Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ericsson USA Reveals Third-Party Data Breach

Ericsson USA Reveals Third-Party Data Breach

Posted on March 12, 2026 By CWS

Ericsson USA Reports Data Breach

The U.S. division of the Swedish telecom giant has reported a data breach impacting personal data of both employees and customers. However, the breach did not originate from Ericsson’s own systems but was due to a breach at one of their third-party service providers.

Details of the Unauthorized Access

The breach notification highlighted that unauthorized access took place over a period from April 17 to April 22, 2025. It was only on April 28, 2025, that the service provider identified unusual activity within their network.

According to external sources, the breach was a result of a voice phishing or ‘vishing’ attack. In this scheme, cybercriminals used phone-based social engineering to gain access to a vendor employee’s account, leading to the breach.

Investigation and Findings

Upon detection, an immediate investigation was initiated by the service provider, who also brought in external cybersecurity experts to assess the situation. Due to the intricate nature of the data involved, the investigation extended over several months.

The analysis was completed on February 23, 2026, confirming that sensitive files related to 15,661 individuals had been accessed. Although the notification primarily mentioned personal identifiers, regulatory filings suggest that the breach involved more extensive data, including addresses, Social Security Numbers, government IDs, and financial records.

Response and Mitigation Efforts

Ericsson and the involved service provider have stated that there is no current indication of misuse of the compromised data. In response, the vendor has implemented several security measures, including mandatory password changes and enhanced network security protocols. Furthermore, the Federal Bureau of Investigation (FBI) has been notified to aid in tracking the perpetrators.

Stay informed on the latest in cybersecurity by following us on Google News, LinkedIn, and X. If you have a story you would like us to feature, please reach out.

Cyber Security News Tags:Cyberattack, Cybersecurity, data breach, data security, Ericsson, FBI, personal information, security measures, third-party provider, vishing attack

Post navigation

Previous Post: Meta Unveils New Anti-Scam Tools Amid Global Crackdown
Next Post: Scaling Phishing Detection: Essential Steps for CISOs

Related Posts

Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media Cyber Security News
Meta Launches New Tools to Protect Messenger and WhatsApp Users from Scammers Meta Launches New Tools to Protect Messenger and WhatsApp Users from Scammers Cyber Security News
Guide to Cloud API Security Guide to Cloud API Security Cyber Security News
Jenkins Security Flaws Pose Major XSS Threats Jenkins Security Flaws Pose Major XSS Threats Cyber Security News
New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps Cyber Security News
Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in Ally Plugin Puts 200,000 WordPress Sites at Risk
  • Emerging Cyber Threats: OAuth Abuse and Beyond
  • Microsoft 365 Copilot Vulnerability Sparks Phishing Risks
  • Apple Releases iOS Updates to Counter Coruna Threats
  • Scaling Phishing Detection: Essential Steps for CISOs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in Ally Plugin Puts 200,000 WordPress Sites at Risk
  • Emerging Cyber Threats: OAuth Abuse and Beyond
  • Microsoft 365 Copilot Vulnerability Sparks Phishing Risks
  • Apple Releases iOS Updates to Counter Coruna Threats
  • Scaling Phishing Detection: Essential Steps for CISOs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News