AT&T, one of the US biggest network operators, confirms a massive data breach that happened in April. The hack resulted in a massive leak of user data – hackers allegedly got their hands on info about interactions via calls and messages. It affects not just AT&T customers themselves, but also the users of mobile virtual… Continue reading AT&T Hacked in April, All Wireless Customers Affected
Tag: Supply Chain Attack
XZ Utils Backdoor Discovered, Threating Linux Servers
A backdoor in liblzma library, a part of XZ data compression tool was discovered by Andres Freund. The maintainer of the distribution noticed a half-second delay in the updated version, which eventually led him to the flaw. The latter appears to be the brainchild of one of the new XZ maintainers, who pulled off an… Continue reading XZ Utils Backdoor Discovered, Threating Linux Servers
What is Cyber Risk Exposure and How Can You Manage It?
Modern businesses face cybersecurity threats daily. While most are effectively neutralized, a successful attack can lead to unpleasant consequences. Therefore, it is crucial for organizations to clearly understand their vulnerability to cyber risks and how they can accurately assess this risk. This article will explore the quantitative assessment of cyber threats, their benefits, and how… Continue reading What is Cyber Risk Exposure and How Can You Manage It?
Third Party Data Breach: Definition and How to Prevent It
In today’s digital landscape, data breaches have become an alarming reality for organizations and individuals. The increasing reliance on technology and the widespread collection, storage, and exchange of personal information have created opportunities for cybercriminals to exploit vulnerabilities. Among the various types of data breaches, third party data breach has emerged as a particularly concerning… Continue reading Third Party Data Breach: Definition and How to Prevent It
3CX Phone System is Struck With Chain Supply Attack
3CX Phone System, a desktop app for business phone communication, fell victim to a supply chain attack. Recent updates deliver a forged version of the application that makes it possible to install stealer malware. The actual payload is getting delivered in a 3-stage manner, which makes it harder to track. What is the 3CX Phone… Continue reading 3CX Phone System is Struck With Chain Supply Attack