Remove Accountability Remove CSO Remove Data breaches
article thumbnail

T-Mobile, Uber Settle Data Breach Incidents

SecureWorld News

Data breaches can be quite a complicated issue for organizations. Disclose the breach, notify those affected, and talk with your security team about how to prevent a similar incident from happening in the future. T-Mobile data breach. The company disclosed the data breach quickly after discovering it.

article thumbnail

Uber CSO Found Guilty: The Sky Is Not Falling. Yet

SecureWorld News

This week, the former Chief Security Officer of Uber, Joseph Sullivan, was found guilty on one count of obstruction of justice and one count of misprison, the act of concealing a felony from authorities, arising out of his handling of a 2016 data breach at the company.

CSO 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Uber responding to “cybersecurity incident” following reports of significant data breach

CSO Magazine

Ride-hailing giant Uber has confirmed that it is responding to a cybersecurity incident as reports emerge that the firm has suffered a significant network data breach forcing it to shut down several internal communications and engineering systems. Attacker announces Uber breach through compromised Slack account.

article thumbnail

Credential stuffing explained: How to prevent, detect, and defend against it

CSO Magazine

Credential stuffing is the automated use of collected usernames and passwords to gain fraudulent access to user accounts. Billions of login credentials have landed in the hands of hackers over the past several years as a result of data breaches. Get the latest from CSO by signing up for our newsletters. ]

CSO 119
article thumbnail

4 ways cybercriminals hide credential stuffing attacks

CSO Magazine

Credential stuffing is a cyberattack in which exposed usernames and passwords are used to gain fraudulent access to user accounts through large-scale, automated login requests. Attackers are asking: What does it look like to make a legitimate request? How can we emulate that?

CSO 130
article thumbnail

A Clear and Present Need: Bolster Your Identity Security with Threat Detection and Response

Duo's Security Blog

“It took nearly 11 months (328 days) to identity and contain data breaches resulting from stolen or compromised credentials.” – IBM’s Cost of Data Breach Report 2023 I recently came across a 2012 article from CSO Online , and realized that it has been more than 11 years since the phrase “Identity is the new perimeter” was coined!

article thumbnail

Security Roundup April 2025

BH Consulting

Third-party risk rises as a factor in breaches: Verizon DBIR 2025 Verizons latest annual Data Breach Investigations Report (DBIR) shows some concerning trends with a sharp escalation in global cyber threats. Landed earlier than usual, the 2025 edition found that 30 per cent of breaches involved third-parties, doubling from 2024.