Fri.Jul 12, 2024

article thumbnail

Hackers Steal Phone, SMS Records for Nearly All AT&T Customers

Krebs on Security

AT&T Corp. disclosed today that a new data breach has exposed phone call and text message records for roughly 110 million people — nearly all of its customers. AT&T said it delayed disclosing the incident in response to “national security and public safety concerns,” noting that some of the records included data that could be used to determine where a call was made or text message sent.

article thumbnail

AT&T Details Massive Breach of Subscribers' Call Logs

Data Breach Today

Ongoing Law Enforcement Investigation Led to Delay in Public Breach Notification Attackers have stolen logs of call and text interactions pertaining to nearly every one of AT&T's millions of wireless customers, as well as customers of mobile virtual network operators who use its network, telecommunications giant warned.

IT 268
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New AT&T data breach exposed call logs of almost all customers

Security Affairs

AT&T disclosed a new data breach that exposed phone call and text message records for approximately 110 million people. AT&T suffered a massive data breach, attackers stole the call logs for approximately 110 million customers, which are almost all of the company’s mobile customers. The stolen data was stolen on a database hosted by the company’s Snowflake , reported Techcrunch quoting an AT&T spokesperson.

article thumbnail

AT&T Details Massive Breach of Customers' Call and Text Logs

Data Breach Today

Data Stolen From Snowflake Account; Telco Plans to Notify 110 Million Individuals Attackers have stolen logs of call and text interactions pertaining to nearly every one of AT&T's millions of wireless customers, as well as customers of mobile virtual network operators who use its network, the telecommunications giant warned Friday.

IT 252
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Palo Alto Networks fixed a critical bug in the Expedition tool

Security Affairs

Palo Alto Networks addressed five vulnerabilities impacting its products, including a critical authentication bypass issue. Palo Alto Networks released security updates to address five security flaws impacting its products, the most severe issue, tracked as CVE-2024-5910 (CVSS score: 9.3), is a missing authentication for a critical function in Palo Alto Networks Expedition that can lead to an admin account takeover.

More Trending

article thumbnail

The NSA Has a Long-Lost Lecture by Adm. Grace Hopper

Schneier on Security

The NSA has a video recording of a 1982 lecture by Adm. Grace Hopper titled “Future Possibilities: Data, Hardware, Software, and People.” The agency is (so far) refusing to release it. Basically, the recording is in an obscure video format. People at the NSA can’t easily watch it, so they can’t redact it. So they won’t do anything.

article thumbnail

FedNow's First Year: Mixed Bag of Achievements, Challenges

Data Breach Today

New Payment Rail Enrolled 800 FIs, But Transaction Volumes Lag Expectations In July 2023, the U.S. payments industry marked a major milestone with the launch of FedNow, the Federal Reserve's instant payment service for depository institutions. This long-anticipated development promises to revolutionize real-time payments across the country.

182
182
article thumbnail

Let’s stop talking about AI

CGI

Artificial intelligence (AI) has attracted a lot of attention and scrutiny since ChatGPT launched in November 2022. The new features of large language models and the rapid development of new tools and functions since then have sparked a lot of curiosity, the need for AI rules and standards, and a fear that AI will harm humans.

article thumbnail

ISMG Editors: How Should We Handle Ransomware Code Flaws?

Data Breach Today

Also: Uncertainty in US Cyber, AI Policy; Fake Gen AI That Distributes Malware In the latest weekly update, ISMG editors discussed how the industry should handle ransomware vulnerabilities, the rise of fake generative AI assistants that spread malware, and the implications that recent U.S. Supreme Court decisions could have for cybersecurity and AI regulations.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Sweeping Danger of the AT&T Phone Records Breach

WIRED Threat Level

Telecom giant AT&T says a major data breach has exposed the call and text records of “nearly all” of its customers, epitomizing the dire state of data security.

article thumbnail

CRYSTALRAY Group Targets 1,500 Organizations in 6 Months

Data Breach Today

Relatively New Threat Actor Uses Open-Source Tools, Focuses on US and China A relatively new threat actor has compromised over 1,500 organizations worldwide since February, using open-source security tools to automate and streamline attack processes. Security researchers have tracked a significant escalation in CRYSTALRAY operations.

Security 173
article thumbnail

How to make the Xfce desktop more user-friendly

Collaboration 2.0

Give these Xfce tweaks a try if you want a lightning-fast desktop operating system that's as user-friendly as possible.

98
article thumbnail

What Is Cloud Database Security? Types, Best Practices & Tools

eSecurity Planet

Cloud database security refers to the set of techniques and procedures used to shield cloud-based storage from malicious or unintentional attacks. It safeguards data by authenticating users and devices, controlling access to data and resources, and following regulatory requirements. This security approach protects against common threats like data breaches, DDoS assaults, viruses, hackers, and unauthorized access in cloud environments.

Cloud 70
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Get an Echo Pop smart speaker for just $18 with this Prime Day deal

Collaboration 2.0

An Echo Pop is the perfect way to add a little pop of Alexa to your life this Prime Day, pun intended.

97
article thumbnail

CIO.com: NetSuite EDI integration made easy, fast, and affordable

OpenText Information Management

For businesses using Oracle NetSuite as their ERP, managing Electronic Data Interchange (EDI) data transfers can be a complex and time-consuming process. Manually entering data, dealing with errors, and jumping from one system to the next creates bottlenecks slows you down if you don't integrate NetSuite adequately. But what if there was a way to seamlessly integrate EDI with NetSuite, improve data visibility, and streamline your entire operation?

Retail 64
article thumbnail

Get early access to Apple Vision Pro apps using TestFlight - here's how

Collaboration 2.0

Stay ahead of the curve with the latest updates and beta-test new apps effortlessly. Follow my step-by-step walkthrough for installing and using TestFlight on Apple's XR headset.

Access 75
article thumbnail

Replaying an attack with OpenText NDR

OpenText Information Management

In Network Detection and Response (NDR) related operations, there is often a need to replay a Packet Capture (PCAP) data stream. The reasons can be multiple including verifying operation of supplied detections against known traffic, gathering evidence of an attack where no detections were available, or using PCAP samples to write broader detections.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

This Pro-level security camera is unexpectedly impressive and $50 off this Prime Day

Collaboration 2.0

The battery-powered Ring Spotlight Cam Pro has a wide field of view and HDR video support with an extra impressive feature. It's currently $180 as part of Amazon's Prime Day sale.

Sales 97
article thumbnail

What Is a Ticket Validator? Understanding Its Function and Importance in Mass Transit

HID Global

Learn about the importance of automated fare collection in mass transit, including the role of ticket validators and the latest in transit technology.

IT 52
article thumbnail

The battery-powered Arlo Pro 5S 2K outdoor camera is down 52% for Prime Day

Collaboration 2.0

The Arlo Pro 5S 2K captures outdoor movement near-instantly, but brand-exclusive features make it harder to recommend to everyone. This $120 deal could make anyone change their mind.

IT 98
article thumbnail

The EU AI Act – the countdown begins

Data Protection Report

The EU AI Act was entered into the EU’s statute books on July 12, 2024. A transition period will begin from 1 August when it enters into force. The geographic scope is very broad, with obligations falling on organisations using or involved in the supply of AI in the EU and organisations operating outside the EU where the AI’s output is used in the EU.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

The Jackery Explorer 1000 is one of the best portable power stations you can buy, and it's now $840

Collaboration 2.0

This Jackery portable power station is a fantastic model for camping and RV trips, or for emergencies and power outages, and you can get it with or without a solar panel. And now it's 30% off!

IT 75
article thumbnail

Critical flaw in Exim MTA could allow to deliver malware to users’ inboxes

Security Affairs

A critical vulnerability in Exim mail server allows attackers to deliver malicious executable attachments to mailboxes. Attackers can exploit a critical security flaw, tracked as CVE-2024-39929 (CVSS score of 9.1), in the Exim mail transfer agent to deliver malicious attachments to target users’ inboxes. Exim is a widely used Mail Transfer Agent (MTA) designed to route, deliver, and receive email messages.

Security 127
article thumbnail

How to log in to the Bitwarden password manager with a passkey

Collaboration 2.0

Passkeys are the next-gen authentication method for apps, accounts, and services. They're easy to use and more secure than the traditional username and password combination.

article thumbnail

White House Calls for Defending Critical Infrastructure

Data Breach Today

Administration Continues to Shift Software Security Responsibilities to Developers The Biden administration is calling on government agencies and departments to file fiscal year 2026 budget proposals that focus on defending critical infrastructure, dismantling threat actors and investing in resilient federal systems, according to a new memorandum issued this week.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Wake up gently with this sunrise alarm clock that's $30 off ahead of Prime Day

Collaboration 2.0

The Hatch Restore 2 builds on the success of the original sunrise alarm clock with improved speakers, audio tracks, and 'Morning Moments' - and it's 15% off for Prime Day.

IT 75
article thumbnail

Friday Squid Blogging: 1994 Lair of Squid Game

Schneier on Security

I didn’t know : In 1994, Hewlett-Packard released a miracle machine: the HP 200LX pocket-size PC. In the depths of the device, among the MS-DOS productivity apps built into its fixed memory, there lurked a first-person maze game called Lair of Squid. […] In Lair of Squid , you’re trapped in an underwater labyrinth, seeking a way out while avoiding squid roaming the corridors.

article thumbnail

One of the best robot vacuums I've tested is $340 with this Prime Day deal

Collaboration 2.0

With its tangle-free design and precision obstacle avoidance, the Freo X Plus is one of the best robot vacuum options available, especially with this Prime Day discount.

IT 75