Fri.Jul 12, 2024

article thumbnail

Hackers Steal Phone, SMS Records for Nearly All AT&T Customers

Krebs on Security

AT&T Corp. disclosed today that a new data breach has exposed phone call and text message records for roughly 110 million people — nearly all of its customers. AT&T said it delayed disclosing the incident in response to “national security and public safety concerns,” noting that some of the records included data that could be used to determine where a call was made or text message sent.

article thumbnail

AT&T Details Massive Breach of Subscribers' Call Logs

Data Breach Today

Ongoing Law Enforcement Investigation Led to Delay in Public Breach Notification Attackers have stolen logs of call and text interactions pertaining to nearly every one of AT&T's millions of wireless customers, as well as customers of mobile virtual network operators who use its network, telecommunications giant warned.

IT 265
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The NSA Has a Long-Lost Lecture by Adm. Grace Hopper

Schneier on Security

The NSA has a video recording of a 1982 lecture by Adm. Grace Hopper titled “Future Possibilities: Data, Hardware, Software, and People.” The agency is (so far) refusing to release it. Basically, the recording is in an obscure video format. People at the NSA can’t easily watch it, so they can’t redact it. So they won’t do anything.

article thumbnail

AT&T Details Massive Breach of Customers' Call and Text Logs

Data Breach Today

Data Stolen From Snowflake Account; Telco Plans to Notify 110 Million Individuals Attackers have stolen logs of call and text interactions pertaining to nearly every one of AT&T's millions of wireless customers, as well as customers of mobile virtual network operators who use its network, the telecommunications giant warned Friday.

IT 265
article thumbnail

The Tumultuous IT Landscape is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Sweeping Danger of the AT&T Phone Records Breach

WIRED Threat Level

Telecom giant AT&T says a major data breach has exposed the call and text records of “nearly all” of its customers, epitomizing the dire state of data security.

More Trending

article thumbnail

New AT&T data breach exposed call logs of almost all customers

Security Affairs

AT&T disclosed a new data breach that exposed phone call and text message records for approximately 110 million people. AT&T suffered a massive data breach, attackers stole the call logs for approximately 110 million customers, which are almost all of the company’s mobile customers. The stolen data was stolen on a database hosted by the company’s Snowflake , reported Techcrunch quoting an AT&T spokesperson.

article thumbnail

FedNow's First Year: Mixed Bag of Achievements, Challenges

Data Breach Today

New Payment Rail Enrolled 800 FIs, But Transaction Volumes Lag Expectations In July 2023, the U.S. payments industry marked a major milestone with the launch of FedNow, the Federal Reserve's instant payment service for depository institutions. This long-anticipated development promises to revolutionize real-time payments across the country.

169
169
article thumbnail

Critical flaw in Exim MTA could allow to deliver malware to users’ inboxes

Security Affairs

A critical vulnerability in Exim mail server allows attackers to deliver malicious executable attachments to mailboxes. Attackers can exploit a critical security flaw, tracked as CVE-2024-39929 (CVSS score of 9.1), in the Exim mail transfer agent to deliver malicious attachments to target users’ inboxes. Exim is a widely used Mail Transfer Agent (MTA) designed to route, deliver, and receive email messages.

Security 115
article thumbnail

ISMG Editors: How Should We Handle Ransomware Code Flaws?

Data Breach Today

Also: Uncertainty in US Cyber, AI Policy; Fake Gen AI That Distributes Malware In the latest weekly update, ISMG editors discussed how the industry should handle ransomware vulnerabilities, the rise of fake generative AI assistants that spread malware, and the implications that recent U.S. Supreme Court decisions could have for cybersecurity and AI regulations.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Palo Alto Networks fixed a critical bug in the Expedition tool

Security Affairs

Palo Alto Networks addressed five vulnerabilities impacting its products, including a critical authentication bypass issue. Palo Alto Networks released security updates to address five security flaws impacting its products, the most severe issue, tracked as CVE-2024-5910 (CVSS score: 9.3), is a missing authentication for a critical function in Palo Alto Networks Expedition that can lead to an admin account takeover.

article thumbnail

CRYSTALRAY Group Targets 1,500 Organizations in 6 Months

Data Breach Today

Relatively New Threat Actor Uses Open-Source Tools, Focuses on US and China A relatively new threat actor has compromised over 1,500 organizations worldwide since February, using open-source security tools to automate and streamline attack processes. Security researchers have tracked a significant escalation in CRYSTALRAY operations.

Security 161
article thumbnail

Let’s stop talking about AI

CGI

Artificial intelligence (AI) has attracted a lot of attention and scrutiny since ChatGPT launched in November 2022. The new features of large language models and the rapid development of new tools and functions since then have sparked a lot of curiosity, the need for AI rules and standards, and a fear that AI will harm humans.

article thumbnail

How to make the Xfce desktop more user-friendly

Collaboration 2.0

Give these Xfce tweaks a try if you want a lightning-fast desktop operating system that's as user-friendly as possible.

98
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

What Is Cloud Database Security? Types, Best Practices & Tools

eSecurity Planet

Cloud database security refers to the set of techniques and procedures used to shield cloud-based storage from malicious or unintentional attacks. It safeguards data by authenticating users and devices, controlling access to data and resources, and following regulatory requirements. This security approach protects against common threats like data breaches, DDoS assaults, viruses, hackers, and unauthorized access in cloud environments.

Cloud 70
article thumbnail

The battery-powered Arlo Pro 5S 2K outdoor camera is down 52% for Prime Day

Collaboration 2.0

The Arlo Pro 5S 2K captures outdoor movement near-instantly, but brand-exclusive features make it harder to recommend to everyone. This $120 deal could make anyone change their mind.

IT 98
article thumbnail

CIO.com: NetSuite EDI integration made easy, fast, and affordable

OpenText Information Management

For businesses using Oracle NetSuite as their ERP, managing Electronic Data Interchange (EDI) data transfers can be a complex and time-consuming process. Manually entering data, dealing with errors, and jumping from one system to the next creates bottlenecks slows you down if you don't integrate NetSuite adequately. But what if there was a way to seamlessly integrate EDI with NetSuite, improve data visibility, and streamline your entire operation?

Retail 64
article thumbnail

Get early access to Apple Vision Pro apps using TestFlight - here's how

Collaboration 2.0

Stay ahead of the curve with the latest updates and beta-test new apps effortlessly. Follow my step-by-step walkthrough for installing and using TestFlight on Apple's XR headset.

Access 75
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Replaying an attack with OpenText NDR

OpenText Information Management

In Network Detection and Response (NDR) related operations, there is often a need to replay a Packet Capture (PCAP) data stream. The reasons can be multiple including verifying operation of supplied detections against known traffic, gathering evidence of an attack where no detections were available, or using PCAP samples to write broader detections.

article thumbnail

The Jackery Explorer 1000 is one of the best portable power stations you can buy, and it's now $840

Collaboration 2.0

This Jackery portable power station is a fantastic model for camping and RV trips, or for emergencies and power outages, and you can get it with or without a solar panel. And now it's 30% off!

IT 75
article thumbnail

What Is a Ticket Validator? Understanding Its Function and Importance in Mass Transit

HID Global

Learn about the importance of automated fare collection in mass transit, including the role of ticket validators and the latest in transit technology.

IT 52
article thumbnail

The most rugged Android I've tested also has a battery that lasts for weeks

Collaboration 2.0

If you need a phone that laughs in the face of inclement weather, the Doogee V Max Plus couldn't be more durable, and has a battery that lasts for weeks at a time.

75
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

The EU AI Act – the countdown begins

Data Protection Report

The EU AI Act was entered into the EU’s statute books on July 12, 2024. A transition period will begin from 1 August when it enters into force. The geographic scope is very broad, with obligations falling on organisations using or involved in the supply of AI in the EU and organisations operating outside the EU where the AI’s output is used in the EU.

article thumbnail

The best AirPods of 2024: Expert tested and reviewed

Collaboration 2.0

Going back to school soon? We've ranked the best AirPods you can buy for studying, tuning into virtual classes, and jamming out to music on those campus walks.

76
article thumbnail

White House Calls for Defending Critical Infrastructure

Data Breach Today

Administration Continues to Shift Software Security Responsibilities to Developers The Biden administration is calling on government agencies and departments to file fiscal year 2026 budget proposals that focus on defending critical infrastructure, dismantling threat actors and investing in resilient federal systems, according to a new memorandum issued this week.

article thumbnail

How to log in to the Bitwarden password manager with a passkey

Collaboration 2.0

Passkeys are the next-gen authentication method for apps, accounts, and services. They're easy to use and more secure than the traditional username and password combination.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Friday Squid Blogging: 1994 Lair of Squid Game

Schneier on Security

I didn’t know : In 1994, Hewlett-Packard released a miracle machine: the HP 200LX pocket-size PC. In the depths of the device, among the MS-DOS productivity apps built into its fixed memory, there lurked a first-person maze game called Lair of Squid. […] In Lair of Squid , you’re trapped in an underwater labyrinth, seeking a way out while avoiding squid roaming the corridors.

article thumbnail

Get an Echo Pop smart speaker for just $18 with this Prime Day deal

Collaboration 2.0

An Echo Pop is the perfect way to add a little pop of Alexa to your life this Prime Day, pun intended.

95
article thumbnail

This Pro-level security camera is unexpectedly impressive and $50 off this Prime Day

Collaboration 2.0

The battery-powered Ring Spotlight Cam Pro has a wide field of view and HDR video support with an extra impressive feature. It's currently $180 as part of Amazon's Prime Day sale.

Sales 95