
Further to the cyberattack on EMA last year, some of the unlawfully accessed documents including email correspondence have been made public through the Internet and were subsequently picked up by some media outlets. This was the subject of a public update from the Agency on 15 January. A closer investigation of the published material has revealed that not all of the documents were published in their integral, original form and may have been taken out of context. Whilst individual emails are authentic, data from different users were selected and aggregated, screenshots from multiple folders and mailboxes have been created and additional titles were added by the perpetrators in a way which could undermine trust in vaccines.
In the EU, several measures are in place to ensure the continued high quality of vaccines over their lifecycle. Vaccines used in public health immunisation programmes are subject to stringent testing and quality control measures and must meet rigorous specifications approved by EMA. Additionally, an official medicines control laboratory of a Member State performs an independent control for each batch of vaccine.
The Agency continues to fully support the criminal investigation led by law enforcement authorities, in cooperation with other entities.
The Agency and the European medicines regulatory network remain fully functional and timelines related to the evaluation and approval of COVID-19 medicines and vaccines are not affected.
EMA will continue to provide information in due course, to the extent possible, given its duty towards the ongoing investigation.
European Medicines Agency (EMA)
Fachartikel

Leitfaden zum Exposure Management: Warum Sie es brauchen und wie Sie es umsetzen

Zusammenfassung des Webinars „Let’s Encrypt“: Eine neue Ära der Zertifikatsüberwachung

Messung des ROI in der Cybersicherheit

Quantifizierung des Risikos von ERP-Ausfallzeiten und das Streben nach betrieblicher Ausfallsicherheit

Spionieren Chrome-Erweiterungen von AI Sie aus?
Studien

Aufruf zum Handeln: Dringender Plan für den Übergang zur Post-Quanten-Kryptographie erforderlich

IBM-Studie: Gen-KI wird die finanzielle Leistung von Banken im Jahr 2025 steigern

Smartphones – neue Studie zeigt: Phishing auch hier Sicherheitsrisiko Nr. 1

GenAI: Wirtschaft in Deutschland vernachlässigt Transformation der Geschäftsmodelle

Studie zu Security in Kubernetes
Whitepaper

Wie NIS2 und DORA die SaaS-Compliance beeinflussen

Umsetzung des Konzeptes „Cyber-Nation“: Bundesverband IT-Sicherheit (TeleTrusT) veröffentlicht Forderungskatalog

Häufige Herausforderungen bei der Cyberkriminalität

Datasheets: Kontinuierliche Compliance mit Onapsis
