article thumbnail

T-Mobile data breach: CPNI (Customer Proprietary Network Information) exposed

Security Affairs

T-Mobile discovered that the attackers had access to the CPNI (Customer Proprietary Network Information). Customer proprietary network information (CPNI) is the data collected by telecommunications companies about a consumer’s telephone calls. Pierluigi Paganini. SecurityAffairs – hacking, T-Mobile).

article thumbnail

Security Affairs newsletter Round 297

Security Affairs

Every week the best security articles from Security Affairs free for you in your email box.

Banking 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 304

Security Affairs

jailbreaking tool Attackers took over the Perl.com domain in September 2020 Bug bounty hunter awarded $50,000 for a Microsoft account hijack flaw Clop ransomware gang leaks data allegedly stolen from cybersecurity firm Qualys Cyber Defense Magazine – March 2021 has arrived.

article thumbnail

Security Affairs - Untitled Article

Security Affairs

Yesterday a worrying news made the headlines, the Kudankulam Nuclear Power Plant (KKNPP) was hit by a cyber attack. Attached pic is data collection from #KKNPP #Dtrack malware (a few other bits not pictured). Any cyber-attack on the Nuclear Power Plant Control System is not possible,” the statement stated categorically.

Malware 53
article thumbnail

33.4% of ICS computers hit by a cyber attack in H2 2020

Security Affairs

H2 2020 – Kaspersky observed an increase in ransomware attacks on industrial control system (ICS) systems in developed countries. The data analyzed by the experts were received from ICS computers, running Kaspersky security products, that are hosted in networks of industrial infrastructures. than in 2019). The post 33.4%

article thumbnail

Unleashing the Power of a Security Data Lake

SecureWorld News

The concept of a Security Data Lake, a type of Data Lake explicitly designed for information security, has not received much attention yet. However, this is not your ordinary data storage solution. It can potentially bring a company's security to the next level.

article thumbnail

DCAP Systems: Protecting Your Data with Advanced Technology

SecureWorld News

Huge arrays of unstructured data utilized and modified by many users as well as the ever-growing complexity of attacks, lead to the fact that the usual means of protecting the perimeter of a corporate network no longer meet current information security requirements. What is Data-Centric Audit and Protection?