AT&T Hack Exposed ‘Nearly All’ Customer Phone Numbers

AT&T Hack Exposed ‘Nearly All’ Customer Phone Numbers

AT&T disclosed today that data from “nearly all” of its customers from May 1, 2022 to October 31, 2022 and on January 2, 2023 was exfiltrated to a third-party platform in April 2024. Customers whose data was exposed will be informed. AT&T said the access point through which the cyberattack was conducted has been secured, and the data is no longer available. Threat actor accessed phone numbers and call durations According to AT&T, the threat…

Read More

BlastRADIUS Vulnerability Discovered in RADIUS Protocol

BlastRADIUS Vulnerability Discovered in RADIUS Protocol

Cyber security researchers have exposed a vulnerability in the RADIUS protocol, dubbed BlastRADIUS. While there is no evidence that threat actors are actively exploiting it, the team is calling for every RADIUS server to be upgraded. What is the RADIUS protocol? RADIUS, or Remote Authentication Dial-In User Service, is a networking protocol that provides centralised authentication, authorisation and accounting for users connecting to a network service. It is widely used by internet service providers and…

Read More

The Critical Intersection of AI and Security: A Partnership Imperative

The Critical Intersection of AI and Security: A Partnership Imperative

In the ever-evolving landscape of technology, artificial intelligence (AI) has emerged as a transformative force—driving innovation and efficiency across countless industries. However, as we integrate AI deeper into our way of living, we must pause and consider a crucial question: What is AI without security? Think of AI without security as a vault filled with treasures but left unlocked. It’s a high-speed train barreling down the tracks with no conductor aboard. In essence, it’s a…

Read More

Nearly 10 Billion Passwords Leaked in Biggest Compilation of All Time

Nearly 10 Billion Passwords Leaked in Biggest Compilation of All Time

The world’s largest compilation of passwords to be leaked online has been discovered by a research team at Cybernews, containing 9,948,575,739 unique plaintext entries. The credentials were discovered in a file named “rockyou2024.txt” that was posted on a popular hacking forum on July 4, 2024. Many of the so-called RockYou2024 passwords have already been leaked in previous data breaches. This is not the first RockYou data dump either, as the name has been associated with…

Read More

OpenAI Secrets Stolen in 2023 After Internal Forum Was Hacked

OpenAI Secrets Stolen in 2023 After Internal Forum Was Hacked

The online forum OpenAI employees use for confidential internal communications was breached last year, anonymous sources have told The New York Times. Hackers lifted details about the design of the company’s AI technologies from forum posts, but they did not infiltrate the systems where OpenAI actually houses and builds its AI. OpenAI executives announced the incident to the whole company during an all-hands meeting in April 2023, and also informed the board of directors. It…

Read More

Accelerating SaaS security certifications to maximize market access

Accelerating SaaS security certifications to maximize market access

The regulatory landscape for Software-as-a-Service (SaaS) offerings is rapidly changing worldwide as governments seek to address concerns around privacy, security, and data sovereignty. While the European Union’s Cybersecurity Certification Scheme for Cloud Services (EUCS) has set a high standard for data protection, Asian countries are also stepping up their regulatory frameworks. For instance, the Information System Security Management and Assessment Program (ISMAP) in Japan provides a baseline standard of protection for user data, imposing stringent…

Read More

Accelerating SaaS security certifications to maximize market access

Accelerating SaaS security certifications to maximize market access

The regulatory landscape for Software-as-a-Service (SaaS) offerings is rapidly changing worldwide as governments seek to address concerns around privacy, security, and data sovereignty. While the European Union’s Cybersecurity Certification Scheme for Cloud Services (EUCS) has set a high standard for data protection, Asian countries are also stepping up their regulatory frameworks. For instance, the Information System Security Management and Assessment Program (ISMAP) in Japan provides a baseline standard of protection for user data, imposing stringent…

Read More

Accelerating SaaS security certifications to maximize market access

Accelerating SaaS security certifications to maximize market access

The regulatory landscape for Software-as-a-Service (SaaS) offerings is rapidly changing worldwide as governments seek to address concerns around privacy, security, and data sovereignty. While the European Union’s Cybersecurity Certification Scheme for Cloud Services (EUCS) has set a high standard for data protection, Asian countries are also stepping up their regulatory frameworks. For instance, the Information System Security Management and Assessment Program (ISMAP) in Japan provides a baseline standard of protection for user data, imposing stringent…

Read More

10 Security Tips for Business Travellers This Summer

10 Security Tips for Business Travellers This Summer

Now the weather is hotting up, many workers may be considering spending some time away from their desk. You may be more inclined to head to that conference in Barcelona or take a trip with the family but keep the company phone on you. Whether you’re hopping on a plane or enjoying a staycation closer to home, taking your business away from your regular workplace brings about a new bevy of security risks. These include…

Read More

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Improved cyber hygiene among businesses has led to a reduction in cyber insurance premiums by 15% worldwide over the last two years, a new report from Howden Insurance Brokers has found. This is despite the fact that cyberthreats, particularly ransomware attacks, are becoming more prevalent. Awareness of cyber hygiene practices, like multifactor authentication, EDR and cloud backups, has grown significantly since 2022. Ransomware attacks have increased by 18% this year, according to Howden and NCC…

Read More
1 4 5 6 7 8 15