Hacker-powered pentests gaining momentum

Hackers have reported over 66,000 valid vulnerabilities this year – over 20% more than 2020 – with hacker-powered pentests seeing a 264% increase in reported vulnerabilities, HackerOne has announced. Pandemic-led digital transformation and … Continue reading Hacker-powered pentests gaining momentum

2021 will be a record-breaking year for data breaches, what about 2022?

In a new Experian forecast, five predictions for 2022 underscore the ongoing impact of the pandemic on cybersecurity. Cybercriminals will continue to exploit vulnerabilities within remote working and the vaccine ecosystem, but also set their sights on … Continue reading 2021 will be a record-breaking year for data breaches, what about 2022?

The importance of vulnerability management for your organization

Everyone is familiar with home burglaries. Criminals case a house looking for easy access through open windows, unlocked doors, open garages, and the like. Hackers take the same approach electronically and look for network vulnerabilities that grant th… Continue reading The importance of vulnerability management for your organization

Ethical hackers and the economics of security research

Bugcrowd released a report which provides CIOs and CISOs valuable insight on ethical hackers and the economics of security research. New findings indicate a startling shift in the threat landscape with 8 out of 10 ethical hackers recently having identi… Continue reading Ethical hackers and the economics of security research

Humanizing hackers: Entering the minds of those behind the attacks

Have you ever wondered what are hackers like, where they are based, and what are they thinking? They are human like everyone else – you wouldn’t be able to tell a hacker from a regular programmer. But they are often extremely smart software engineers w… Continue reading Humanizing hackers: Entering the minds of those behind the attacks

77% of rootkits are used for espionage purposes

In a new report, Positive Technologies analyzes this past decade’s most infamous families of rootkits – programs that hide the presence of malicious software or traces of intrusion in victim systems. The study finds that the majority of roo… Continue reading 77% of rootkits are used for espionage purposes

CDR: The secret cybersecurity ingredient used by defense and intelligence agencies

It’s very rare that the defense and intelligence community is vulnerable to file-based attacks. After all, for these organizations security is not a business case, it’s a case of national security. More commercial businesses should look to the defense … Continue reading CDR: The secret cybersecurity ingredient used by defense and intelligence agencies

Tech support scams becoming the top phishing threat to consumers

NortonLifeLock published a report detailing the top consumer cybersecurity insights and takeaways from July to September 2021. The latest findings show tech support scams, which often arrive as a pop-up alert convincingly disguised using the names and … Continue reading Tech support scams becoming the top phishing threat to consumers

T-Mobile confirms breach of more than 8 million customers’ data

T-Mobile confirmed Wednesday that the information of more than 8 million customers as well as 40 million former or potential customers who had applied for credit with the company was compromised in a recent data breach. The hacker accessed customers’ names, dates of birth, Social Security numbers, and driver’s license or ID information from some portion of the 7.8 million subscribers exposed in the breach. No phone numbers, account numbers, passwords, or financial information were compromised for paying customers, according to the company. The company did not say if or how many of those 7.8 million customers were also involved in the credit application breach. Names, phone numbers, and PIN numberss of roughly 850,000 active pre-paid customers were exposed. T-Mobile said it has reset all PINs and will be notifying affected customers. The company said the hacker obtained “additional information from inactive pre-paid accounts accessed through prepaid billing files” from […]

The post T-Mobile confirms breach of more than 8 million customers’ data appeared first on CyberScoop.

Continue reading T-Mobile confirms breach of more than 8 million customers’ data

T-Mobile investigates potentially massive breach of consumer data

T-Mobile is investigating claims by a hacker that they have put sensitive information about more than 100 million of the company’s customers up for sale after breaching its servers. The data set includes names, Social Security numbers, addresses, phone numbers and driver’s license information, Motherboard first reported. The sales ad asks for six bitcoin, which is roughly the equivalent to $278,781 as of Monday morning, in exchange for 30 million Social Security numbers and driver’s licenses from the data set. “We are aware of claims made in an underground forum and have been actively investigating their validity,” T-Mobile said in a statement to multiple outlets Sunday. “We do not have any additional information to share at this time.” T-Mobile did not immediately respond to a request for additional comment from CyberScoop. T-Mobile has just over 100 million customers in the United States, meaning that the data set could cover a […]

The post T-Mobile investigates potentially massive breach of consumer data appeared first on CyberScoop.

Continue reading T-Mobile investigates potentially massive breach of consumer data