article thumbnail

T-Mobile, Uber Settle Data Breach Incidents

SecureWorld News

Data breaches can be quite a complicated issue for organizations. Disclose the breach, notify those affected, and talk with your security team about how to prevent a similar incident from happening in the future. T-Mobile data breach. The company disclosed the data breach quickly after discovering it.

article thumbnail

Uber responding to “cybersecurity incident” following reports of significant data breach

CSO Magazine

Ride-hailing giant Uber has confirmed that it is responding to a cybersecurity incident as reports emerge that the firm has suffered a significant network data breach forcing it to shut down several internal communications and engineering systems. Attacker announces Uber breach through compromised Slack account.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Uber CSO Found Guilty: The Sky Is Not Falling. Yet

SecureWorld News

This week, the former Chief Security Officer of Uber, Joseph Sullivan, was found guilty on one count of obstruction of justice and one count of misprison, the act of concealing a felony from authorities, arising out of his handling of a 2016 data breach at the company.

CSO 72
article thumbnail

From Compliance to Resilience: Cyber Governance as the Cornerstone of CISO Strategy

SecureWorld News

They now face the risk of being implicated in criminal investigations or held accountable for security breaches, as evidenced by cases like that of Joe Sullivan, the former Chief Security Officer of Uber, who was sentenced to three years' probation for covering up a data breach involving millions of Uber user records.

CISO 73
article thumbnail

Credential stuffing explained: How to prevent, detect, and defend against it

CSO Magazine

Credential stuffing is the automated use of collected usernames and passwords to gain fraudulent access to user accounts. Billions of login credentials have landed in the hands of hackers over the past several years as a result of data breaches. Get the latest from CSO by signing up for our newsletters. ]

CSO 119
article thumbnail

4 ways cybercriminals hide credential stuffing attacks

CSO Magazine

Credential stuffing is a cyberattack in which exposed usernames and passwords are used to gain fraudulent access to user accounts through large-scale, automated login requests. Attackers are asking: What does it look like to make a legitimate request? How can we emulate that?

CSO 130
article thumbnail

Okta revealed that its private GitHub repositories were hacked this month

Security Affairs

.” The security breach was discovered by GitHub earlier this month when the company noticed suspicious access to Okta’s code repositories. “Upon investigation, we have concluded that such access was used to copy Okta code repositories,” writes David Bradbury, the Okta Chief Security Officer (CSO) in the mail.

Hacking 100