Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ericsson USA Reveals Third-Party Data Breach

Ericsson USA Reveals Third-Party Data Breach

Posted on March 12, 2026 By CWS

Ericsson USA Reports Data Breach

The U.S. division of the Swedish telecom giant has reported a data breach impacting personal data of both employees and customers. However, the breach did not originate from Ericsson’s own systems but was due to a breach at one of their third-party service providers.

Details of the Unauthorized Access

The breach notification highlighted that unauthorized access took place over a period from April 17 to April 22, 2025. It was only on April 28, 2025, that the service provider identified unusual activity within their network.

According to external sources, the breach was a result of a voice phishing or ‘vishing’ attack. In this scheme, cybercriminals used phone-based social engineering to gain access to a vendor employee’s account, leading to the breach.

Investigation and Findings

Upon detection, an immediate investigation was initiated by the service provider, who also brought in external cybersecurity experts to assess the situation. Due to the intricate nature of the data involved, the investigation extended over several months.

The analysis was completed on February 23, 2026, confirming that sensitive files related to 15,661 individuals had been accessed. Although the notification primarily mentioned personal identifiers, regulatory filings suggest that the breach involved more extensive data, including addresses, Social Security Numbers, government IDs, and financial records.

Response and Mitigation Efforts

Ericsson and the involved service provider have stated that there is no current indication of misuse of the compromised data. In response, the vendor has implemented several security measures, including mandatory password changes and enhanced network security protocols. Furthermore, the Federal Bureau of Investigation (FBI) has been notified to aid in tracking the perpetrators.

Stay informed on the latest in cybersecurity by following us on Google News, LinkedIn, and X. If you have a story you would like us to feature, please reach out.

Cyber Security News Tags:Cyberattack, Cybersecurity, data breach, data security, Ericsson, FBI, personal information, security measures, third-party provider, vishing attack

Post navigation

Previous Post: Meta Unveils New Anti-Scam Tools Amid Global Crackdown
Next Post: Scaling Phishing Detection: Essential Steps for CISOs

Related Posts

Most SOCs See Attacks Too Late — How to Fix It Most SOCs See Attacks Too Late — How to Fix It Cyber Security News
Microsoft Teams New Premium Feature Blocks Screenshots and Recordings During Meeting Microsoft Teams New Premium Feature Blocks Screenshots and Recordings During Meeting Cyber Security News
Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks Cyber Security News
3 Steps to Beat Burnout in Your SOC and Solve Incidents Faster  3 Steps to Beat Burnout in Your SOC and Solve Incidents Faster  Cyber Security News
Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links Cyber Security News
15 Best Bandwidth Monitoring Tools in 2025 15 Best Bandwidth Monitoring Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption
  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption
  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark