Remove CSO Remove Data breaches Remove Phishing
article thumbnail

Security Roundup April 2025

BH Consulting

Third-party risk rises as a factor in breaches: Verizon DBIR 2025 Verizons latest annual Data Breach Investigations Report (DBIR) shows some concerning trends with a sharp escalation in global cyber threats. Landed earlier than usual, the 2025 edition found that 30 per cent of breaches involved third-parties, doubling from 2024.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Sophisticated social engineering tactics, phishing campaigns, or financial incentives make it easier for cybercriminals to use insiders as tools for gaining access and maintaining their foothold in systems rather than hacking in. Cyber threats often exploit human errors, whether through phishing attacks, weak passwords, or lapses in protocol.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How attackers could exploit breached T-Mobile user data

CSO Magazine

T-Mobile has confirmed a data breach that impacted nearly 50 million people, including current, former and prospective subscribers. Victims of the T-Mobile or any other breach where personal data is stolen should be aware of follow-on attacks and take steps to mitigate them.

Mobile 144
article thumbnail

Timeline of the latest LastPass data breaches

CSO Magazine

The security incident was the latest to affect the service in recent times in the wake of unauthorized access to its development environment in August last year , serious vulnerabilities in 2017 , a phishing attack in 2016 , and a data breach in 2015. To read this article in full, please click here

article thumbnail

Credential stuffing explained: How to prevent, detect, and defend against it

CSO Magazine

Billions of login credentials have landed in the hands of hackers over the past several years as a result of data breaches. These credentials fuel the underground economy and are used for everything from spam to phishing and account takeovers. Get the latest from CSO by signing up for our newsletters. ]

CSO 119
article thumbnail

Attackers use stolen banking data as phishing lure to deploy BitRAT

CSO Magazine

In a case that highlights how attackers can leverage information from data breaches to enhance their attacks, a group of attackers is using customer information stolen from a Colombian bank in phishing attacks with malicious documents, researchers report. Stolen data used to add credibility to future attacks.

Banking 118
article thumbnail

Survey: Alarming Number of IT Professionals Told to Conceal Breaches

SecureWorld News

Imagine your company experienced a major data breach, but instead of notifying the appropriate parties and taking necessary actions, you were instructed to keep it quiet! was also leading the list in terms of the percentage of respondents who claimed they'd been told to keep a breach concealed (71%).