Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ericsson USA Reveals Third-Party Data Breach

Ericsson USA Reveals Third-Party Data Breach

Posted on March 12, 2026 By CWS

Ericsson USA Reports Data Breach

The U.S. division of the Swedish telecom giant has reported a data breach impacting personal data of both employees and customers. However, the breach did not originate from Ericsson’s own systems but was due to a breach at one of their third-party service providers.

Details of the Unauthorized Access

The breach notification highlighted that unauthorized access took place over a period from April 17 to April 22, 2025. It was only on April 28, 2025, that the service provider identified unusual activity within their network.

According to external sources, the breach was a result of a voice phishing or ‘vishing’ attack. In this scheme, cybercriminals used phone-based social engineering to gain access to a vendor employee’s account, leading to the breach.

Investigation and Findings

Upon detection, an immediate investigation was initiated by the service provider, who also brought in external cybersecurity experts to assess the situation. Due to the intricate nature of the data involved, the investigation extended over several months.

The analysis was completed on February 23, 2026, confirming that sensitive files related to 15,661 individuals had been accessed. Although the notification primarily mentioned personal identifiers, regulatory filings suggest that the breach involved more extensive data, including addresses, Social Security Numbers, government IDs, and financial records.

Response and Mitigation Efforts

Ericsson and the involved service provider have stated that there is no current indication of misuse of the compromised data. In response, the vendor has implemented several security measures, including mandatory password changes and enhanced network security protocols. Furthermore, the Federal Bureau of Investigation (FBI) has been notified to aid in tracking the perpetrators.

Stay informed on the latest in cybersecurity by following us on Google News, LinkedIn, and X. If you have a story you would like us to feature, please reach out.

Cyber Security News Tags:Cyberattack, Cybersecurity, data breach, data security, Ericsson, FBI, personal information, security measures, third-party provider, vishing attack

Post navigation

Previous Post: Meta Unveils New Anti-Scam Tools Amid Global Crackdown
Next Post: Scaling Phishing Detection: Essential Steps for CISOs

Related Posts

VoidLink Framework Enables Dynamic Linux Tool Deployment VoidLink Framework Enables Dynamic Linux Tool Deployment Cyber Security News
Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Cyber Security News
New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique Cyber Security News
Critical Vulnerability In Chromium’s Blink Let Attackers Crash Chromium-based Browsers Within Seconds Critical Vulnerability In Chromium’s Blink Let Attackers Crash Chromium-based Browsers Within Seconds Cyber Security News
Implementing NIST CSF 2.0 A Technical Blueprint Implementing NIST CSF 2.0 A Technical Blueprint Cyber Security News
Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Linked to Massive Polyfill Attack
  • Microsoft OAuth Device Phishing Threat Escalates
  • Critical Vulnerabilities Patched by Splunk and Zoom
  • MediaTek Chip Flaw Exposes Android PINs in Seconds
  • Critical Flaw in Ally Plugin Puts 200,000 WordPress Sites at Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Linked to Massive Polyfill Attack
  • Microsoft OAuth Device Phishing Threat Escalates
  • Critical Vulnerabilities Patched by Splunk and Zoom
  • MediaTek Chip Flaw Exposes Android PINs in Seconds
  • Critical Flaw in Ally Plugin Puts 200,000 WordPress Sites at Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News