iTnews Asia
  • Home
  • News
  • Security

Acer Philippines reports security incident in third-party vendor system

Acer Philippines reports security incident in third-party vendor system

Resulted in unauthorised access to employee database.

By Abbinaya Kuzhanthaivel on Mar 14, 2024 2:27AM

Acer Philippines is currently investigation a security incident that occurred in its third-party vendor system responsible for managing the company's employee attendance data.

This has resulted in unauthorised access to a database containing specific employee information.

A threat actor identifying as 'ph1ns' had published a link to download the allegedly stolen database containing Acer employee data for free on a hacking forum, according to a report by Bleeping Computer.

The attacker had said no ransomware or encryption was involved and it was only a pure data theft.

However, Acer Philippines said that there has been no breach or leak of any of its customer databases as the attendance system was 'entirely' distinct from it with robust internal systems in place to protect from cybersecurity threats.

"We are dedicated to upholding the most rigorous levels of data protection for all information entrusted to our care," Acer said.

The company has alerted the National Privacy Commission (NPC) and the Cybercrime Investigation and Coordinating Centre (CICC) on the incident.

It recommends individuals with concerns to contact Acer Philippines through their official support channels.

Acer has faced multiple security incidents earlier, notably the attack in February 2023 on its server holding technical manuals, software tools, BIOS images, and replacement digital product keys (RDPK).

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
© iTnews Asia
Tags:
acer philippines security

Related Articles

  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
  • Cybersecurity threats CISOs should be most worried about in 2025
  • Ways to secure your inbox against the next wave of cyberattacks
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

How cybercriminals are exploiting LLMs to harm your business

How cybercriminals are exploiting LLMs to harm your business

Is identity now the next parameter of cybersecurity breaches?

Is identity now the next parameter of cybersecurity breaches?

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

Ways to secure your inbox against the next wave of cyberattacks

Ways to secure your inbox against the next wave of cyberattacks

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.