SlideShare a Scribd company logo
1 of 5
Download to read offline
Cyber attack hits Lion
June 10, 2020 by Clare Burnett
Lion has suffered a cyber attack which forced it to shut down its IT systems, causing disruption to
suppliers and customers.
Lion explained it was working hard to “minimise disruption to customers and suppliers” although it
is not yet clear what form that disruption will take.
It said that it is working with expert advisors to fix the issue, and has alerted the authorities.
“We will provide further updates when we can, and we thank our customers and suppliers for their
patience,” Lion said in a statement.
Its breweries have been affected with reports that production has shut down
(https://7news.com.au/technology/lion-australia-shuts-down-production-on-xxxx-gold-west-end-
and-other-brands-after-cyber-attack-c-1089337) across a number of brands.
Industry professionals, including Professor Greg Austin at UNSW (Canberra)
(https://research.unsw.edu.au/people/professor-greg-austin) who is deputy director of UNSW
Canberra Cyber, have suggested that it is highly likely that the attack is related to the acquisition
of Lion Drinks & Dairy by a Chinese corporation, and that the extent to which Lion has responded
indicates it was an extensive attack.
“Whether it’s a ransomware attack, we don’t know. But for the company to shut down its IT
operations – it’s a pretty unusual response,” Professor Austin told Brews News.
“However if the attackers are into their system and they’ve got access, they’ve locked you out and
then the only recourse is to throw away those systems and go to backup files.”
In preventing attacks, Professor Austin explained that it was a multi-front activity, and that while it
may cost Lion a considerable amount to recover, it will have other concerns regarding the breach.
“You have to build in some risk factors into your business model,” he explained.
“I suspect for Lion the repair bill won’t be too much for it to resolve, but there are reputational
risks, and information which Lion wouldn’t want out there – even IP such as beer and drink
recipes for example.”
Cyber attacks
According to the Australian Bureau of Statistics,
(https://www.abs.gov.au/ausstats/abs@.nsf/mf/8167.0) in 2017-18, 11 per cent of businesses
reported internet security incidents or breaches. It found that of those, manufacturing and
wholesale trade industries reported the most internet security incidents or breaches, with 18 per
cent affected.
Professor Austin said that due to the nature of a company’s business operations, they may feel
that they are unlikely to be targeted.
“Companies which are not banks or big finance corporations, or don’t appear to have state secrets
to hide like military arms manufacturers, are perhaps a bit less inclined to pursue cyber security to
the extent that they need to,” he said.
“I’ve no idea about the degree to which Lion set up their cyber security, but on average most big
corporations don’t invest adequately in cyber security. Attacks like this are normally a wakeup call
to corporations.”
However he said that spending more doesn’t mean companies are invulnerable to attacks.
“What we see is that corporations are subject to repeated attacks, spend more on cyber security
and then have another one and spend more. But companies are in a predicament because
spending more doesn’t necessarily improve it or prevent the attacks.
“It’s a dilemma about what to invest in. The second point to make, is that whether you are subject
to an attack has more to do with bad luck, rather than what you’re investing in.”
Professor Austin said that it was for most companies a lottery as to when and how they are
attacked.
However due to the timing of the Lion attack, it is very likely connected to the upcoming
acquisition of Lion Dairy & Drinks business, he said. The deal with China Mengniu Dairy Company
Ltd, which does not including Lion’s beer and brewing operations, was approved by the ACCC in
February (https://www.accc.gov.au/media-release/mengniu-deal-to-buy-lion-dairy-drinks-not-
opposed).
“In a situation where this corporation is in the middle of a takeover by a Chinese corporation, it’s
not surprising they have been subject to cyber intrusion,” Professor Austin explained.
He said it was highly likely that the attack came from a party interested in the deal, potentially
even from a Chinese-backed organisation.
“The Chinese government will have its own interests in understanding the financial viability of the
target corporation, and understanding the relationships and people involved.
“A non-Chinese agency might want to know what really is going on: who is involved in the deal; if
it is all above board; what are the motivations of some of the players.”
If the attack on Lion was a ransomware attack, then they will not be the first.
“The thing about ransomware attacks is that they’re very indiscriminate historically. In the UK the
NHS was affected by global ransomware attack in 2017 and it’s those sort of attacks that are
propagated randomly.
“However a targeted attack often comes through these email approaches, what we call a social
engineering approach – someone in the company has been sent an email with malware, opens it
and the malware infects the system.
“If that’s what happened in that case, those internal processes and training of staff are pretty
important.
“But research in US that suggests that even most security-sensitive industries, 50 per cent of staff
still fail to recognise phishing emails.”
Professor Austin explained that often industries which would not consider themselves a target do
not protect as comprehensively as they could.
“People in this sector probably don’t feel they are in line for a big cyber attack but those threats
are out there, same with the average user, and we can also suffer considerable damage from
attack.”
(https://eumundibrewery.com.au/)
Share this:
Category: News Tagged: cyber attack, cyber security, Lion, UNSW
About Us Contact Us Advertise
© 2020 | Website by Abepe
(https://www.brewsnews.com.au/2020/06/10/cyber-attack-hits-lion/?share=twitter&nb=1)
(https://www.brewsnews.com.au/2020/06/10/cyber-attack-hits-lion/?share=facebook&nb=1)
Related
Lion Q1 Trading Update
(https://www.brewsnews.com.au/
2013/04/27/lion-q1-trading-
update/)
Union threatens strike over
XXXX brewery jobs
(https://www.brewsnews.com.au/
2018/03/01/union-threatens-lion-
industrial-action-xxxx-brewery-
jobs/)
Lion H1 Trading Update
(https://www.brewsnews.com.au/
2014/08/07/lion-h1-trading-
update-2/)
Law change revives tap contract
debate
(https://www.brewsnews.com.au/
2020/05/07/law-change-revives-
tap-contract-debate/)
Suppliers resilient in face of
COVID-19
(https://www.brewsnews.com.au/
2020/03/23/suppliers-resilient-in-
face-of-covid-19/)
Lion acquires minority stake in
Vanguard Luxury Brands
(https://www.brewsnews.com.au/
2019/04/05/lion-acquires-
minority-stake-in-vanguard-
luxury-brands/)
April 27, 2013
In "Media Releases"
March 1, 2018
In "Featured"
August 7, 2014
In "Media Releases"
May 7, 2020
In "News"
March 23, 2020
In "News" April 5, 2019
In "News"
Cyber attack hits Lion

More Related Content

What's hot

What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityRow Murray
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughScared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughXeneta
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Proofpoint
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
Control%27s+Force+Pitch+Deck (1)
Control%27s+Force+Pitch+Deck (1)Control%27s+Force+Pitch+Deck (1)
Control%27s+Force+Pitch+Deck (1)SGB Media Group
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security indexsukiennong.vn
 
Can you predict who will win the US election?
Can you predict who will win the US election?Can you predict who will win the US election?
Can you predict who will win the US election?Samvel Gevorgyan
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by SymantecCheapest SSLs
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017Kieren Windsor
 

What's hot (20)

What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughScared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
Control%27s+Force+Pitch+Deck (1)
Control%27s+Force+Pitch+Deck (1)Control%27s+Force+Pitch+Deck (1)
Control%27s+Force+Pitch+Deck (1)
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
Can you predict who will win the US election?
Can you predict who will win the US election?Can you predict who will win the US election?
Can you predict who will win the US election?
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017
 

Similar to Cyber attack hits Lion

cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Gary Chambers
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Steve Fantauzzo
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’John Davis
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Whitepaper - Cyber Risk & Supply Chains
Whitepaper - Cyber Risk & Supply ChainsWhitepaper - Cyber Risk & Supply Chains
Whitepaper - Cyber Risk & Supply ChainsDouglas Menelly
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?David Hunt
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
Cyber_Risk_in_Switzerland_March_2022.pdf
Cyber_Risk_in_Switzerland_March_2022.pdfCyber_Risk_in_Switzerland_March_2022.pdf
Cyber_Risk_in_Switzerland_March_2022.pdfGeorgeLekatis2
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRBill Besse
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
 
IT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxIT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxsmumbahelp
 
Lynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk
Lynch2015 - History Likely Not Enough to Price Ever-Shifting CyberriskLynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk
Lynch2015 - History Likely Not Enough to Price Ever-Shifting CyberriskRaveem Ismail
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalMorgan Jones
 

Similar to Cyber attack hits Lion (20)

cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’Banks ‘falling s short on data protection’
Banks ‘falling s short on data protection’
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Whitepaper - Cyber Risk & Supply Chains
Whitepaper - Cyber Risk & Supply ChainsWhitepaper - Cyber Risk & Supply Chains
Whitepaper - Cyber Risk & Supply Chains
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Cyber_Risk_in_Switzerland_March_2022.pdf
Cyber_Risk_in_Switzerland_March_2022.pdfCyber_Risk_in_Switzerland_March_2022.pdf
Cyber_Risk_in_Switzerland_March_2022.pdf
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Worker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumesWorker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumes
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
IT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxIT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docx
 
Lynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk
Lynch2015 - History Likely Not Enough to Price Ever-Shifting CyberriskLynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk
Lynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 

More from Dharmendra Rama

The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
Adding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool BeltAdding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool BeltDharmendra Rama
 
CORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEWCORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEWDharmendra Rama
 
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMESMINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMESDharmendra Rama
 
How to build a gaming PC — and why you should
How to build a gaming PC — and why you shouldHow to build a gaming PC — and why you should
How to build a gaming PC — and why you shouldDharmendra Rama
 
How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200Dharmendra Rama
 
How I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledgeHow I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledgeDharmendra Rama
 
Computer engineering: A deeper perspective
Computer engineering: A deeper perspectiveComputer engineering: A deeper perspective
Computer engineering: A deeper perspectiveDharmendra Rama
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Dharmendra Rama
 
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsWith pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsDharmendra Rama
 
Apple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concernsApple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concernsDharmendra Rama
 
Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Dharmendra Rama
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 
21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...Dharmendra Rama
 
Android for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneAndroid for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneDharmendra Rama
 
13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's Productivity13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's ProductivityDharmendra Rama
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsDharmendra Rama
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsDharmendra Rama
 

More from Dharmendra Rama (20)

The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Adding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool BeltAdding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool Belt
 
CORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEWCORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEW
 
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMESMINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
 
How to build a gaming PC — and why you should
How to build a gaming PC — and why you shouldHow to build a gaming PC — and why you should
How to build a gaming PC — and why you should
 
How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200
 
How I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledgeHow I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledge
 
Computer engineering: A deeper perspective
Computer engineering: A deeper perspectiveComputer engineering: A deeper perspective
Computer engineering: A deeper perspective
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsWith pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
 
Apple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concernsApple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concerns
 
Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Big Tech, Privacy, and Power
Big Tech, Privacy, and Power
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...
 
Android for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneAndroid for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphone
 
13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's Productivity13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's Productivity
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic parts
 
Dharmendra Rama
Dharmendra RamaDharmendra Rama
Dharmendra Rama
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic parts
 

Recently uploaded

FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | DelhiMalviyaNagarCallGirl
 
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...dajasot375
 
Faridabad Call Girls : ☎ 8527673949, Low rate Call Girls
Faridabad Call Girls : ☎ 8527673949, Low rate Call GirlsFaridabad Call Girls : ☎ 8527673949, Low rate Call Girls
Faridabad Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Strip Zagor Extra 322 - Dva ortaka.pdf
Strip   Zagor Extra 322 - Dva ortaka.pdfStrip   Zagor Extra 322 - Dva ortaka.pdf
Strip Zagor Extra 322 - Dva ortaka.pdfStripovizijacom
 
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857delhimodel235
 
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Gtb Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | DelhiMalviyaNagarCallGirl
 
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad EscortsIslamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escortswdefrd
 
Olivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxOlivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxLauraFagan6
 
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call GirlsGovindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Roadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NMRoadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NMroute66connected
 
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | DelhiMalviyaNagarCallGirl
 
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000Sapana Sha
 
MinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardMinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardjessica288382
 
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | DelhiMalviyaNagarCallGirl
 
Mandi House Call Girls : ☎ 8527673949, Low rate Call Girls
Mandi House Call Girls : ☎ 8527673949, Low rate Call GirlsMandi House Call Girls : ☎ 8527673949, Low rate Call Girls
Mandi House Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Servicedoor45step
 
FULL ENJOY - 9953040155 Call Girls in Mahipalpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Mahipalpur | DelhiFULL ENJOY - 9953040155 Call Girls in Mahipalpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Mahipalpur | DelhiMalviyaNagarCallGirl
 
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...akbard9823
 
Akola Call Girls #9907093804 Contact Number Escorts Service Akola
Akola Call Girls #9907093804 Contact Number Escorts Service AkolaAkola Call Girls #9907093804 Contact Number Escorts Service Akola
Akola Call Girls #9907093804 Contact Number Escorts Service Akolasrsj9000
 
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur DubaiBur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubaidajasot375
 

Recently uploaded (20)

FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | Delhi
 
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...
Call Girl in Bur Dubai O5286O4116 Indian Call Girls in Bur Dubai By VIP Bur D...
 
Faridabad Call Girls : ☎ 8527673949, Low rate Call Girls
Faridabad Call Girls : ☎ 8527673949, Low rate Call GirlsFaridabad Call Girls : ☎ 8527673949, Low rate Call Girls
Faridabad Call Girls : ☎ 8527673949, Low rate Call Girls
 
Strip Zagor Extra 322 - Dva ortaka.pdf
Strip   Zagor Extra 322 - Dva ortaka.pdfStrip   Zagor Extra 322 - Dva ortaka.pdf
Strip Zagor Extra 322 - Dva ortaka.pdf
 
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
 
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Gtb Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gtb Nagar | Delhi
 
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad EscortsIslamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
 
Olivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxOlivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptx
 
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call GirlsGovindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
Govindpuri Call Girls : ☎ 8527673949, Low rate Call Girls
 
Roadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NMRoadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NM
 
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
 
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
 
MinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardMinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboard
 
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
 
Mandi House Call Girls : ☎ 8527673949, Low rate Call Girls
Mandi House Call Girls : ☎ 8527673949, Low rate Call GirlsMandi House Call Girls : ☎ 8527673949, Low rate Call Girls
Mandi House Call Girls : ☎ 8527673949, Low rate Call Girls
 
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
 
FULL ENJOY - 9953040155 Call Girls in Mahipalpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Mahipalpur | DelhiFULL ENJOY - 9953040155 Call Girls in Mahipalpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Mahipalpur | Delhi
 
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
 
Akola Call Girls #9907093804 Contact Number Escorts Service Akola
Akola Call Girls #9907093804 Contact Number Escorts Service AkolaAkola Call Girls #9907093804 Contact Number Escorts Service Akola
Akola Call Girls #9907093804 Contact Number Escorts Service Akola
 
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur DubaiBur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
 

Cyber attack hits Lion

  • 1. Cyber attack hits Lion June 10, 2020 by Clare Burnett Lion has suffered a cyber attack which forced it to shut down its IT systems, causing disruption to suppliers and customers. Lion explained it was working hard to “minimise disruption to customers and suppliers” although it is not yet clear what form that disruption will take. It said that it is working with expert advisors to fix the issue, and has alerted the authorities. “We will provide further updates when we can, and we thank our customers and suppliers for their patience,” Lion said in a statement.
  • 2. Its breweries have been affected with reports that production has shut down (https://7news.com.au/technology/lion-australia-shuts-down-production-on-xxxx-gold-west-end- and-other-brands-after-cyber-attack-c-1089337) across a number of brands. Industry professionals, including Professor Greg Austin at UNSW (Canberra) (https://research.unsw.edu.au/people/professor-greg-austin) who is deputy director of UNSW Canberra Cyber, have suggested that it is highly likely that the attack is related to the acquisition of Lion Drinks & Dairy by a Chinese corporation, and that the extent to which Lion has responded indicates it was an extensive attack. “Whether it’s a ransomware attack, we don’t know. But for the company to shut down its IT operations – it’s a pretty unusual response,” Professor Austin told Brews News. “However if the attackers are into their system and they’ve got access, they’ve locked you out and then the only recourse is to throw away those systems and go to backup files.” In preventing attacks, Professor Austin explained that it was a multi-front activity, and that while it may cost Lion a considerable amount to recover, it will have other concerns regarding the breach. “You have to build in some risk factors into your business model,” he explained. “I suspect for Lion the repair bill won’t be too much for it to resolve, but there are reputational risks, and information which Lion wouldn’t want out there – even IP such as beer and drink recipes for example.” Cyber attacks According to the Australian Bureau of Statistics, (https://www.abs.gov.au/ausstats/abs@.nsf/mf/8167.0) in 2017-18, 11 per cent of businesses reported internet security incidents or breaches. It found that of those, manufacturing and wholesale trade industries reported the most internet security incidents or breaches, with 18 per cent affected. Professor Austin said that due to the nature of a company’s business operations, they may feel that they are unlikely to be targeted. “Companies which are not banks or big finance corporations, or don’t appear to have state secrets to hide like military arms manufacturers, are perhaps a bit less inclined to pursue cyber security to the extent that they need to,” he said. “I’ve no idea about the degree to which Lion set up their cyber security, but on average most big corporations don’t invest adequately in cyber security. Attacks like this are normally a wakeup call to corporations.”
  • 3. However he said that spending more doesn’t mean companies are invulnerable to attacks. “What we see is that corporations are subject to repeated attacks, spend more on cyber security and then have another one and spend more. But companies are in a predicament because spending more doesn’t necessarily improve it or prevent the attacks. “It’s a dilemma about what to invest in. The second point to make, is that whether you are subject to an attack has more to do with bad luck, rather than what you’re investing in.” Professor Austin said that it was for most companies a lottery as to when and how they are attacked. However due to the timing of the Lion attack, it is very likely connected to the upcoming acquisition of Lion Dairy & Drinks business, he said. The deal with China Mengniu Dairy Company Ltd, which does not including Lion’s beer and brewing operations, was approved by the ACCC in February (https://www.accc.gov.au/media-release/mengniu-deal-to-buy-lion-dairy-drinks-not- opposed). “In a situation where this corporation is in the middle of a takeover by a Chinese corporation, it’s not surprising they have been subject to cyber intrusion,” Professor Austin explained. He said it was highly likely that the attack came from a party interested in the deal, potentially even from a Chinese-backed organisation. “The Chinese government will have its own interests in understanding the financial viability of the target corporation, and understanding the relationships and people involved. “A non-Chinese agency might want to know what really is going on: who is involved in the deal; if it is all above board; what are the motivations of some of the players.” If the attack on Lion was a ransomware attack, then they will not be the first. “The thing about ransomware attacks is that they’re very indiscriminate historically. In the UK the NHS was affected by global ransomware attack in 2017 and it’s those sort of attacks that are propagated randomly. “However a targeted attack often comes through these email approaches, what we call a social engineering approach – someone in the company has been sent an email with malware, opens it and the malware infects the system. “If that’s what happened in that case, those internal processes and training of staff are pretty important.
  • 4. “But research in US that suggests that even most security-sensitive industries, 50 per cent of staff still fail to recognise phishing emails.” Professor Austin explained that often industries which would not consider themselves a target do not protect as comprehensively as they could. “People in this sector probably don’t feel they are in line for a big cyber attack but those threats are out there, same with the average user, and we can also suffer considerable damage from attack.” (https://eumundibrewery.com.au/) Share this: Category: News Tagged: cyber attack, cyber security, Lion, UNSW About Us Contact Us Advertise © 2020 | Website by Abepe (https://www.brewsnews.com.au/2020/06/10/cyber-attack-hits-lion/?share=twitter&nb=1) (https://www.brewsnews.com.au/2020/06/10/cyber-attack-hits-lion/?share=facebook&nb=1) Related Lion Q1 Trading Update (https://www.brewsnews.com.au/ 2013/04/27/lion-q1-trading- update/) Union threatens strike over XXXX brewery jobs (https://www.brewsnews.com.au/ 2018/03/01/union-threatens-lion- industrial-action-xxxx-brewery- jobs/) Lion H1 Trading Update (https://www.brewsnews.com.au/ 2014/08/07/lion-h1-trading- update-2/) Law change revives tap contract debate (https://www.brewsnews.com.au/ 2020/05/07/law-change-revives- tap-contract-debate/) Suppliers resilient in face of COVID-19 (https://www.brewsnews.com.au/ 2020/03/23/suppliers-resilient-in- face-of-covid-19/) Lion acquires minority stake in Vanguard Luxury Brands (https://www.brewsnews.com.au/ 2019/04/05/lion-acquires- minority-stake-in-vanguard- luxury-brands/) April 27, 2013 In "Media Releases" March 1, 2018 In "Featured" August 7, 2014 In "Media Releases" May 7, 2020 In "News" March 23, 2020 In "News" April 5, 2019 In "News"