Scammers use DocuSign API to send fraudulent invoices
CFOs, beware: cybercriminals are exploiting DocuSign’s legitimate business tools to deliver fraudulent invoices directly through trusted channels. This scheme is particularly dangerous …
American building security giant ADT has confirmed a data breach affecting over 30,000 customers after threat actors illegally accessed databases containing customer information. The firm, which serves approximately 6 million customers across 200 locations in the United States and has an annual revenue of $4.98 billion, disclosed the breach in a Form 8-K regulatory filing with the Securities and Exchange Commission (SEC).
According to the 8-K filing, ADT became aware of unauthorized access to certain databases.
“After becoming aware of the incident, the company promptly took steps to shut down the unauthorized access and launched an investigation, partnering with leading third-party cybersecurity industry experts,” the filing states.
The exposed data includes limited customer information such as email addresses, phone numbers, and postal addresses. ADT stated that there is no evidence that customers’ home security systems were compromised or that credit card and banking information was stolen.
While ADT noted that affected individuals represent a small percentage of its overall client base, they did not provide specific figures. However, a threat actor known as ‘netnsher’ claimed to have leaked 30,800 customer records on a popular hacking forum. The leaked data allegedly includes customer emails, complete addresses, user IDs, and information about purchased products.
The investigation into the current breach is ongoing, and ADT has notified customers it believes to have been affected. The company does not expect the security breach to significantly impact its operations or financial condition.
This isn’t the first time ADT has faced security issues. In 2021, a former technician confessed to secretly viewing customer security cameras nearly 10,000 times over a four-year period by adding his own email to customer accounts.
Cyber attacks have severe repercussions for both organizations and individuals, and their impact can extend even to those not directly targeted. Like the ongoing Snowflake data breach that left over 73 million AT&T customers’ data exposed.
Accounts payable (AP) and finance professionals are often on the frontline against business scams and cybercrime. With stolen data enabling further fraudulent activities, it’s crucial to focus on two key areas for protection:
CFOs, beware: cybercriminals are exploiting DocuSign’s legitimate business tools to deliver fraudulent invoices directly through trusted channels. This scheme is particularly dangerous …
Because LinkedIn is used as a professional networking platform, account holders don’t use the same caution as they would on Facebook or …
Fraud can strike any time, but certain periods increase your business’s vulnerability to fraudulent activities. During these times, your teams may be …
Eftsure provides continuous control monitoring to protect your eft payments. Our multi-factor verification approach protects your organisation from financial loss due to cybercrime, fraud and error.