Remove Article Remove CSO Remove Data breaches Remove Phishing
article thumbnail

Timeline of the latest LastPass data breaches

CSO Magazine

The security incident was the latest to affect the service in recent times in the wake of unauthorized access to its development environment in August last year , serious vulnerabilities in 2017 , a phishing attack in 2016 , and a data breach in 2015. To read this article in full, please click here

article thumbnail

How attackers could exploit breached T-Mobile user data

CSO Magazine

T-Mobile has confirmed a data breach that impacted nearly 50 million people, including current, former and prospective subscribers. Victims of the T-Mobile or any other breach where personal data is stolen should be aware of follow-on attacks and take steps to mitigate them.

Mobile 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attackers use stolen banking data as phishing lure to deploy BitRAT

CSO Magazine

In a case that highlights how attackers can leverage information from data breaches to enhance their attacks, a group of attackers is using customer information stolen from a Colombian bank in phishing attacks with malicious documents, researchers report. Stolen data used to add credibility to future attacks.

Banking 118
article thumbnail

Guardz releases AI-powered phishing protection solution for SMEs, MSPs

CSO Magazine

Cybersecurity vendor Guardz has announced the release of a new AI-powered phishing protection solution to help small- and medium-sized businesses (SMBs) and managed service providers (MSPs) prevent phishing attacks. To read this article in full, please click here

article thumbnail

BrandPost: Why the phishing blame game misses the point

CSO Magazine

Phishing is a big problem that’s getting even bigger as cybercriminals find new ways to hook employees. When they do, and that phishing attack leads to a damaging data breach, who’s at fault? The phishing ‘click this, not that’ contradiction To read this article in full, please click here

article thumbnail

Credential stuffing explained: How to prevent, detect, and defend against it

CSO Magazine

Billions of login credentials have landed in the hands of hackers over the past several years as a result of data breaches. These credentials fuel the underground economy and are used for everything from spam to phishing and account takeovers. Get the latest from CSO by signing up for our newsletters. ]

CSO 119
article thumbnail

ChatGPT Security and Privacy Issues Remain in GPT-4

eSecurity Planet

In March, the company disclosed a data breach that exposed about 1.2% Read next: Top Code Debugging and Code Security Tools Best Third-Party Risk Management (TPRM) Tools eSecurity Planet Editor Paul Shread contributed to this article The post ChatGPT Security and Privacy Issues Remain in GPT-4 appeared first on eSecurityPlanet.