Verizon: Mobile Blindspot in Data Breaches

Verizon's recent report highlights a significant blindspot in mobile security concerning data breaches. As mobile devices become ubiquitous, attackers increasingly exploit vulnerabilities in mobile platforms to access sensitive information. The report emphasizes the need for enhanced mobile threat detection and response strategies to mitigate risks. It also discusses trends in mobile-related data breaches, the challenges organizations face in securing mobile endpoints, and recommendations for improving mobile security posture. This article delves into Verizon's findings, the implications for cybersecurity professionals, and practical steps to address mobile security gaps effectively.

This Cyber News was published on www.darkreading.com. Publication date: Wed, 22 Oct 2025 10:00:07 +0000


Cyber News related to Verizon: Mobile Blindspot in Data Breaches

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 year ago Aws.amazon.com
Verizon insider data breach hits over 63,000 employees - Verizon Communications is warning that an insider data breach impacts almost half its workforce, exposing sensitive employee information. Verizon is an American telecommunications and mass media company providing cable TV, telecommunications, and ...
1 year ago Bleepingcomputer.com
Verizon: Mobile Blindspot in Data Breaches - Verizon's recent report highlights a significant blindspot in mobile security concerning data breaches. As mobile devices become ubiquitous, attackers increasingly exploit vulnerabilities in mobile platforms to access sensitive information. The ...
1 month ago Darkreading.com
Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket - Mobile devices have become indispensable companions in our daily lives, offering us instant access to a world of information and services. On average, mobile users interact with more than 20 applications each day, making these handheld marvels ...
1 year ago Cyberdefensemagazine.com Rocke
Verizon Call Filter API flaw exposed customers' incoming call history - "This endpoint requires a JWT (JSON Web Token) in the Authorization header using the Bearer scheme and uses an X-Ceq-MDN header to specify a cell phone number to retrieve call history logs for," explains Connelly. As a result, any user ...
8 months ago Bleepingcomputer.com
Critical insights into Australia's supply chain risk landscape - Australian organizations find themselves navigating a minefield of supply chain risks, with a surge in incidents stemming from multi-party breaches. These breaches are often caused by vulnerabilities in cloud or software providers and are emerging as ...
1 year ago Tripwire.com
Is Your Organization Infected by Mobile Spyware? - The surge in mobile device usage within organizations has inevitably opened the floodgates to a new kind of cyber threat-mobile spyware. The growing dependence on mobile technology has made it imperative for organizations to recognize and mitigate ...
1 year ago Blog.checkpoint.com
Mobile Device Security: Protecting Your Smartphone - To ensure the safety of your smartphone and protect your personal data from unauthorized access, it is crucial to take proactive steps to enhance mobile device security. Enable device encryption: Enable device encryption on your smartphone to protect ...
1 year ago Securityzap.com
FCC orders telecom carriers to report PII data breaches within 30 days - Starting March 13th, telecommunications companies must report data breaches impacting customers' personally identifiable information within 30 days, as required by FCC's updated data breach reporting requirements. FCC's final rule follows several ...
1 year ago Bleepingcomputer.com
CVE-2023-38297 - An issue was discovered in a third-party com.factory.mmigroup component, shipped on devices from multiple device manufacturers. Certain software builds for various Android devices contain a vulnerable pre-installed app with a package name of ...
1 year ago
Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security - In recent years, mobile apps have surged in popularity providing consumers with instant access to a variety of life essentials such as finances, education, and healthcare to life's pleasures such as shopping, sports, and gaming. With the popularity ...
1 year ago Cyberdefensemagazine.com
Unraveling the Aftermath of Verizon's Insider Data Breach Impacting 63,000 Employees - In the fast-paced world of digital connectivity, data breaches have become an unfortunate reality that businesses must constantly guard against. Recently, telecommunications giant Verizon found itself in the throes of a security crisis as it grappled ...
1 year ago Cysecurity.news
The Art of Securing Cloud-Native Mobile Applications - We will explore the dynamic intersection of cloud-native architecture and mobile application security, delving into the strategies and best practices essential for safeguarding sensitive data, ensuring user privacy, and fortifying against emerging ...
1 year ago Feeds.dzone.com
Verizon 2025 Report Alarming Rise in Cyberattacks Via Third-Parties - With ransomware and data theft continuing to pose significant threats, the report underscores the importance of comprehensive security programs that include regular vulnerability assessments, prompt patching, employee training, and improved ...
7 months ago Cybersecuritynews.com
T-Mobile pays $31.5 million FCC settlement over 4 data breaches - "With companies like T-Mobile and other telecom service providers operating in a space where national security and consumer protection interests overlap, we are focused on ensuring critical technical changes are made to telecommunications networks to ...
1 year ago Bleepingcomputer.com
Increase In Mobile Threats Calls for A Proactive Mindset. - Mobile threats are always evolving in the world of business. Threats to mobile security are increasing: More than 60% of cyber attacks now occur on mobile devices, including phishing and smishing scams and password theft within organisations. One ...
1 year ago Cyberdefensemagazine.com
Insider Data Breach at Verizon Affects Over 63,000 Employees - An insider data breach at Verizon has compromised the personal information of more than 63,000 employees, nearly half of the company's global workforce. The telecommunications giant disclosed the incident in a Data Breach Notification with the Office ...
1 year ago Heimdalsecurity.com
Verizon says 63K employee info wrongly accessed by insider The Register - Verizon is notifying more than 63,000 people, mostly current employees, that an insider, accidentally or otherwise, had inappropriate access to their personal data. The Pine Tree state's strict data loss rules require security snafu disclosures, even ...
1 year ago Go.theregister.com
Verizon says 63K employee info wrongly accessed by insider The Register - Verizon is notifying more than 63,000 people, mostly current employees, that an insider, accidentally or otherwise, had inappropriate access to their personal data. The Pine Tree state's strict data loss rules require security snafu disclosures, even ...
1 year ago Go.theregister.com
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
1 year ago Securityzap.com
Verizon DBIR Report - Small Businesses Emerges as Prime Targets for Ransomware Attacks - For small businesses with limited resources, focusing on these fundamental security controls represents the most effective defense against the rising tide of ransomware attacks. The attack methodology reveals a sophisticated understanding of small ...
7 months ago Cybersecuritynews.com
T-Mobile, Verizon workers get texts offering $300 for SIM swaps - Criminals are now texting T-Mobile and Verizon employees on their personal and work phones, trying to tempt them with cash to perform SIM swaps. The targeted employees have shared screenshots of messages offering $300 to those willing to aid the ...
1 year ago Bleepingcomputer.com
Essential Security Certifications for Consumer Mobile Devices: A Comprehensive Guide - In an era dominated by mobile technology, ensuring the security of consumer mobile devices has become paramount. Various certifications play a crucial role in establishing the trustworthiness of these devices, assuring users that their personal data ...
1 year ago Cybersecurity-insiders.com
Essential Security Certifications for Consumer Mobile Devices: A Comprehensive Guide - In an era dominated by mobile technology, ensuring the security of consumer mobile devices has become paramount. Various certifications play a crucial role in establishing the trustworthiness of these devices, assuring users that their personal data ...
1 year ago Cybersecurity-insiders.com
Essential Security Certifications for Consumer Mobile Devices: A Comprehensive Guide - In an era dominated by mobile technology, ensuring the security of consumer mobile devices has become paramount. Various certifications play a crucial role in establishing the trustworthiness of these devices, assuring users that their personal data ...
1 year ago Cybersecurity-insiders.com