Security leaders respond to the AT&T data breach

Security leaders respond to the AT&T data breach

On July 12, 2024, AT&T announced the records of calls and text messages of almost all AT&T cellular customers were compromised via a third-party cloud platform. According to a statement made by AT&T, the compromised data does not contain the content of the calls and text messages. It also does not contain personally identifiable information such as Social Security numbers, dates of birth or customer names. At this time, AT&T states there is no indication…

Read More

AT&T Hack Exposed ‘Nearly All’ Customer Phone Numbers

AT&T Hack Exposed ‘Nearly All’ Customer Phone Numbers

AT&T disclosed today that data from “nearly all” of its customers from May 1, 2022 to October 31, 2022 and on January 2, 2023 was exfiltrated to a third-party platform in April 2024. Customers whose data was exposed will be informed. AT&T said the access point through which the cyberattack was conducted has been secured, and the data is no longer available. Threat actor accessed phone numbers and call durations According to AT&T, the threat…

Read More

RockYou2024: Unpacking the Largest Password Leak in History | McAfee Blog

RockYou2024: Unpacking the Largest Password Leak in History | McAfee Blog

This Fourth of July brought fireworks in the form of a digital security breach, one that has been recorded as the most significant password leak in history. Dubbed RockYou2024, this colossal data dump was unveiled by a user named “ObamaCare” on a prominent hacking forum, revealing a staggering 9.9 billion unique passwords in plain text. The Scale of RockYou2024 The sheer volume of compromised passwords is enough to make any security enthusiast’s head spin. RockYou2024…

Read More

New APT Group

New APT Group

Jul 08, 2024NewsroomCyber Espionage / Cloud Security A previously undocumented advanced persistent threat (APT) group dubbed CloudSorcerer has been observed targeting Russian government entities by leveraging cloud services for command-and-control (C2) and data exfiltration. Cybersecurity firm Kaspersky, which discovered the activity in May 2024, said the tradecraft adopted by the threat actor bears similarities with that of CloudWizard, but pointed out the differences in the malware source code. The attacks wield an innovative data-gathering program…

Read More

Security leaders weigh in on Life360 data breach

Security leaders weigh in on Life360 data breach

Life360 was impacted by a data breach, which they announced in early June. The malicious actors behind the data breach have appeared to target systems associated with Tile, a Life360 subsidiary. Possibly compromised information may include client names, phone numbers, addresses, email addresses and identification numbers for tile devices.  Security leaders weigh in  Piyush Pandey, CEO at Pathlock: “In this instance, it appears that access was given using the admin credentials of a former Tile…

Read More

Recovery point objectives 101: Planning for cyberattacks

Recovery point objectives 101: Planning for cyberattacks

Congressional hearings regarding the UnitedHealth cyberattack that occurred earlier this year revealed that the massive security incident could cost the company a total of $1.6 billion. During testimony, UnitedHealth CEO revealed that hackers infiltrated its systems through a remote portal that wasn’t protected by multifactor authentication and other safeguards the company had in place that were designed to prevent and detect also failed. Unfortunately, there are many companies that find themselves victims of cybercrimes like…

Read More

Beyond the breach: The ongoing fragility of healthcare cybersecurity

Beyond the breach: The ongoing fragility of healthcare cybersecurity

A wave of ransomware attacks in the United States and United Kingdom that have disrupted clinical operations and forced hospitals in both regions to turn away patients is the latest reminder of the fragility of life-saving infrastructure and how lucrative it can be for attackers looking for a payday or an opportunity to sow discord into the lives of patients.  In May, St. Louis-based Ascension Healthcare, one of the largest private healthcare systems in the…

Read More

Overcoming the IT skills gap and maintaining a secure business

Overcoming the IT skills gap and maintaining a secure business

Technology continues evolving and advancing at a rapid speed, ringing in unparalleled opportunities, but also creating new vulnerabilities. With this comes the demand for a workforce equipped with up-to-date skills to counter emerging threats. However, the pace of skill acquisition often lags the evolving threat landscape – opening organizations to increased risks.  According to a Statista report looking at global talent shortages, 54% of organizations experienced a skills shortage in tech in 2023. Yet this skills gap…

Read More

CISOs in Australia Urged to Take a Closer Look at Data Breach Risks

CISOs in Australia Urged to Take a Closer Look at Data Breach Risks

Clayton Utz cyber partner Brenton Steenkamp has seen his fair share of cyber attacks. Returning to Australia in October after a seven-year stint in Amsterdam, he has brought home tales of dealing with multiple large ransomware attacks in Europe, as well as the data governance lessons they provided. Steenkamp said he has observed many Australian organisations are yet to assume the “paradigm shifting” view of risk around data estates that is necessary for future data…

Read More

How the Change Healthcare breach can prompt real cybersecurity change

How the Change Healthcare breach can prompt real cybersecurity change

People’s lives, privacy and safety can hang in the balance when malicious criminals disrupt healthcare operations. Recently, a ransomware attack forced Change Healthcare, which maintains medical records for approximately one-third of patients in the United States, to shut down their systems and impacted pharmacies nationwide, delaying critical prescriptions. This incident is just the latest in a string of healthcare breaches affecting an alarming number of patients and giving attackers access to the most sensitive personal…

Read More
1 2 3 4 25