Verizon Employee Data Exposed in Insider Threat Incident

About 63,000 Verizon employees have been affected by a breach that occurred in September 2023 but which wasn't discovered for three months.
The exposed information includes names, addresses, Social Security numbers, gender, union affiliations, dates of birth, and compensation information - basically a phisher's social engineering giftbox.
Verizon - which offers consumer wireless, home Internet, IT consulting, business communications, cybersecurity offerings, and much more - did not immediately respond to Dark Reading's request for more details on the breach.
The service provider said it was reviewing its technical controls to prevent a repeat of the situation down the line, but Jim Alkove, co-founder and CEO of identity security startup Oleria and former chief trust officer at Salesforce.com, believes that it's equally important to be mindful of security mindset.
The news comes amid ongoing cyberattacks against telecom providers; it's also Verizon's second data breach incident in less than a year.
Last March, 7.5 million wireless customers were affected when their information cropped up for sale on the Dark Web; the provider said a third-party provider was to blame.


This Cyber News was published on www.darkreading.com. Publication date: Tue, 06 Feb 2024 22:45:27 +0000


Cyber News related to Verizon Employee Data Exposed in Insider Threat Incident

25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
5 months ago Cybersecuritynews.com
Identifying Insider Threats: Addressing the Top Five Insider Threat Indicators - Cybersecurity teams work extensively to keep external attackers out of their organization's IT environment, but insider threats present a different, equally as difficult, challenge. Identifying insider threats is growing increasingly complex, and, as ...
1 year ago Cybersecurity-insiders.com
Verizon insider data breach hits over 63,000 employees - Verizon Communications is warning that an insider data breach impacts almost half its workforce, exposing sensitive employee information. Verizon is an American telecommunications and mass media company providing cable TV, telecommunications, and ...
1 year ago Bleepingcomputer.com
Enhancing Organisational Security: A Comprehensive Guide to Insider Risk Management Courses - In a world increasingly aware of internal security threats, the necessity for comprehensive insider risk management courses has never been more crucial. Astonishingly, up to 90% of organisations acknowledge their vulnerability to insider attacks, ...
1 year ago Securityboulevard.com
How to Identify & Monitor Insider Threat Indicators [A Guide] - Most security protocols look outward when looking for cybersecurity threats. Our recent study found that 42% of exposed credentials came from an insider threat-former employees whose credentials were still active, employee error, or a malicious ...
1 year ago Securityboulevard.com
Key Takeaways from the Gartner® Market Guide for Insider Risk Management - Insider risk incidents are on the rise and becoming more costly to contain. As a result, earlier this year, Gartner predicted that 50% of all medium to large enterprises would adopt insider risk programs. The report reveals several key findings about ...
1 year ago Securityboulevard.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 year ago Aws.amazon.com
Unraveling the Aftermath of Verizon's Insider Data Breach Impacting 63,000 Employees - In the fast-paced world of digital connectivity, data breaches have become an unfortunate reality that businesses must constantly guard against. Recently, telecommunications giant Verizon found itself in the throes of a security crisis as it grappled ...
1 year ago Cysecurity.news
FinWise Bank warns of insider data breach - FinWise Bank has issued a warning regarding a recent insider data breach that has raised significant concerns about data security within financial institutions. The breach involved unauthorized access to sensitive customer information by an insider, ...
2 months ago Infosecurity-magazine.com
What is digital forensics and incident response? - Digital forensics and incident response is a combined set of cybersecurity operations that incident response teams use to detect, investigate and respond to cybersecurity events. As the acronym implies, DFIR integrates digital forensics and incident ...
1 year ago Techtarget.com
Incident Response Plan: How to Build, Examples, Template - A strong incident response plan - guidance that dictates what to do in the event of a security incident - is vital to ensure organizations can recover from an attack or other cybersecurity event and minimize potential disruption to company ...
1 year ago Techtarget.com
Verizon Call Filter API flaw exposed customers' incoming call history - "This endpoint requires a JWT (JSON Web Token) in the Authorization header using the Bearer scheme and uses an X-Ceq-MDN header to specify a cell phone number to retrieve call history logs for," explains Connelly. As a result, any user ...
8 months ago Bleepingcomputer.com
Verizon says 63K employee info wrongly accessed by insider The Register - Verizon is notifying more than 63,000 people, mostly current employees, that an insider, accidentally or otherwise, had inappropriate access to their personal data. The Pine Tree state's strict data loss rules require security snafu disclosures, even ...
1 year ago Go.theregister.com
Verizon says 63K employee info wrongly accessed by insider The Register - Verizon is notifying more than 63,000 people, mostly current employees, that an insider, accidentally or otherwise, had inappropriate access to their personal data. The Pine Tree state's strict data loss rules require security snafu disclosures, even ...
1 year ago Go.theregister.com
DTEX Systems Appoints Mandiant Global CTO Marshall Heilman As CEO - PRESS RELEASE. SAN JOSE, Calif.- December 5, 2023 - DTEX Systems, the global leader for insider risk management, today announced the appointment of Marshall Heilman as CEO. In this role, Heilman will drive its mission to proactively protect global ...
1 year ago Darkreading.com
Insider Data Breach at Verizon Affects Over 63,000 Employees - An insider data breach at Verizon has compromised the personal information of more than 63,000 employees, nearly half of the company's global workforce. The telecommunications giant disclosed the incident in a Data Breach Notification with the Office ...
1 year ago Heimdalsecurity.com
New Microsoft Incident Response team guide shares best practices for security teams and leaders - The incident response process can be a maze that security professionals must quickly learn to navigate-which is no easy task. Surprisingly, many organizations still lack a coordinated incident response plan, and even fewer consistently apply it. ...
1 year ago Microsoft.com
Insider Threats Surge as Hybrid Workforces Expand - Today’s security leaders need to articulate insider risk in business terms while developing programs that scale across distributed environments without creating unreasonable friction. The technical aspects of insider threat management continue ...
7 months ago Cybersecuritynews.com
How to Conduct Incident Response Tabletop Exercises - An incident response tabletop exercise is an activity that involves testing the processes outlined in an incident response plan. Attack simulations are run to ensure incident response team members know their roles and responsibilities - and whether ...
1 year ago Techtarget.com
Cracking the Code: The Role of AI and UBA in Mitigating Insider Threats to Businesses - Automating mundane tasks and driving data-driven decisions, big data enables businesses to make better decisions and drive transformation. The use of AI has been shown as an effective way of streamlining operations and enhancing security measures, ...
1 year ago Cysecurity.news
FinWise Insider Breach Exposes Sensitive Customer Data - FinWise Bank recently suffered a significant insider breach that exposed sensitive customer data, raising concerns about internal security protocols. The breach involved unauthorized access by an employee who exploited their privileged access to ...
2 months ago Cybersecuritynews.com
Privilege elevation exploits used in over 50% of insider attacks - Elevation of privilege flaws are the most common vulnerability leveraged by corporate insiders when conducting unauthorized activities on networks, whether for malicious purposes or by downloading risky tools in a dangerous manner. A report by ...
1 year ago Bleepingcomputer.com CVE-2017-0213
4 key steps to building an incident response plan - In this Help Net Security interview, Mike Toole, head of security and IT at Blumira, discusses the components of an effective security incident response strategy and how they work together to ensure organizations can address cybersecurity issues. An ...
1 year ago Helpnetsecurity.com
Mitigating Insider Threats: A CISO’s Comprehensive Guide - Insider threats typically fall into three categories: malicious insiders who intentionally cause harm for personal gain or revenge; negligent insiders who inadvertently compromise security through carelessness or lack of awareness; and unwitting ...
7 months ago Cybersecuritynews.com
2025 Insider Risk Report Finds Most Organizations Struggle to Detect and Predict Insider Risks - The 2025 Insider Risk Report reveals a critical challenge faced by organizations worldwide: the difficulty in detecting and predicting insider risks. Insider threats, whether malicious or accidental, pose significant risks to data security and ...
4 weeks ago Cybersecuritynews.com