Remove Passwords Remove Technology Remove Telecommunications
article thumbnail

France’s second-largest telecoms provider Free suffered a cyber attack

Security Affairs

is a French telecommunications company, subsidiary of Iliad S.A. that provides voice, video, data, and Internet telecommunications to consumers in France. “No passwords” , “no bank cards” , “no content of communications (emails, SMS, voice messages, etc.)” Free S.A.S.

article thumbnail

European Telecommunications Standards Institute (ETSI) suffered a data breach

Security Affairs

The European Telecommunications Standards Institute (ETSI) disclosed a data breach, threat actors had access to a database of its users. Threat actors stole a database containing the list of users of the portal of the European Telecommunications Standards Institute ( ETSI ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked Sandworm APT compromised 11 Ukrainian telecommunications providers

Security Affairs

Russia-linked APT group Sandworm has hacked eleven telecommunication service providers in Ukraine between since May 2023. The Russia-linked APT group Sandworm (UAC-0165) has compromised eleven telecommunication service providers in Ukraine between May and September 2023, reported the Ukraine’s Computer Emergency Response Team (CERT-UA).

article thumbnail

Russia warns financial sector organizations of IT service provider LANIT compromise

Security Affairs

“The NKTsKI recommends that all organizations change passwords and keys for accessing their systems operated in LANIT data processing centers as soon as possible. LANIT Group (Laboratory of New Information Technologies) is one of Russia’s largest IT service and software providers. In May 2024, U.S. ” said U.S.

article thumbnail

Australia, Canada, New Zealand, and the U.S. warn of PRC-linked cyber espionage targeting telecom networks

Security Affairs

Disabling unnecessary protocols and services, avoiding default passwords, and verifying software integrity bolster resilience. Organizations should adopt secure password storage, phishing-resistant MFA, session token limits, and Role-Based Access Control (RBAC). “The reads the report published by the telecommunications company. “To

article thumbnail

Storm-2372 used the device code phishing technique since August 2024

Security Affairs

Storm-2372s targets during this time have included government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas in Europe, North America, Africa, and the Middle East.”

Phishing 113
article thumbnail

The Internet is Held Together With Spit & Baling Wire

Krebs on Security

Lumen Technologies Inc. Korab filed a vulnerability report with Lumen demonstrating how a simple spoofed email could be used to disrupt Internet service for banks, telecommunications firms and even government entities. Based in Monroe, La., “This would effectively cut off Internet access for the impacted IP address blocks.”