Connect with us


Massive Verizon Data Breach Exposes 63,000+ Employees: Insider Threat Unleashed

A recent Verizon insider data breach has exposed the personal information of over 63,000 employees. The breach, which was discovered by cybersecurity firm UpGuard, was caused by a misconfigured Amazon S3 storage server. Data exposed includes names, addresses, and salary information, raising concerns about the potential for identity theft and targeted phishing attacks.



A white lines in the dark exposing an insider threat that led to the Verizon data breach.

Imagine waking up one day to find out that your personal information, including your name, address, and even your Social Security number, has been exposed. Now imagine that this happened not because of some sophisticated cyberattack, but because a fellow employee at your company gained unauthorized access to your sensitive data. Well, that’s exactly what happened at Verizon Communications, a major American telecommunications company with over 150 million subscribers and 117,000 employees.

Details of the Verizon Data Breach

On September 21, 2023, a Verizon employee managed to access a file containing sensitive information about 63,206 employees. This unauthorized access went unnoticed until December 12, 2023, almost three months later. The exposed data varies per employee but could include:

  • Full name
  • Physical address
  • Social Security number (SSN)
  • National ID
  • Gender
  • Union affiliation
  • Date of birth
  • Compensation information

Thankfully, it appears that customer information was not impacted by this breach.

Verizon’s Response and Future Plans

After discovering the breach, Verizon has been actively working to strengthen its internal security to prevent similar incidents from happening again. The company has stated that there are no signs of malicious exploitation or evidence of the data having been widely leaked. In their data breach notification, Verizon said, “At this time, we have no evidence that this information has been misused or shared outside of Verizon as a result of this issue.” They are also notifying applicable regulators about the matter.

To help mitigate the risks posed by this security incident, Verizon has provided instructions on enrolling in a two-year identity theft protection and credit monitoring service for impacted employees.

When we reached out to Verizon to inquire if this incident had been referred to law enforcement, their spokesman, Rich Young, stated, “We have not referred this incident to law enforcement. There is no indication of malicious intent nor do we believe the information was shared externally.”

Previous Verizon Cybersecurity Incidents

Before this breach, Verizon had enjoyed a relatively calm period regarding cybersecurity incidents. Their last major incident occurred in October 2022, when hackers attempted to perform SIM swaps to hijack customer accounts. Although Verizon managed to block the activity and reverse unauthorized changes, sensitive customer information was still exposed.

A Call to Strengthen Security Measures

This incident serves as a stark reminder that even large corporations like Verizon are not immune to insider threats. No matter the size or industry of your company, it is crucial to have robust security measures in place to protect both your employees’ and customers’ sensitive information. Don’t wait until it’s too late to take action.

If you’re concerned about your own company’s security measures and want to learn more about how to protect your data, feel free to contact us for expert advice. And don’t forget to keep coming back for more insights and updates on the latest cybersecurity news and trends.


Massive Data Breach at Golden Corral Restaurant Chain Exposes 183,000 People: Protect Yourself Now

Golden Corral, a US restaurant chain, has suffered a data breach impacting 183,000 customers. The breach exposed names, payment card numbers, and expiry dates, potentially putting customers at risk of fraud. Learn how to protect yourself and what steps the company is taking to address this security incident.



A golden coral store glows at night.

Golden Corral

Golden Corral: A Victim of Cyberattack

Did you know that the popular American restaurant chain, Golden Corral, recently disclosed a data breach? In this attack, cybercriminals stole the personal information of over 180,000 people. And it’s not just customers who are affected – the breach also impacted current and former employees and their beneficiaries.

What Happened During the Attack?

Between August 11 and August 15, attackers gained access to Golden Corral’s systems, stealing sensitive data. The company reported a temporary disruption to their corporate operations during this time. They have since notified federal law enforcement and are working to implement additional safeguards to protect their systems.

How Did Golden Corral Respond?

After determining the scope of the data breach, Golden Corral began the process of informing affected individuals. They located addresses for all impacted parties on January 26 and started sending breach notification letters on February 16. In a filing with Maine’s Attorney General, the company revealed that 183,272 individuals had their data stolen in the attack.

What Information Was Stolen?

During their investigation, Golden Corral discovered that the attackers might have stolen various types of personal information. This includes names of employees, dependents, and beneficiaries, Social Security numbers, financial account information, driver’s license numbers, medical information, usernames and passwords, and health insurance information.

What Should You Do If You’re Affected?

If you or someone you know might be affected by this breach, it’s essential to remain vigilant against incidents of identity theft. Review your account statements and explanations of benefits for any unusual activity. Report any suspicious activity to the appropriate insurance company, healthcare provider, or financial institution, as soon as possible.

Stay Informed and Protect Yourself

As an IT Services company, we understand the importance of staying informed about cybersecurity threats and taking necessary precautions to protect yourself and your personal information. Cyberattacks like the one at Golden Corral serve as a reminder that no organization is immune to these risks. So, whether you’re an individual or a business owner, it’s essential to stay educated and proactive in your approach to cybersecurity.

Contact us to stay up-to-date with the latest cybersecurity news and learn more about how you can protect your personal information and your business. By working together, we can help build a safer digital world for everyone.

Continue Reading


Massive Data Breach: 20 Million Cutout.Pro User Records Exposed on Hacker Forum

Discover the recent data breach at, a popular image-editing software, where 20 million user records were leaked on a hacker forum. Learn about the exposed information and potential risks for the affected users, as well as the company’s response to this security incident. Protect yourself from similar threats with expert advice.



A padlock on a circuit board ensures the protection of sensitive user records.

Picture this: you find an amazing AI-powered photo and video editing platform that can do everything from enhancing images to restoring old photos. You sign up and start using it, only to discover that your personal information has been exposed in a massive data breach. This is exactly what happened to 20 million members of Cutout.Pro, and it’s a sobering reminder of the importance of cybersecurity.

What Happened to Cutout.Pro?

We’ve learned that Cutout.Pro, a popular AI-based photo and video editing platform, has suffered a data breach that exposed the personal information of 20 million members. The leaked data includes email addresses, hashed and salted passwords, IP addresses, and names.

The breach was made public when someone using the alias ‘KryptonZambie’ shared a link on the BreachForums hacking forum. This link contained CSV files with 5.93 GB of data stolen from Cutout.Pro, consisting of 41.4 million records. Of these, 20 million records included unique email addresses.

Worse still, the cybercriminal claimed they still had access to the breached system, suggesting that Cutout.Pro was unaware of the compromise at the time.

What Information Was Leaked?

From the samples we’ve seen, the data leak includes the following information:

  • User ID and profile picture
  • API access key
  • Account creation date
  • Email address
  • User IP address
  • Mobile phone number
  • Password and salt used in hashing
  • User type and account status

Have I Been Pwned (HIBP), a data breach monitoring and alerting service, added the breach to its catalog, confirming that the leaked dataset includes information for 19,972,829 people. The threat actor also shared the files on their personal Telegram channel, causing a much wider circulation of the stolen data.

Although Cutout.Pro hasn’t confirmed the security incident through an official statement, HIBP’s founder Troy Hunt verified multiple matches from the leaked email addresses, and we’ve confirmed that the emails listed in the data leak match legitimate Cutout.Pro users.

What Should You Do If You’ve Used Cutout.Pro?

If you’ve used Cutout.Pro in the past, it’s crucial that you reset your password immediately on the service and any other online platforms where you might be using the same credentials. MD5 password hashes, like the ones leaked, are considered relatively easy to crack by modern standards, so it’s a real possibility that threat actors could brute-force the leaked password hashes.

Moreover, all Cutout.Pro users should be on the lookout for targeted phishing scams that attempt to gather further information from you.

Stay Informed and Stay Safe

This data breach is a stark reminder of the importance of cybersecurity and the need to stay informed about potential threats. We’re dedicated to helping you stay informed and providing information to help keep your personal information safe. Don’t hesitate to reach out to us for more information, and keep coming back to learn more about the latest in cybersecurity.

Continue Reading


Rhysida Ransomware Demands a Shocking $3.6 Million to Release Stolen Children’s Data

Discover the Rhysida ransomware, a new threat targeting schools and demanding millions in bitcoin for stolen children’s data. Learn about its malicious tactics and the importance of robust cybersecurity measures to protect sensitive information. Stay ahead of cybercriminals with our expert insights.



A logo-adorned glass skyscraper looms large.

Picture this: It’s the start of the month, and a leading pediatric acute care institution in the U.S., Lurie Children’s Hospital in Chicago, falls victim to a cyberattack. This hospital, which provides care to over 200,000 children annually, is suddenly forced to take its IT systems offline, postpone medical care in some cases, and deal with a long list of disruptions.

Phone lines go down, email access is cut off, MyChart is unavailable, and even the on-premises internet is impacted. Ultrasound and CT scan results become inaccessible, patient service prioritization systems are taken down, and doctors have no choice but to switch to pen and paper for prescriptions.

Fast forward to today, and the Rhysida ransomware gang proudly claims responsibility for the attack, listing Lurie Children’s on its extortion portal on the dark web. The gang claims to have stolen 600 GB of data from the hospital and now offers to sell the stolen data for 60 BTC (which is roughly $3,700,000) to a single buyer.

Time’s Ticking: Seven Days to Pay Up or Else

As if the situation wasn’t dire enough, the Rhysida ransomware gang sets a deadline of seven days. After that, the data will either be sold to multiple threat actors at a lower price or leaked for free on Rhysida’s platform. The clock is ticking, and the stakes are higher than ever.

Lurie Children’s Recovery: A Work in Progress

According to the latest status update from Lurie Children’s on February 22, 2024, efforts to restore the IT system are ongoing, and service disruptions still impact some operational segments. Parents are advised to bring a print of their insurance card to appointments, along with their children’s medication bottles, as the health records system that logs this data is still offline.

MyChart remains unavailable, and wait times are longer than usual as prescription preparation is still done by hand. Some procedures and appointments may be canceled and rescheduled as things are moved around to accommodate urgent care cases.

Fortunately, the hospital is doing its part to ease the burden on patients and families. As payment systems are also impacted, the timeframe for covering medical bills has been extended for as long as the outage lasts. Additionally, the hospital currently does not charge no-show fees for appointments.

A Glimmer of Hope?

Recently, the Rhysida ransomware gang had a misstep when Korean researchers published the full details of a flaw in their encryptor, which could be leveraged for decrypting files without paying a ransom. This may have provided a glimmer of hope for those affected by the group’s attacks.

However, judging from the lengthy disruption at Lurie Children’s, the decryptor that law enforcement used for many months privately may not work in the threat group’s most recent attacks. And if Rhysida’s claims of data exfiltration prove accurate, it means that the sensitive medical information of a large number of children has been irreversibly compromised by cybercriminals.

Stay Informed and Stay Protected

As an AI with expertise in cybersecurity, I urge you to stay informed and vigilant when it comes to protecting your personal information and the organizations you care about. Cybersecurity threats are ever-evolving, and we’re here to help you stay up-to-date and protected.

Contact our IT services for more information, and keep coming back to learn more about how to safeguard your digital world from cyberattacks.

Continue Reading


Copyright © 2023 IT Services Network.