Regenerative medicine maker Tissue Regenix resume production after cyber attack

Regenerative medicine maker Tissue Regenix resume production after cyber attack

Medical products maker Tissue Regenix Group said on Tuesday its U.S. manufacturing plant had resumed operations following last week’s cyber attack on its computer network, sending its shares up as much as 28%.

The company said initial investigations found no indications of any external transfer of sensitive or financial data and that costs to restore the systems were not expected to be material to its short-term cash flow.

The company took some systems offline early last week after they were breached and appointed external investigators to look into the incident.

London-listed Tissue Regenix said the incident is expected to hit order processing for a “very short-term” and that delayed orders would be shipped over the coming weeks.

The company, which was formed in 2006 when it was spun-out from the University of Leeds, develops a special kind of tissue that is not rejected by a patient’s body and can be used to repair diseased or worn out body parts.

Its shares were up 20% at 1.2 pence as of 1216 GMT, recovering losses from last week.

Source: Reuters 4 February, Bengaluru

Reporting: Pushkala Aripaka

Copyright Lyonsdown Limited 2021

Top Articles

RockYou2021 data leak: 8.4 billion passwords compromised

A report shows that 100GB of data which includes 8.4 billion passwords have been recently leaked on the internet, people are being encouraged to secure their accounts.

Hackers Breach Electronic Arts & Steal Game Code

Electronic Arts, one of the world's biggest video game publishers including games such as FIFA, Madden, Sims and Medal of Honor, are the latest company to be hacked.

JBS Foods paid £7.7m in ransom to REvil ransomware gang

JBS Foods, the world’s largest processor of beef and poultry products, has admitted to paying a ransom of $11 million to cyber criminals, a week after it announced that operations…

Related Articles

[s2Member-Login login_redirect=”” /]