSPs, and logistics providers offer high leverage with relatively lower security maturity compared to large enterprises. Enterprise security must now extend beyond internal controls to include continuous threat monitoring, resilience planning, and visibility across third-party networks. To evaluate and mitigate risks tied to critical IT distributors, organisations should enhance due diligence by assessing distributors’ security certifications, incident-response readiness, and tooling. “Contracts must include clear breach notification timelines, audit rights, and SLA terms for recovery. Leveraging third-party risk platforms and real-time attack-surface monitoring also ensures continuous oversight,” added Jaju.

Read the full article here

You Might Also Like

Google’s AI agent protocol is becoming the language for digital labor – Computerworld

Q&A: Ernst & Young exec details the good, bad and future of genAI deployments

20 genuinely useful AI apps for Android – Computerworld

How data center skills gap causes cloud outages – Computerworld

Download the ‘New Thinking about Cloud Computing’ Enterprise Spotlight

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

News

How AI Personalizes Insurance for Today’s Small Business Owners

July 7, 2025
Games

Call of Duty: WW2 pulled from PC following reports of remote code exploit trolling players with ‘Notepad pop-ups, PC shutdowns’ and desktop wallpaper of a lawyer

July 7, 2025
AI

China’s AI unity fractures as Huawei faces model theft allegations from the Alibaba camp – Computerworld

July 7, 2025
Software

Capgemini to buy WNS to boost its business process services with AI – Computerworld

July 7, 2025
News

Cable TV Fumbled the Future, Now Streaming Owns It

July 7, 2025
News

Microsoft and the microbiome: Viome works with tech giant to optimize AI for molecular health

July 7, 2025

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?