Remove CSO Remove Data breaches Remove Phishing Remove Risk
article thumbnail

How attackers could exploit breached T-Mobile user data

CSO Magazine

T-Mobile has confirmed a data breach that impacted nearly 50 million people, including current, former and prospective subscribers. The exposed details differed across different types of customers, so the level of risk users are exposed to varies. To read this article in full, please click here

Mobile 144
article thumbnail

Survey: Alarming Number of IT Professionals Told to Conceal Breaches

SecureWorld News

Imagine your company experienced a major data breach, but instead of notifying the appropriate parties and taking necessary actions, you were instructed to keep it quiet! was also leading the list in terms of the percentage of respondents who claimed they'd been told to keep a breach concealed (71%).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Uber Data Exposed After Law Firm's Breach

SecureWorld News

Uber has suffered yet another data breach after a third-party law firm's servers were attacked. The law firm, Genova Burns, which provides legal counsel to Uber, has notified an unknown number of its drivers that sensitive data has been exposed and stolen due to a cyberattack.

article thumbnail

Uber data stolen via third-party vendor

Malwarebytes

Attack dates against Teqtivity and Uber have yet to be established; however, a threat actor named "UberLeaks" began leaking the stolen data on BreachForums, a site infamous for posting data breaches, around early Saturday morning, according to BleepingComputer. UberLeaks claimed the data came from Uber and Uber Eats.

article thumbnail

Security Roundup October 2023

BH Consulting

It found the most common intrusion tactics are phishing emails containing malware, Remote Desktop Protocol (RDP) brute forcing, and exploiting Virtual Private Network (VPN) vulnerabilities. Data protection and privacy developments Local and international news takes the stage here. MORE Have you signed up to our monthly newsletter?

article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

That’s how they’re going to transfer data in, hopefully, a secure channel to pass information back and forth with each other.”. However, APIs are also more frequently the source of data breaches and other cyber incidents. No one really knows exactly how many APIs are out there. And that’s just one phone. Postal Service.

article thumbnail

ChatGPT Security and Privacy Issues Remain in GPT-4

eSecurity Planet

In March, the company disclosed a data breach that exposed about 1.2% In the last 6 months alone, we’ve seen over 17,000 open-source packages with malicious code risk. There’s also the problem of company employees using sensitive data with generative AI systems. Every company is susceptible to these attacks.”