Fri.Jul 12, 2024

article thumbnail

Hackers Steal Phone, SMS Records for Nearly All AT&T Customers

Krebs on Security

AT&T Corp. disclosed today that a new data breach has exposed phone call and text message records for roughly 110 million people — nearly all of its customers. AT&T said it delayed disclosing the incident in response to “national security and public safety concerns,” noting that some of the records included data that could be used to determine where a call was made or text message sent.

article thumbnail

New AT&T data breach exposed call logs of almost all customers

Security Affairs

AT&T disclosed a new data breach that exposed phone call and text message records for approximately 110 million people. AT&T suffered a massive data breach, attackers stole the call logs for approximately 110 million customers, which are almost all of the company’s mobile customers. The stolen data was stolen on a database hosted by the company’s Snowflake , reported Techcrunch quoting an AT&T spokesperson.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AT&T Details Massive Breach of Customers' Call and Text Logs

Data Breach Today

Data Stolen From Snowflake Account; Telco Plans to Notify 110 Million Individuals Attackers have stolen logs of call and text interactions pertaining to nearly every one of AT&T's millions of wireless customers, as well as customers of mobile virtual network operators who use its network, the telecommunications giant warned Friday.

IT 277
article thumbnail

Palo Alto Networks fixed a critical bug in the Expedition tool

Security Affairs

Palo Alto Networks addressed five vulnerabilities impacting its products, including a critical authentication bypass issue. Palo Alto Networks released security updates to address five security flaws impacting its products, the most severe issue, tracked as CVE-2024-5910 (CVSS score: 9.3), is a missing authentication for a critical function in Palo Alto Networks Expedition that can lead to an admin account takeover.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

AT&T Details Massive Breach of Subscribers' Call Logs

Data Breach Today

Ongoing Law Enforcement Investigation Led to Delay in Public Breach Notification Attackers have stolen logs of call and text interactions pertaining to nearly every one of AT&T's millions of wireless customers, as well as customers of mobile virtual network operators who use its network, telecommunications giant warned.

IT 275

More Trending

article thumbnail

How to make the Xfce desktop more user-friendly

Collaboration 2.0

Give these Xfce tweaks a try if you want a lightning-fast desktop operating system that's as user-friendly as possible.

246
246
article thumbnail

The Sweeping Danger of the AT&T Phone Records Breach

WIRED Threat Level

Telecom giant AT&T says a major data breach has exposed the call and text records of “nearly all” of its customers, epitomizing the dire state of data security.

article thumbnail

Get an Echo Pop smart speaker for just $18 with this Prime Day deal

Collaboration 2.0

An Echo Pop is the perfect way to add a little pop of Alexa to your life this Prime Day, pun intended.

242
242
article thumbnail

Gaining Better Visibility Into Medical Devices, IoT, OT

Data Breach Today

The deployment of an asset management platform is helping Main Line Health gain deeper visibility and better security over the 100,000-plus medical devices and IoT gear used throughout the group's multiple hospitals and medical facilities, said CISO Aaron Weismann, who discusses the implementation.

IoT 189
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

The best VPN services of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best VPNs and ranked them based on speed, security, and features, to help protect you as you browse and stream online.

Security 190
article thumbnail

FedNow's First Year: Mixed Bag of Achievements, Challenges

Data Breach Today

New Payment Rail Enrolled 800 FIs, But Transaction Volumes Lag Expectations In July 2023, the U.S. payments industry marked a major milestone with the launch of FedNow, the Federal Reserve's instant payment service for depository institutions. This long-anticipated development promises to revolutionize real-time payments across the country.

182
182
article thumbnail

The best Chromebooks for students in 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best Chromebooks for students that are great for note-taking, videoconferencing, essay writing, and more.

190
190
article thumbnail

ISMG Editors: How Should We Handle Ransomware Code Flaws?

Data Breach Today

Also: Uncertainty in US Cyber, AI Policy; Fake Gen AI That Distributes Malware In the latest weekly update, ISMG editors discussed how the industry should handle ransomware vulnerabilities, the rise of fake generative AI assistants that spread malware, and the implications that recent U.S. Supreme Court decisions could have for cybersecurity and AI regulations.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

The best mobile VPNs of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best mobile VPNs, which combine speed, security, and easy-to-use apps to help protect your iOS and Android devices.

Security 190
article thumbnail

CRYSTALRAY Group Targets 1,500 Organizations in 6 Months

Data Breach Today

Relatively New Threat Actor Uses Open-Source Tools, Focuses on US and China A relatively new threat actor has compromised over 1,500 organizations worldwide since February, using open-source security tools to automate and streamline attack processes. Security researchers have tracked a significant escalation in CRYSTALRAY operations.

Security 173
article thumbnail

The best bone conduction headphones of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best bone conduction headphones to keep you aware of your surroundings while you exercise outside in any environment.

190
190
article thumbnail

The NSA Has a Long-Lost Lecture by Adm. Grace Hopper

Schneier on Security

The NSA has a video recording of a 1982 lecture by Adm. Grace Hopper titled “Future Possibilities: Data, Hardware, Software, and People.” The agency is (so far) refusing to release it. Basically, the recording is in an obscure video format. People at the NSA can’t easily watch it, so they can’t redact it. So they won’t do anything.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The best AirPods of 2024: Expert tested and reviewed

Collaboration 2.0

Going back to school soon? We've ranked the best AirPods you can buy for studying, tuning into virtual classes, and jamming out to music on those campus walks.

190
190
article thumbnail

Let’s stop talking about AI

CGI

Artificial intelligence (AI) has attracted a lot of attention and scrutiny since ChatGPT launched in November 2022. The new features of large language models and the rapid development of new tools and functions since then have sparked a lot of curiosity, the need for AI rules and standards, and a fear that AI will harm humans.

article thumbnail

How open source attracts some of the world's top innovators

Collaboration 2.0

Some of the best and brightest work in open source. Who are these people? How did they get there? Where do they see open source going next?

190
190
article thumbnail

What Is Cloud Database Security? Types, Best Practices & Tools

eSecurity Planet

Cloud database security refers to the set of techniques and procedures used to shield cloud-based storage from malicious or unintentional attacks. It safeguards data by authenticating users and devices, controlling access to data and resources, and following regulatory requirements. This security approach protects against common threats like data breaches, DDoS assaults, viruses, hackers, and unauthorized access in cloud environments.

Cloud 72
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

One of the most versatile power stations I've tested is $450 off right now on Amazon

Collaboration 2.0

The Bluetti AC180 delivers up to 1800W of output, with 11 ports for ultimate flexibility. And now there's a massive 45% slashed off the price!

190
190
article thumbnail

CIO.com: NetSuite EDI integration made easy, fast, and affordable

OpenText Information Management

For businesses using Oracle NetSuite as their ERP, managing Electronic Data Interchange (EDI) data transfers can be a complex and time-consuming process. Manually entering data, dealing with errors, and jumping from one system to the next creates bottlenecks slows you down if you don't integrate NetSuite adequately. But what if there was a way to seamlessly integrate EDI with NetSuite, improve data visibility, and streamline your entire operation?

Retail 64
article thumbnail

How to use ChatGPT to digitize your handwritten notes for free

Collaboration 2.0

This is easily the most underrated GPT-4o feature.

190
190
article thumbnail

Replaying an attack with OpenText NDR

OpenText Information Management

In Network Detection and Response (NDR) related operations, there is often a need to replay a Packet Capture (PCAP) data stream. The reasons can be multiple including verifying operation of supplied detections against known traffic, gathering evidence of an attack where no detections were available, or using PCAP samples to write broader detections.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The 10 best Prime Day 2024 fitness tracker deals

Collaboration 2.0

Amazon Prime Day is quickly approaching, and if you're ready to start tracking your sleep, activity, and heart rate, these are the best fitness tracker deals available.

189
189
article thumbnail

What Is a Ticket Validator? Understanding Its Function and Importance in Mass Transit

HID Global

Learn about the importance of automated fare collection in mass transit, including the role of ticket validators and the latest in transit technology.

IT 52
article thumbnail

The most rugged Android I've tested also has a battery that lasts for weeks

Collaboration 2.0

If you need a phone that laughs in the face of inclement weather, the Doogee V Max Plus couldn't be more durable, and has a battery that lasts for weeks at a time.

189
189