{"id":2524,"date":"2024-07-12T18:10:38","date_gmt":"2024-07-12T18:10:38","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2524"},"modified":"2024-07-12T18:11:07","modified_gmt":"2024-07-12T18:11:07","slug":"hatalmas-adatvedelmi-incidens-az-att-nel-amit-az-ugyfeleknek-tudniuk-kell","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hatalmas-adatvedelmi-incidens-az-att-nel-amit-az-ugyfeleknek-tudniuk-kell\/","title":{"rendered":"Hatalmas Adatsziv\u00e1rg\u00e1s az AT&amp;T-n\u00e9l: Amit Az \u00dcgyfeleknek Tudniuk Kell"},"content":{"rendered":"<p>J\u00falius 12-\u00e9n az AT&amp;T nyilv\u00e1nosan bejelentette, hogy jogosulatlan szerepl\u0151k hozz\u00e1f\u00e9rtek az \u00fcgyf\u00e9ladatokhoz egy harmadik f\u00e9l felh\u0151platformj\u00e1n. Az AT&amp;T n\u00e9h\u00e1ny aj\u00e1nl\u00e1st \u00e9s forr\u00e1shivatkoz\u00e1st biztos\u00edtott, hogy seg\u00edtsen megv\u00e9deni szem\u00e9lyes adatait, ha \u00e9rintett volt. A Kiberbiztons\u00e1gi \u00e9s Infrastrukt\u00fara Biztons\u00e1gi \u00dcgyn\u00f6ks\u00e9g (CISA) szint\u00e9n b\u00e1tor\u00edtja az \u00fcgyfeleket, hogy olvass\u00e1k el az AT&amp;T cikk\u00e9t tov\u00e1bbi inform\u00e1ci\u00f3k\u00e9rt \u00e9s enyh\u00edt\u00e9si \u00fatmutat\u00e1s\u00e9rt.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"what-happened\"><strong>Mi T\u00f6rt\u00e9nt<\/strong><\/h3>\n\n\n<p>Az AT&amp;T r\u00e1j\u00f6tt, hogy \u00fcgyf\u00e9ladatait illeg\u00e1lisan let\u00f6lt\u00f6tt\u00e9k a munkater\u00fclet\u00e9r\u0151l az egyik harmadik f\u00e9l felh\u0151platformj\u00e1n. Amikor \u00e9rtes\u00fcltek a megs\u00e9rt\u00e9sr\u0151l, az AT&amp;T vizsg\u00e1latot ind\u00edtott \u00e9s bevonta a legjobb kiberbiztons\u00e1gi szak\u00e9rt\u0151ket a probl\u00e9ma m\u00e9rt\u00e9k\u00e9nek meghat\u00e1roz\u00e1s\u00e1ra. <\/p>\n\n\n\n<p>A hozz\u00e1f\u00e9r\u00e9si pont m\u00e1r biztos\u00edtva volt. Meg\u00e1llap\u00edtott\u00e1k, hogy a megs\u00e9rt\u00e9s telefonh\u00edv\u00e1s- \u00e9s sz\u00f6veges \u00fczenetrekordokat \u00e9rintett, \u00e9s hogy a megs\u00e9rt\u00e9s az AT&amp;T szinte minden mobiltelefonos \u00fcgyfel\u00e9nek telefonh\u00edv\u00e1s- \u00e9s sz\u00f6veges \u00fczenetrekordjait \u00e9rintette 2022. m\u00e1jus 1-t\u0151l 2022. okt\u00f3ber 31-ig, valamint 2023. janu\u00e1r 2-\u00e1n. A rekordok tartalmazz\u00e1k azokat a telefonsz\u00e1mokat, amelyekre h\u00edv\u00e1sokat kezdem\u00e9nyeztek, vagy ahonnan az AT&amp;T vezet\u00e9k n\u00e9lk\u00fcli sz\u00e1mok kezdem\u00e9nyezt\u00e9k azokat, de tartalmazz\u00e1k az AT&amp;T vezet\u00e9kes \u00fcgyfeleket is. <\/p>\n\n\n\n<p>N\u00e9h\u00e1ny rekord tov\u00e1bb megy, \u00e9s tartalmazza a cellahely-azonos\u00edt\u00f3 sz\u00e1mokat, amelyek az interakci\u00f3khoz kapcsol\u00f3dnak. B\u00e1r ez nem \u00e9rinti a h\u00edv\u00e1sok vagy \u00fczenetek tartalm\u00e1t, az id\u0151b\u00e9lyegek, a t\u00e1rsadalombiztos\u00edt\u00e1si sz\u00e1mok, a sz\u00fclet\u00e9si d\u00e1tumok \u00e9s m\u00e1s szem\u00e9lyazonos\u00edt\u00e1sra alkalmas inform\u00e1ci\u00f3k m\u00e9g mindig kapcsol\u00f3dhatnak a n\u00e9vhez nyilv\u00e1nosan el\u00e9rhet\u0151 eszk\u00f6z\u00f6k\u00f6n kereszt\u00fcl.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"data-involved\"><strong>\u00c9rintett Adatok<\/strong><\/h3>\n\n\n<p><strong>Tartalmazott adatpontok<\/strong> tartalmazz\u00e1k az AT&amp;T sz\u00e1mokkal interakci\u00f3ba l\u00e9p\u0151 telefonsz\u00e1mok kever\u00e9k\u00e9t, a h\u00edv\u00e1sok vagy \u00fczenetek sz\u00e1m\u00e1t \u00e9s a teljes h\u00edv\u00e1sid\u0151tartamokat. A nem tartalmazott adatpontok a h\u00edv\u00e1sok vagy \u00fczenetek tartalma, az id\u0151b\u00e9lyegek, a t\u00e1rsadalombiztos\u00edt\u00e1si sz\u00e1mok, a sz\u00fclet\u00e9si d\u00e1tum \u00e9s m\u00e1s szem\u00e9lyazonos\u00edt\u00e1sra alkalmas inform\u00e1ci\u00f3k. Az AT&amp;T szerint nem gondolj\u00e1k, hogy az adatok nyilv\u00e1nosak lenn\u00e9nek, \u00e9s \u00e1tadt\u00e1k a r\u00e9szleteket a b\u0171n\u00fcld\u00f6z\u0151 hat\u00f3s\u00e1goknak, akik eddig legal\u00e1bb egy szem\u00e9lyt letart\u00f3ztattak.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"atampts-response\"><strong>AT&amp;T\u2019s Response<\/strong><\/h3>\n\n\n<p>Protection of customer data is critical to AT&amp;T. They have isolated the concerned access point and are continuously accessing and upgrading their security measures to keep pace with the ever-evolving cyber security threats. Change to \u201cAT&amp;T is dedicated to keeping a safe operating environment by investing in the security of their network with resources such as personnel, capital, and innovative technology advancements.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"recommendations-for-customers\"><strong>Aj\u00e1nl\u00e1sok \u00dcgyfeleknek<\/strong><\/h3>\n\n\n<p>Only open text messages from known and trusted sources to help protect yourself from phishing, smishing, and other online fraud. Do not respond to texts from unknown senders requesting personal information. Go directly to company websites and not through links provided in text messages. Check that the website is secure by ensuring the address has \u201chttps\u201d and includes the lock icon. Visit AT&amp;T\u2019s website. CyberAware also provides tips and information to help educate customers on fraud and cyber threats.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-check-if-your-data-was-impacted\"><strong>Hogyan Ellen\u0151rizheti, Hogy Az \u00d6n Adatai \u00c9rintettek-e<\/strong><\/h3>\n\n\n<p>Az AT&amp;T \u00e9rtes\u00edti az \u00e9rintett \u00fcgyfeleket sz\u00f6veges \u00fczenetben, e-mailben vagy amerikai postai \u00faton. Az \u00fcgyfelek bejelentkezhetnek online fi\u00f3kjukba is, hogy megn\u00e9zz\u00e9k, \u00e9rintettek-e. <strong>Fogyaszt\u00f3k:<\/strong> Jelentkezzen be myAT&amp;T fi\u00f3kj\u00e1ba. <strong>FirstNet\u00ae \u00dcgyn\u00f6ks\u00e9gek \u00e9s Egy\u00e9ni El\u0151fizet\u0151k:<\/strong> Jelentkezzen be fi\u00f3kj\u00e1ba. <strong>\u00dczleti \u00dcgyfelek:<\/strong> Jelentkezzen be myAT&amp;T vagy Premier fi\u00f3kj\u00e1ba.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-report-suspicious-activity\"><strong>Hogyan Jelentse a Gyan\u00fas Tev\u00e9kenys\u00e9get<\/strong><\/h3>\n\n\n<p><strong>Gyan\u00fas sz\u00f6veges tev\u00e9kenys\u00e9g:<\/strong> Don\u2019t respond. Forward the text to AT&amp;T for help. There is no charge to forward a text, and it won\u2019t count toward your text plan. <strong>Csal\u00e1s az AT&amp;T vezet\u00e9k n\u00e9lk\u00fcli sz\u00e1m\u00e1n:<\/strong> Submit it to the ATT\u2019s Fraud team. For fraud on another account, call customer service no. on your bill.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-liberty-customers\"><strong>Liberty \u00dcgyfelek Sz\u00e1m\u00e1ra<\/strong><\/h3>\n\n\n<p>This incident was when liberty customers were on ATT\u2019s network. So ATT can assist with questions, if there are any, about this breach.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"requesting-your-data\"><strong>Adatainak K\u00e9r\u00e9se<\/strong><\/h3>\n\n\n<p>A megs\u00e9rt\u00e9sben \u00e9rintett h\u00edv\u00e1sok \u00e9s \u00fczenetek pontos telefonsz\u00e1mainak megszerz\u00e9s\u00e9hez: <strong>Jelenlegi \u00dcgyfelek:<\/strong> Submit a request through AT&amp;T\u2019s online process, which is available through December 2024. <strong>Kor\u00e1bbi \u00dcgyfelek:<\/strong> Ha \u00e9rintett, az AT&amp;T felveszi \u00d6nnel a kapcsolatot, \u00e9s megadja \u00d6nnek a fi\u00f3ksz\u00e1mot \u00e9s egy \u00fcgyazonos\u00edt\u00f3t, amelyet beny\u00fajthat a k\u00e9r\u00e9s teljes\u00edt\u00e9s\u00e9hez. A k\u00e9r\u00e9s beny\u00fajt\u00e1s\u00e1nak \u00fatmutat\u00f3j\u00e1\u00e9rt, vagy ha \u00fczleti fi\u00f3kja van, k\u00e9rj\u00fck, t\u00e9rjen vissza erre az oldalra 2024. j\u00falius 19-\u00e9n.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-complete-notice\"><strong>A Teljes \u00c9rtes\u00edt\u00e9s<\/strong><\/h3>\n\n\n<p>Azok az \u00fcgyfelek, akiknek tov\u00e1bbi k\u00e9rd\u00e9seik vannak, kapcsolatba l\u00e9phetnek az AT&amp;T-vel a 800.852.4346-os sz\u00e1mon.<\/p>\n\n\n\n<p><strong>Megjegyz\u00e9s:<\/strong><\/p>\n\n\n\n<p>AT&amp;T\u2019s quick response to this data breach and their transparency regarding what happened further demonstrate security considerations in relation to the customer. Following the recommended steps below and guarding against risks will put customers in a much better position for personal information protection. Details can be found in the following official AT&amp;T post about the breach.<\/p>","protected":false},"excerpt":{"rendered":"<p>On July 12, AT&amp;T publicly announced that unauthorized actors accessed customer data on a third-party cloud platform. AT&amp;T has provided some recommendations and links to resources to help protect your\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hatalmas-adatvedelmi-incidens-az-att-nel-amit-az-ugyfeleknek-tudniuk-kell\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Hatalmas Adatsziv\u00e1rg\u00e1s az AT&amp;T-n\u00e9l: Amit Az \u00dcgyfeleknek Tudniuk Kell<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2525,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,16],"tags":[],"class_list":["post-2524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","category-data-breaches","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hatalmas-adatvedelmi-incidens-az-att-nel-amit-az-ugyfeleknek-tudniuk-kell\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"On July 12, AT&amp;T publicly announced that unauthorized actors accessed customer data on a third-party cloud platform. AT&amp;T has provided some recommendations and links to resources to help protect your&hellip; Continue reading Massive Data Breach at AT&amp;T: What Customers Need to Know\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hatalmas-adatvedelmi-incidens-az-att-nel-amit-az-ugyfeleknek-tudniuk-kell\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T18:10:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T18:11:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"956\" \/>\n\t<meta property=\"og:image:height\" content=\"515\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Massive Data Breach at AT&amp;T: What Customers Need to Know\",\"datePublished\":\"2024-07-12T18:10:38+00:00\",\"dateModified\":\"2024-07-12T18:11:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\"},\"wordCount\":813,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"articleSection\":[\"Cyber Threats\",\"Data Breaches\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\",\"name\":\"Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"datePublished\":\"2024-07-12T18:10:38+00:00\",\"dateModified\":\"2024-07-12T18:11:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"width\":956,\"height\":515,\"caption\":\"Massive Data Breach at AT&T What Customers Need to Know\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Massive Data Breach at AT&amp;T: What Customers Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00d3ri\u00e1si adatv\u00e9delmi incidens az AT&amp;T-n\u00e9l: Amit az \u00fcgyfeleknek tudniuk kell | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hatalmas-adatvedelmi-incidens-az-att-nel-amit-az-ugyfeleknek-tudniuk-kell\/","og_locale":"hu_HU","og_type":"article","og_title":"Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing","og_description":"On July 12, AT&amp;T publicly announced that unauthorized actors accessed customer data on a third-party cloud platform. AT&amp;T has provided some recommendations and links to resources to help protect your&hellip; Continue reading Massive Data Breach at AT&amp;T: What Customers Need to Know","og_url":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/hatalmas-adatvedelmi-incidens-az-att-nel-amit-az-ugyfeleknek-tudniuk-kell\/","og_site_name":"Security Briefing","article_published_time":"2024-07-12T18:10:38+00:00","article_modified_time":"2024-07-12T18:11:07+00:00","og_image":[{"width":956,"height":515,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"4 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Massive Data Breach at AT&amp;T: What Customers Need to Know","datePublished":"2024-07-12T18:10:38+00:00","dateModified":"2024-07-12T18:11:07+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/"},"wordCount":813,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","articleSection":["Cyber Threats","Data Breaches"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/","name":"\u00d3ri\u00e1si adatv\u00e9delmi incidens az AT&amp;T-n\u00e9l: Amit az \u00fcgyfeleknek tudniuk kell | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","datePublished":"2024-07-12T18:10:38+00:00","dateModified":"2024-07-12T18:11:07+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","width":956,"height":515,"caption":"Massive Data Breach at AT&T What Customers Need to Know"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Massive Data Breach at AT&amp;T: What Customers Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=2524"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2524\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/2525"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=2524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=2524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=2524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}