Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com

Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com

Posted on August 5, 2025August 5, 2025 By CWS

Cisco has confirmed it was the goal of a cyberattack the place a malicious actor efficiently stole the essential profile info of an undisclosed variety of customers registered on Cisco.com.

The know-how large revealed that the breach occurred after an worker was deceived by a complicated voice phishing, or “vishing,” assault.

The incident, which Cisco turned conscious of on July 24, 2025, didn’t compromise delicate info reminiscent of passwords, monetary particulars, or confidential company knowledge. Nevertheless, it exposes the rising risk of social engineering ways focusing on staff as a gateway into company methods.

In accordance with a press release launched by the corporate, the attacker focused a Cisco consultant by way of a vishing scheme. In these assaults, perpetrators use voice communication usually a telephone name to control people into divulging delicate info or granting system entry.

The actor efficiently persuaded the worker, resulting in unauthorized entry to a third-party, cloud-based Buyer Relationship Administration (CRM) system utilized by the corporate.

From this single CRM occasion, the hacker was capable of export a dataset of person info. Cisco detailed that the compromised knowledge included fundamental account particulars offered by people upon registering for a Cisco.com account: names, group names, bodily addresses, Cisco-assigned person IDs, electronic mail addresses, and telephone numbers.

The info additionally contained account-related metadata, such because the date the profile was created. Upon discovering the breach, Cisco’s safety workforce acted swiftly to terminate the attacker’s entry and launched a full investigation to find out the scope of the incident.

The corporate pressured that the intrusion was remoted to at least one particular CRM system and that no different inner methods, merchandise, or companies had been affected. “The actor didn’t acquire any of our organizational clients’ confidential or proprietary info, or any passwords or different forms of delicate info,” the corporate affirmed.

Consistent with regulatory necessities and greatest practices, Cisco has engaged with related knowledge safety authorities to report the incident. The corporate can be within the strategy of notifying affected customers the place mandated by regulation.

Cisco is treating the occasion as a essential studying alternative to bolster its defenses. “Each cybersecurity incident is a chance to be taught, strengthen our resilience, and assist the broader safety group,” the assertion learn.

As a part of its remediation efforts, Cisco is implementing extra safety protocols to forestall related breaches. A key focus is on re-educating personnel on learn how to acknowledge and defend towards the more and more convincing and focused nature of vishing assaults.

The corporate issued an apology for the incident. “We apologize for any inconvenience or concern that this incident might have precipitated,” Cisco said, encouraging clients and companions with additional inquiries to get in contact with their designated account groups for assist.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Attackers, Cisco, Cisco.com, Details, Hacked, Profile, Registered, Stolen, Users

Post navigation

Previous Post: Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender
Next Post: North Korean Hackers Weaponizing NPM Packages to Steal Cryptocurrency and Sensitive Data

Related Posts

Columbia University Data Breach – Hackers Stolen 870,000 Individuals Personal and Financial Data Columbia University Data Breach – Hackers Stolen 870,000 Individuals Personal and Financial Data Cyber Security News
Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network Cyber Security News
Top 10 Best Supply Chain Risk Management Solutions in 2025 Top 10 Best Supply Chain Risk Management Solutions in 2025 Cyber Security News
Countering Spear Phishing with Advanced Email Security Solutions Countering Spear Phishing with Advanced Email Security Solutions Cyber Security News
Protecting Sensitive Data in Enterprise Systems for Privacy Compliance Protecting Sensitive Data in Enterprise Systems for Privacy Compliance Cyber Security News
Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News