Verizon

Year-Long Cyberattack on US Telecom Provider Ribbon Communications

Ribbon Communications, a prominent American telecommunications company responsible for facilitating major phone and data networks globally, has disclosed a significant security breach. The firm has confirmed that nation-state hackers, believed to have affiliations with an unnamed foreign government, infiltrated its systems and remained undetected for nearly a year. Headquartered in…

Read MoreYear-Long Cyberattack on US Telecom Provider Ribbon Communications

BreachForums Founder, 20, Could Face Up to 5 Years in Prison

In a significant development within the cybersecurity landscape, Conor Brian Fitzpatrick, a 20-year-old who operated the now-defunct BreachForums, has been formally charged with conspiracy to commit access device fraud in the United States. This notable case highlights the growing scrutiny on online platforms facilitating cybercrime. Fitzpatrick, known online as “pompompurin,”…

Read MoreBreachForums Founder, 20, Could Face Up to 5 Years in Prison

Salt Typhoon APT Focuses on Global Telecom and Energy Industries, According to Darktrace

Cybersecurity research firm Darktrace has issued a report highlighting the ongoing threat posed by a state-sponsored group known as Salt Typhoon. This Advanced Persistent Threat (APT) group, suspected to be linked to the People’s Republic of China (PRC), continues to discover innovative methods to infiltrate critical infrastructure across the globe.…

Read MoreSalt Typhoon APT Focuses on Global Telecom and Energy Industries, According to Darktrace

Chinese Hackers Target T-Mobile and Other U.S. Telecoms in Extensive Espionage Operation

T-Mobile, a prominent U.S. telecommunications provider, has acknowledged being targeted by Chinese cyber threat actors aiming to infiltrate its systems to access sensitive data. The perpetrators, identified as Salt Typhoon, have been conducting a prolonged campaign focusing on extracting cellphone communications of individuals considered “high-value intelligence targets.” The extent of…

Read MoreChinese Hackers Target T-Mobile and Other U.S. Telecoms in Extensive Espionage Operation

T-Mobile Uncovers Network Intrusion Attempts from a Wireline Provider

T-Mobile Detects Intrusion Attempts, No Data Breach Confirmed Telecom giant T-Mobile recently announced that it has thwarted attempts by cyber actors to penetrate its networks in the past few weeks. Fortunately, the company confirmed that no sensitive customer data was accessed during these attempts. The intrusion efforts were traced back…

Read MoreT-Mobile Uncovers Network Intrusion Attempts from a Wireline Provider

Nearly 700,000 Customers Affected by Insider Attack at U.S. Fintech Company

A US-based fintech company, FinWise, has alerted its customers about a potential data breach stemming from an insider threat. The organization, which facilitates loans on behalf of various American financial institutions, disclosed that a former employee accessed sensitive customer information after their departure from the company. According to filings made…

Read MoreNearly 700,000 Customers Affected by Insider Attack at U.S. Fintech Company

The Role of Third Parties and Machine Credentials in 2025’s Major Data Breaches

May 06, 2025
AI Security / Enterprise IT

In the 2025 Verizon Data Breach Investigations Report (DBIR), it wasn’t just ransomware or zero-day exploits that caught attention; rather, it was the underlying factors that enabled these incidents. Two significant contributors to this year’s most severe breaches emerged: third-party vulnerabilities and machine credential misuse. The report revealed that third-party involvement in breaches surged from 15% to 30% year-over-year. Simultaneously, cybercriminals increasingly leveraged machine credentials and unmanaged machine accounts to infiltrate systems, escalate privileges, and steal sensitive data. The takeaway is clear: protecting only employee accounts is no longer sufficient. To effectively combat modern threats, organizations must implement a comprehensive security strategy that encompasses all identities—human, non-employee, and machine.

The Escalating Threat of Third-Party Risks
Today’s enterprises operate within a complex network of partnerships, including contractors, vendors, and more.

Third Parties and Machine Credentials: Key Contributors to 2025’s Security Breaches May 06, 2025 AI Security / Enterprise IT The 2025 Verizon Data Breach Investigations Report (DBIR) revealed that the most pressing issues in this year’s data breaches weren’t the sensational headlines of ransomware attacks or zero-day vulnerabilities, but rather…

Read More

The Role of Third Parties and Machine Credentials in 2025’s Major Data Breaches

May 06, 2025
AI Security / Enterprise IT

In the 2025 Verizon Data Breach Investigations Report (DBIR), it wasn’t just ransomware or zero-day exploits that caught attention; rather, it was the underlying factors that enabled these incidents. Two significant contributors to this year’s most severe breaches emerged: third-party vulnerabilities and machine credential misuse. The report revealed that third-party involvement in breaches surged from 15% to 30% year-over-year. Simultaneously, cybercriminals increasingly leveraged machine credentials and unmanaged machine accounts to infiltrate systems, escalate privileges, and steal sensitive data. The takeaway is clear: protecting only employee accounts is no longer sufficient. To effectively combat modern threats, organizations must implement a comprehensive security strategy that encompasses all identities—human, non-employee, and machine.

The Escalating Threat of Third-Party Risks
Today’s enterprises operate within a complex network of partnerships, including contractors, vendors, and more.

Surge in Leaked Credentials: Up 160%—Understanding the Tactics of Cyber Attackers

Leaked Credentials Surge by 160%: Unpacking the Threat Landscape August 8, 2025 Identity Protection / Endpoint Security The digital landscape has witnessed a striking surge in credential leaks, a development that carries profound implications for organizations across sectors. Though the immediate ramifications may not be overtly apparent, the long-term effects…

Read More

Surge in Leaked Credentials: Up 160%—Understanding the Tactics of Cyber Attackers