Mon.Aug 16, 2021

article thumbnail

T-Mobile USA Investigates Possible Data Breach

Data Breach Today

Group Claims GGSN Misconfiguration Led to 100 Million User Accounts T-Mobile USA says it is investigating a claim that as many as 100 million accounts may have been compromised in a data breach. The person who claims responsibility for the alleged breach says T-Mobile misconfigured a Gateway GPRS Support Node.

article thumbnail

T-Mobile Investigating Claims of Massive Data Breach

Krebs on Security

Communications giant T-Mobile said today it is investigating the extent of a breach that hackers claim has exposed sensitive personal data on 100 million T-Mobile USA customers, in many cases including the name, Social Security number, address, date of birth, phone number, security PINs and details that uniquely identify each customer’s mobile device.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Memorial Health System in Ohio Latest Entity Hit With Attack

Data Breach Today

Hospitals Diverting ER Patients to Other Area Facilities Memorial Health System in Ohio is the latest healthcare entity hit with an apparent ransomware incident that is disrupting patient care services.

article thumbnail

What Are the Cyber Security Challenges of Hybrid Working?

IT Governance

When it comes to the ideal post-pandemic work environment, employers and employees and have very different ideas. According to a Microsoft study , 73% of workers want to keep the flexible work arrangements created in response to COVID-19, and 67% want a return to in-person collaboration.

Security 132
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Microsoft Details Yearlong Office 365 Phishing Campaign

Data Breach Today

Researchers Found Hackers Deploying Morse Code to Help Evade Detection A yearlong phishing campaign used various techniques to help evade security tools while attempting to harvest the credentials of Office 365 users, according to Microsoft researchers. In some cases, the attackers even used Morse code to help avoid detection.

Phishing 293

More Trending

article thumbnail

Colonial Pipeline: Attack Exposed Personal Data

Data Breach Today

Company Says Employees' Personal Data Compromised The ransomware attack that targeted Colonial Pipeline Co. in May compromised the personal information of more than 5,800 individuals, mainly current and former employees, according to a breach notification letter.

article thumbnail

T-Mobile confirms data breach that exposed customer personal info

Security Affairs

T-Mobile confirms a breach after threat actors claimed to have obtained records of 100 million of its customers and offered them for sale. T-Mobile has confirmed a data breach that exposed personal information from over 100 million of its US customers. Yesterday the company announced it launched an investigation into a possible data breach after a threat actor published a post on a forum claiming to be selling the personal data of its customers.

article thumbnail

Binance Ordered to Freeze Attackers' Accounts

Data Breach Today

London High Court's Decision Comes After Fetch.ai's Binance Accounts Accessed The London High Court has ordered the cryptocurrency exchange Binance to attempt to identify and freeze accounts belonging to the attackers who allegedly stole about $2.6 million from U.K.-based Fetch.ai.

Access 215
article thumbnail

US FINRA warns US brokerage firms and brokers of ongoing phishing attacks

Security Affairs

The US FINRA warns US brokerage firms and brokers of an ongoing phishing campaign impersonating its representatives to steal sensitive info. The US Financial Industry Regulatory Authority (FINRA) is warning US brokerage firms and brokers of an ongoing phishing campaign. Threat actors are impersonating FINRA officials and are using the threat of penalties to trick victims recipients into providing sensitive information.

Phishing 112
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FFIEC Updates Authentication Guidance

Data Breach Today

Stresses Need for MFA, Stronger Access Controls The FFIEC has issued updated guidance advising banks to use stronger access controls and multifactor authentication. Some experts call the update "long overdue.

article thumbnail

XSS Bug in SEOPress WordPress Plugin Allows Site Takeover

Threatpost

The bug would allow a number of malicious actions, up to and including full site takeover. The vulnerable plugin is installed on 100,000 websites.

Security 122
article thumbnail

FINRA Warns Members of Phishing Scheme

Data Breach Today

Fraudsters Are Using 3 Imposter FINRA Domain Names Fraudulent emails portrayed as coming from the Financial Industry Regulatory Authority, a not-for-profit organization that oversees brokerage firms and exchange markets in the U.S., are asking member firms to provide information or face penalties, FINRA warns.

Phishing 184
article thumbnail

Phishing Campaign Used Morse Code to Evade Detection: Microsoft

eSecurity Planet

A phishing campaign that Microsoft security researchers have been tracking for about a year highlights not only the ongoing success of social engineering efforts by hackers to compromise systems, but also the extent to which the bad actors will go to cover their tracks while stealing user credentials. In a blog post , researchers with the Microsoft 365 Defender Threat Intelligence Team outlined how the cybercriminals changed tactics to evade detection, going so far as to change their obfuscation

Phishing 108
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Access Brokers: Just 10 Vendors List 46% of All Offers

Data Breach Today

Researchers Say Small Number of Core Individuals Selling Access to Hacked Networks Initial access brokers continue to sell easy access to networks. Given the uptake of such access by ransomware operations over the past year, one surprise is that relatively few individuals appear to be serving as brokers, which, of course, makes them an obvious target for law enforcement authorities.

Access 157
article thumbnail

Recent attacks on Iran were orchestrated by the Indra group

Security Affairs

The recent attacks that targeted Iran’s transport ministry and national train system were conducted by a threat actor dubbed Indra. In July, Iran’s railroad system was hit by a cyberattack , threat actors published fake messages about delays or cancellations of the trains on display boards at stations across the country, the Fars news agency reported.

article thumbnail

100m T-Mobile Customer Records Purportedly Up for Sale

Threatpost

The seller claims to have sucker-punched U.S. infrastructure out of retaliation. The offer: 30m records for ~1 penny each, with the rest being sold privately.

Sales 107
article thumbnail

Hard Drive Health & Data Security

Record Nations

Hard drive health and data security are very closely connected. A failing hard drive can pose a number of security risks to any business. It’s important to recognize the signs of a failing drive, as well as what can be done to make sure that the data within remains accessible. We spoke to the founder […]. The post Hard Drive Health & Data Security appeared first on Record Nations.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Critical Valve Bug Lets Gamers Add Unlimited Funds to Steam Wallets

Threatpost

Valve plugs an API bug found in its Steam platform that that abused the Smart2Pay system to add unlimited funds to gamer digital wallets.

IT 110
article thumbnail

The T-Mobile Data Breach Is One You Can’t Ignore

WIRED Threat Level

Hackers claim to have obtained the data of 100 million people—including sensitive personal information.

article thumbnail

ICRM Announces 2022 Board Candidates

IG Guru

The ICRM is pleased to announce the following candidates for the ICRM 2021 Elections: President-Elect/Treasurer (2022-2024) Caroline J. Walters, CRM Regent, Exam Administration and Grading (2022-2023) Melissa G Dederer, CRM Regent, Legislation and Appeals (2022-2023) Stacie Tepper Carpenter, CRM Brian Starck, CRM Elections will be open August 23 – September 10.

98
article thumbnail

Making Banking Services More Accessible — and Secure

HID Global

Making Banking Services More Accessible — and Secure. tseeley. Mon, 08/16/2021 - 11:35.

Access 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Author Q&A: In modern cyberwarfare ‘information security’ is one in the same with ‘national security’

The Last Watchdog

What exactly constitutes cyberwarfare? The answer is not easy to pin down. On one hand, one could argue that cyber criminals are waging an increasingly debilitating economic war on consumers and businesses in the form of account hijacking, fraud, and extortion. Meanwhile, nation-states — the superpowers and second-tier nations alike — are hotly pursuing strategic advantage by stealing intellectual property, hacking into industrial controls, and dispersing political propaganda at an u