Fri.Jul 12, 2024

article thumbnail

Hackers Steal Phone, SMS Records for Nearly All AT&T Customers

Krebs on Security

AT&T Corp. disclosed today that a new data breach has exposed phone call and text message records for roughly 110 million people — nearly all of its customers. AT&T said it delayed disclosing the incident in response to “national security and public safety concerns,” noting that some of the records included data that could be used to determine where a call was made or text message sent.

article thumbnail

AT&T Details Massive Breach of Customers' Call and Text Logs

Data Breach Today

Data Stolen From Snowflake Account; Telco Plans to Notify 110 Million Individuals Attackers have stolen logs of call and text interactions pertaining to nearly every one of AT&T's millions of wireless customers, as well as customers of mobile virtual network operators who use its network, the telecommunications giant warned Friday.

IT 277
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Sweeping Danger of the AT&T Phone Records Breach

WIRED Threat Level

Telecom giant AT&T says a major data breach has exposed the call and text records of “nearly all” of its customers, epitomizing the dire state of data security.

article thumbnail

AT&T Details Massive Breach of Subscribers' Call Logs

Data Breach Today

Ongoing Law Enforcement Investigation Led to Delay in Public Breach Notification Attackers have stolen logs of call and text interactions pertaining to nearly every one of AT&T's millions of wireless customers, as well as customers of mobile virtual network operators who use its network, telecommunications giant warned.

IT 275
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

New AT&T data breach exposed call logs of almost all customers

Security Affairs

AT&T disclosed a new data breach that exposed phone call and text message records for approximately 110 million people. AT&T suffered a massive data breach, attackers stole the call logs for approximately 110 million customers, which are almost all of the company’s mobile customers. The stolen data was stolen on a database hosted by the company’s Snowflake , reported Techcrunch quoting an AT&T spokesperson.

More Trending

article thumbnail

Palo Alto Networks fixed a critical bug in the Expedition tool

Security Affairs

Palo Alto Networks addressed five vulnerabilities impacting its products, including a critical authentication bypass issue. Palo Alto Networks released security updates to address five security flaws impacting its products, the most severe issue, tracked as CVE-2024-5910 (CVSS score: 9.3), is a missing authentication for a critical function in Palo Alto Networks Expedition that can lead to an admin account takeover.

article thumbnail

FedNow's First Year: Mixed Bag of Achievements, Challenges

Data Breach Today

New Payment Rail Enrolled 800 FIs, But Transaction Volumes Lag Expectations In July 2023, the U.S. payments industry marked a major milestone with the launch of FedNow, the Federal Reserve's instant payment service for depository institutions. This long-anticipated development promises to revolutionize real-time payments across the country.

182
182
article thumbnail

The NSA Has a Long-Lost Lecture by Adm. Grace Hopper

Schneier on Security

The NSA has a video recording of a 1982 lecture by Adm. Grace Hopper titled “Future Possibilities: Data, Hardware, Software, and People.” The agency is (so far) refusing to release it. Basically, the recording is in an obscure video format. People at the NSA can’t easily watch it, so they can’t redact it. So they won’t do anything.

article thumbnail

ISMG Editors: How Should We Handle Ransomware Code Flaws?

Data Breach Today

Also: Uncertainty in US Cyber, AI Policy; Fake Gen AI That Distributes Malware In the latest weekly update, ISMG editors discussed how the industry should handle ransomware vulnerabilities, the rise of fake generative AI assistants that spread malware, and the implications that recent U.S. Supreme Court decisions could have for cybersecurity and AI regulations.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to make the Xfce desktop more user-friendly

Collaboration 2.0

Give these Xfce tweaks a try if you want a lightning-fast desktop operating system that's as user-friendly as possible.

98
article thumbnail

CRYSTALRAY Group Targets 1,500 Organizations in 6 Months

Data Breach Today

Relatively New Threat Actor Uses Open-Source Tools, Focuses on US and China A relatively new threat actor has compromised over 1,500 organizations worldwide since February, using open-source security tools to automate and streamline attack processes. Security researchers have tracked a significant escalation in CRYSTALRAY operations.

Security 173
article thumbnail

Let’s stop talking about AI

CGI

Artificial intelligence (AI) has attracted a lot of attention and scrutiny since ChatGPT launched in November 2022. The new features of large language models and the rapid development of new tools and functions since then have sparked a lot of curiosity, the need for AI rules and standards, and a fear that AI will harm humans.

article thumbnail

Get an Echo Pop smart speaker for just $18 with this Prime Day deal

Collaboration 2.0

An Echo Pop is the perfect way to add a little pop of Alexa to your life this Prime Day, pun intended.

97
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

What Is Cloud Database Security? Types, Best Practices & Tools

eSecurity Planet

Cloud database security refers to the set of techniques and procedures used to shield cloud-based storage from malicious or unintentional attacks. It safeguards data by authenticating users and devices, controlling access to data and resources, and following regulatory requirements. This security approach protects against common threats like data breaches, DDoS assaults, viruses, hackers, and unauthorized access in cloud environments.

Cloud 71
article thumbnail

The best VPN services of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best VPNs and ranked them based on speed, security, and features, to help protect you as you browse and stream online.

article thumbnail

CIO.com: NetSuite EDI integration made easy, fast, and affordable

OpenText Information Management

For businesses using Oracle NetSuite as their ERP, managing Electronic Data Interchange (EDI) data transfers can be a complex and time-consuming process. Manually entering data, dealing with errors, and jumping from one system to the next creates bottlenecks slows you down if you don't integrate NetSuite adequately. But what if there was a way to seamlessly integrate EDI with NetSuite, improve data visibility, and streamline your entire operation?

Retail 64
article thumbnail

The best Chromebooks for students in 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best Chromebooks for students that are great for note-taking, videoconferencing, essay writing, and more.

76
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Replaying an attack with OpenText NDR

OpenText Information Management

In Network Detection and Response (NDR) related operations, there is often a need to replay a Packet Capture (PCAP) data stream. The reasons can be multiple including verifying operation of supplied detections against known traffic, gathering evidence of an attack where no detections were available, or using PCAP samples to write broader detections.

article thumbnail

The best mobile VPNs of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best mobile VPNs, which combine speed, security, and easy-to-use apps to help protect your iOS and Android devices.

article thumbnail

What Is a Ticket Validator? Understanding Its Function and Importance in Mass Transit

HID Global

Learn about the importance of automated fare collection in mass transit, including the role of ticket validators and the latest in transit technology.

IT 52
article thumbnail

The best bone conduction headphones of 2024: Expert tested and reviewed

Collaboration 2.0

We tested the best bone conduction headphones to keep you aware of your surroundings while you exercise outside in any environment.

76
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The EU AI Act – the countdown begins

Data Protection Report

The EU AI Act was entered into the EU’s statute books on July 12, 2024. A transition period will begin from 1 August when it enters into force. The geographic scope is very broad, with obligations falling on organisations using or involved in the supply of AI in the EU and organisations operating outside the EU where the AI’s output is used in the EU.

article thumbnail

The best AirPods of 2024: Expert tested and reviewed

Collaboration 2.0

Going back to school soon? We've ranked the best AirPods you can buy for studying, tuning into virtual classes, and jamming out to music on those campus walks.

76
article thumbnail

Critical flaw in Exim MTA could allow to deliver malware to users’ inboxes

Security Affairs

A critical vulnerability in Exim mail server allows attackers to deliver malicious executable attachments to mailboxes. Attackers can exploit a critical security flaw, tracked as CVE-2024-39929 (CVSS score of 9.1), in the Exim mail transfer agent to deliver malicious attachments to target users’ inboxes. Exim is a widely used Mail Transfer Agent (MTA) designed to route, deliver, and receive email messages.

Security 134
article thumbnail

How open source attracts some of the world's top innovators

Collaboration 2.0

Some of the best and brightest work in open source. Who are these people? How did they get there? Where do they see open source going next?

76
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

White House Calls for Defending Critical Infrastructure

Data Breach Today

Administration Continues to Shift Software Security Responsibilities to Developers The Biden administration is calling on government agencies and departments to file fiscal year 2026 budget proposals that focus on defending critical infrastructure, dismantling threat actors and investing in resilient federal systems, according to a new memorandum issued this week.

article thumbnail

One of the most versatile power stations I've tested is $450 off right now on Amazon

Collaboration 2.0

The Bluetti AC180 delivers up to 1800W of output, with 11 ports for ultimate flexibility. And now there's a massive 45% slashed off the price!

76
article thumbnail

Friday Squid Blogging: 1994 Lair of Squid Game

Schneier on Security

I didn’t know : In 1994, Hewlett-Packard released a miracle machine: the HP 200LX pocket-size PC. In the depths of the device, among the MS-DOS productivity apps built into its fixed memory, there lurked a first-person maze game called Lair of Squid. […] In Lair of Squid , you’re trapped in an underwater labyrinth, seeking a way out while avoiding squid roaming the corridors.