Remove 2018 Remove Data breaches Remove Identity Theft Remove Social Engineering
article thumbnail

Data Breach: Turkish legal advising company exposed over 15,000 clients

Security Affairs

Data Breach: WizCase team uncovered a massive data leak containing private information about Turkish Citizens through a misconfigured Amazon S3 bucket. How Did the Data Breach Happen? Whose Data was Exposed and What Are the Consequences. Identity theft. How and Why We Discovered the Breach.

article thumbnail

ROUNDTABLE: Why T-Mobile’s latest huge data breach could fuel attacks directed at mobile devices

The Last Watchdog

TMobile has now issued a formal apology and offered free identity theft recovery services to nearly 48 million customers for whom the telecom giant failed to protect their sensitive personal information. For T-Mobile, this is the sixth major breach since 2018. Related: Kaseya hack worsens supply chain risk.

Mobile 306
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 Industries Most Vulnerable to Data Breaches in 2023

Security Boulevard

Unfortunately, the increasing reliance on digital systems and capabilities has also attracted an ever-growing number of malicious actors seeking to defraud businesses through phishing , social engineering , or ransomware attacks. The end result of these types of cyber attacks are often highly public and damaging data breaches.

article thumbnail

T-Mobile customers were hit with SIM swapping attacks

Security Affairs

The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM swap attacks. The telecommunications provider T-Mobile has disclosed a data breach after it became aware that some of its customers were allegedly victims of SIM swap attacks. Pierluigi Paganini.

Mobile 114
article thumbnail

You’ve Never Heard of the C-Suite Targeting Scam, but It’s a Killer

Adam Levin

With the W2 variety, a citizen of the c-suite requests all the W2s from human resources or accounting–thereby collecting a rich file of personally identifiable information that can be used to commit tax-related fraud as well as all stripe of identity theft. So Isn’t BEC Just Another Form of Phishing?

Scams 130
article thumbnail

Online marketing company exposes 38+ million US citizen records

Security Affairs

The statement of work documents for marketing campaigns date between 2018 and 2019: Who owns the bucket? What happened to the data? Most of the CSV files contain user records for what we assume to be target demographics for either digital or physical marketing materials.

Marketing 104
article thumbnail

350 million decrypted email addresses left exposed on an unsecured server

Security Affairs

The timeline of uploads might indicate that these emails have been either stolen or acquired on the black market back in October 2018 , and then gradually decrypted by the owner of the bucket. Who had access?