Verizon Employee Data Exposed in Insider Threat Incident

About 63,000 Verizon employees have been affected by a breach that occurred in September 2023 but which wasn't discovered for three months.
The exposed information includes names, addresses, Social Security numbers, gender, union affiliations, dates of birth, and compensation information - basically a phisher's social engineering giftbox.
Verizon - which offers consumer wireless, home Internet, IT consulting, business communications, cybersecurity offerings, and much more - did not immediately respond to Dark Reading's request for more details on the breach.
The service provider said it was reviewing its technical controls to prevent a repeat of the situation down the line, but Jim Alkove, co-founder and CEO of identity security startup Oleria and former chief trust officer at Salesforce.com, believes that it's equally important to be mindful of security mindset.
The news comes amid ongoing cyberattacks against telecom providers; it's also Verizon's second data breach incident in less than a year.
Last March, 7.5 million wireless customers were affected when their information cropped up for sale on the Dark Web; the provider said a third-party provider was to blame.


This Cyber News was published on www.darkreading.com. Publication date: Tue, 06 Feb 2024 22:45:27 +0000


Cyber News related to Verizon Employee Data Exposed in Insider Threat Incident

Identifying Insider Threats: Addressing the Top Five Insider Threat Indicators - Cybersecurity teams work extensively to keep external attackers out of their organization's IT environment, but insider threats present a different, equally as difficult, challenge. Identifying insider threats is growing increasingly complex, and, as ...
1 year ago Cybersecurity-insiders.com
Verizon insider data breach hits over 63,000 employees - Verizon Communications is warning that an insider data breach impacts almost half its workforce, exposing sensitive employee information. Verizon is an American telecommunications and mass media company providing cable TV, telecommunications, and ...
10 months ago Bleepingcomputer.com
How to Identify & Monitor Insider Threat Indicators [A Guide] - Most security protocols look outward when looking for cybersecurity threats. Our recent study found that 42% of exposed credentials came from an insider threat-former employees whose credentials were still active, employee error, or a malicious ...
9 months ago Securityboulevard.com
Enhancing Organisational Security: A Comprehensive Guide to Insider Risk Management Courses - In a world increasingly aware of internal security threats, the necessity for comprehensive insider risk management courses has never been more crucial. Astonishingly, up to 90% of organisations acknowledge their vulnerability to insider attacks, ...
11 months ago Securityboulevard.com
Key Takeaways from the Gartner® Market Guide for Insider Risk Management - Insider risk incidents are on the rise and becoming more costly to contain. As a result, earlier this year, Gartner predicted that 50% of all medium to large enterprises would adopt insider risk programs. The report reveals several key findings about ...
1 year ago Securityboulevard.com
Unraveling the Aftermath of Verizon's Insider Data Breach Impacting 63,000 Employees - In the fast-paced world of digital connectivity, data breaches have become an unfortunate reality that businesses must constantly guard against. Recently, telecommunications giant Verizon found itself in the throes of a security crisis as it grappled ...
10 months ago Cysecurity.news
What is digital forensics and incident response? - Digital forensics and incident response is a combined set of cybersecurity operations that incident response teams use to detect, investigate and respond to cybersecurity events. As the acronym implies, DFIR integrates digital forensics and incident ...
10 months ago Techtarget.com
Incident Response Plan: How to Build, Examples, Template - A strong incident response plan - guidance that dictates what to do in the event of a security incident - is vital to ensure organizations can recover from an attack or other cybersecurity event and minimize potential disruption to company ...
10 months ago Techtarget.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
2 months ago Aws.amazon.com
New Microsoft Incident Response team guide shares best practices for security teams and leaders - The incident response process can be a maze that security professionals must quickly learn to navigate-which is no easy task. Surprisingly, many organizations still lack a coordinated incident response plan, and even fewer consistently apply it. ...
1 year ago Microsoft.com
How to Conduct Incident Response Tabletop Exercises - An incident response tabletop exercise is an activity that involves testing the processes outlined in an incident response plan. Attack simulations are run to ensure incident response team members know their roles and responsibilities - and whether ...
11 months ago Techtarget.com
Verizon says 63K employee info wrongly accessed by insider The Register - Verizon is notifying more than 63,000 people, mostly current employees, that an insider, accidentally or otherwise, had inappropriate access to their personal data. The Pine Tree state's strict data loss rules require security snafu disclosures, even ...
10 months ago Go.theregister.com
Verizon says 63K employee info wrongly accessed by insider The Register - Verizon is notifying more than 63,000 people, mostly current employees, that an insider, accidentally or otherwise, had inappropriate access to their personal data. The Pine Tree state's strict data loss rules require security snafu disclosures, even ...
10 months ago Go.theregister.com
DTEX Systems Appoints Mandiant Global CTO Marshall Heilman As CEO - PRESS RELEASE. SAN JOSE, Calif.- December 5, 2023 - DTEX Systems, the global leader for insider risk management, today announced the appointment of Marshall Heilman as CEO. In this role, Heilman will drive its mission to proactively protect global ...
1 year ago Darkreading.com
Insider Data Breach at Verizon Affects Over 63,000 Employees - An insider data breach at Verizon has compromised the personal information of more than 63,000 employees, nearly half of the company's global workforce. The telecommunications giant disclosed the incident in a Data Breach Notification with the Office ...
10 months ago Heimdalsecurity.com
4 key steps to building an incident response plan - In this Help Net Security interview, Mike Toole, head of security and IT at Blumira, discusses the components of an effective security incident response strategy and how they work together to ensure organizations can address cybersecurity issues. An ...
5 months ago Helpnetsecurity.com
A Heimdal MXDR Expert on Incident Response Best Practices and Myth Busting - I got to talk to Dragoș Roșioru, a seasoned MXDR expert, about incident response best practices and challenges. Get an in-depth understanding of the do's and don'ts in incident response as Dragoș explains how to avoid the most common mistakes ...
11 months ago Heimdalsecurity.com
Cracking the Code: The Role of AI and UBA in Mitigating Insider Threats to Businesses - Automating mundane tasks and driving data-driven decisions, big data enables businesses to make better decisions and drive transformation. The use of AI has been shown as an effective way of streamlining operations and enhancing security measures, ...
11 months ago Cysecurity.news
Privilege elevation exploits used in over 50% of insider attacks - Elevation of privilege flaws are the most common vulnerability leveraged by corporate insiders when conducting unauthorized activities on networks, whether for malicious purposes or by downloading risky tools in a dangerous manner. A report by ...
1 year ago Bleepingcomputer.com
How to build a cyber incident response team - As an incident response manager himself, Valentin regularly coordinates security responses for companies of all shapes and sizes - including many of the examples discussed in this post. He explains everything you need to know about building and ...
1 year ago Heimdalsecurity.com
How to create an incident response playbook - Creating and maintaining an incident response playbook can significantly improve the speed and effectiveness of your organization's incident response. To help, here's a crash course on what incident response playbooks are, why they are important, how ...
11 months ago Techtarget.com
Important details about CIRCIA ransomware reporting - This landmark legislation tasks the Cybersecurity and Infrastructure Security Agency to develop and implement regulations requiring covered entities to report covered cyber incidents and ransomware payments. Ransomware attacks have become ...
6 months ago Securityintelligence.com
What Is Threat Modeling? - Threat modeling emerges as a pivotal process in this landscape, offering a structured approach to identify, assess, and address potential security threats. Threat Modeling Adoption and Implementation The successful adoption of threat modeling within ...
11 months ago Feeds.dzone.com
Verizon Employee Data Exposed in Insider Threat Incident - About 63,000 Verizon employees have been affected by a breach that occurred in September 2023 but which wasn't discovered for three months. The exposed information includes names, addresses, Social Security numbers, gender, union affiliations, dates ...
10 months ago Darkreading.com
Microsoft releases first Windows Server 2025 preview build - Microsoft has released Windows Server Insider Preview 26040, the first Windows Server 2025 build for admins enrolled in its Windows Insider program. This build is the first pushed for the next Windows Server Long-Term Servicing Channel Preview, which ...
10 months ago Bleepingcomputer.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)