{"id":2524,"date":"2024-07-12T18:10:38","date_gmt":"2024-07-12T18:10:38","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2524"},"modified":"2024-07-12T18:11:07","modified_gmt":"2024-07-12T18:11:07","slug":"massiv-datalacka-pa-att-vad-kunder-behover-veta","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/cyberhot\/massiv-datalacka-pa-att-vad-kunder-behover-veta\/","title":{"rendered":"Massivt dataintr\u00e5ng vid AT&amp;T: Vad kunder beh\u00f6ver veta"},"content":{"rendered":"<p>Den 12 juli meddelade AT&amp;T offentligt att obeh\u00f6riga akt\u00f6rer f\u00e5tt tillg\u00e5ng till kunddata p\u00e5 en molnplattform fr\u00e5n tredje part.  AT&amp;T har tillhandah\u00e5llit n\u00e5gra rekommendationer och l\u00e4nkar till resurser f\u00f6r att hj\u00e4lpa till att skydda din personliga information om du p\u00e5verkades. Cybersecurity and Infrastructure Security Agency (CISA) uppmuntrar ocks\u00e5 kunder att l\u00e4sa AT&amp;T-artikeln f\u00f6r mer information och v\u00e4gledning om begr\u00e4nsning.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"what-happened\"><strong>Vad h\u00e4nde?<\/strong><\/h3>\n\n\n<p>AT&amp;T uppt\u00e4ckte att deras kunddata hade laddats ned olagligt fr\u00e5n deras arbetsyta p\u00e5 en av tredjeparts molnplattformar. N\u00e4r AT&amp;T fick k\u00e4nnedom om intr\u00e5nget inledde man en utredning och involverade de fr\u00e4msta cybers\u00e4kerhetsexperterna f\u00f6r att fastst\u00e4lla problemets omfattning. <\/p>\n\n\n\n<p>\u00c5tkomstpunkten var redan s\u00e4krad. Det fastst\u00e4lldes att intr\u00e5nget involverade register \u00f6ver telefonsamtal och textmeddelanden och att intr\u00e5nget involverade register \u00f6ver telefonsamtal och textmeddelanden fr\u00e5n n\u00e4stan alla AT&amp;T-mobilkunder fr\u00e5n 1 maj 2022 till 31 oktober 2022 samt den 2 januari 2023. Registren inkluderar telefonnummer till vilka samtal ringdes eller fr\u00e5n vilka AT&amp;T tr\u00e5dl\u00f6sa nummer gjorde dem men inkluderar ocks\u00e5 AT&amp;T fasta kunder. <\/p>\n\n\n\n<p>Vissa register g\u00e5r l\u00e4ngre och inkluderar ID-nummer f\u00f6r mobilsajter som \u00e4r kopplade till interaktionerna. \u00c4ven om detta inte involverar inneh\u00e5llet i samtalen eller texterna, kan tidsst\u00e4mplar, personnummer, f\u00f6delsedatum och annan personligt identifierbar information fortfarande kopplas till namnet genom allm\u00e4nt tillg\u00e4ngliga verktyg.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"data-involved\"><strong>Inblandade data<\/strong><\/h3>\n\n\n<p><strong>Datapunkter som ing\u00e5r<\/strong> inkluderar en blandning av telefonnummer som interagerade med AT&amp;T-numren, antalet samtal eller texter och den totala samtalstiden. Datapunkter som inte ing\u00e5r \u00e4r inneh\u00e5llet i samtalen eller texterna, tidsst\u00e4mplar, personnummer, f\u00f6delsedatum och annan personligt identifierbar information. AT&amp;T s\u00e4ger att de inte tror att uppgifterna \u00e4r offentliga och \u00f6verl\u00e4mnade detaljerna till brottsbek\u00e4mpande myndigheter som hittills har arresterat minst en individ.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"atampts-response\"><strong>AT&amp;T:s svar<\/strong><\/h3>\n\n\n<p>Skydd av kunddata \u00e4r avg\u00f6rande f\u00f6r AT&amp;T. De har isolerat den ber\u00f6rda \u00e5tkomstpunkten och ser kontinuerligt \u00f6ver och uppgraderar sina s\u00e4kerhets\u00e5tg\u00e4rder f\u00f6r att h\u00e5lla j\u00e4mna steg med de st\u00e4ndigt f\u00f6r\u00e4nderliga hoten mot cybers\u00e4kerheten. \u00c4ndra till \"AT&amp;T str\u00e4var efter att uppr\u00e4tth\u00e5lla en s\u00e4ker driftsmilj\u00f6 genom att investera i s\u00e4kerheten i sitt n\u00e4tverk med resurser som personal, kapital och innovativa tekniska framsteg.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"recommendations-for-customers\"><strong>Rekommendationer till kunder<\/strong><\/h3>\n\n\n<p>\u00d6ppna bara textmeddelanden fr\u00e5n k\u00e4nda och betrodda k\u00e4llor f\u00f6r att skydda dig mot n\u00e4tfiske, smishing och andra bedr\u00e4gerier p\u00e5 n\u00e4tet. Svara inte p\u00e5 sms fr\u00e5n ok\u00e4nda avs\u00e4ndare som beg\u00e4r personlig information. G\u00e5 direkt till f\u00f6retagets webbplats och inte via l\u00e4nkar i textmeddelanden. Kontrollera att webbplatsen \u00e4r s\u00e4ker genom att se till att adressen har \"https\" och inneh\u00e5ller l\u00e5sikonen. Bes\u00f6k AT&amp;T:s webbplats. CyberAware tillhandah\u00e5ller ocks\u00e5 tips och information f\u00f6r att hj\u00e4lpa till att utbilda kunder om bedr\u00e4gerier och cyberhot.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-check-if-your-data-was-impacted\"><strong>S\u00e5 h\u00e4r kontrollerar du om dina data har p\u00e5verkats<\/strong><\/h3>\n\n\n<p>AT&amp;T kommer att meddela ber\u00f6rda kunder via text, e-post eller amerikansk post. Kunder kan ocks\u00e5 logga in p\u00e5 sitt konto online f\u00f6r att se om de p\u00e5verkas. <strong>Konsumenter:<\/strong> Logga in p\u00e5 ditt myAT&amp;T-konto. <strong>FirstNet\u00ae-organisationer och enskilda abonnenter:<\/strong> Logga in p\u00e5 ditt konto. <strong>Verksamheter:<\/strong> Logga in p\u00e5 ditt myAT&amp;T- eller Premier-konto.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-report-suspicious-activity\"><strong>S\u00e5 h\u00e4r rapporterar du misst\u00e4nkt aktivitet<\/strong><\/h3>\n\n\n<p><strong>Misst\u00e4nkt textaktivitet:<\/strong> Svara inte. Vidarebefordra texten till AT&amp;T f\u00f6r att f\u00e5 hj\u00e4lp. Det kostar inget att vidarebefordra ett sms, och det r\u00e4knas inte in i din sms-plan. <strong>Bedr\u00e4geri p\u00e5 ditt AT&amp;T tr\u00e5dl\u00f6sa nummer:<\/strong> Skicka den till ATT:s bedr\u00e4geriteam. F\u00f6r bedr\u00e4geri p\u00e5 ett annat konto, ring kundtj\u00e4nstnumret p\u00e5 din faktura.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-liberty-customers\"><strong>F\u00f6r Liberty-kunder<\/strong><\/h3>\n\n\n<p>Denna incident intr\u00e4ffade n\u00e4r liberty-kunder var p\u00e5 ATT:s n\u00e4tverk. S\u00e5 ATT kan hj\u00e4lpa till med fr\u00e5gor, om det finns n\u00e5gra, om detta intr\u00e5ng.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"requesting-your-data\"><strong>Beg\u00e4ran om dina uppgifter<\/strong><\/h3>\n\n\n<p>F\u00f6r att f\u00e5 de exakta telefonnumren till de samtal och sms som var inblandade i intr\u00e5nget: <strong>Nuvarande kunder:<\/strong> L\u00e4mna in en beg\u00e4ran via AT&amp;T:s onlineprocess, som \u00e4r tillg\u00e4nglig till och med december 2024. <strong>Tidigare kunder:<\/strong> Om du p\u00e5verkas kommer AT&amp;T att kontakta dig och f\u00f6rse dig med ett kontonummer och ett \u00e4rendenummer som du kan skicka in f\u00f6r att g\u00f6ra din beg\u00e4ran. F\u00f6r instruktioner om hur du skickar in beg\u00e4ran, eller om du har ett f\u00f6retagskonto, v\u00e4nligen kom tillbaka till den h\u00e4r webbplatsen den 19 juli 2024.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-complete-notice\"><strong>Det fullst\u00e4ndiga meddelandet<\/strong><\/h3>\n\n\n<p>Kunder med ytterligare fr\u00e5gor kan kontakta AT&amp;T p\u00e5 800.852.4346.<\/p>\n\n\n\n<p><strong>Obs!<\/strong><\/p>\n\n\n\n<p>AT&amp;T:s snabba reaktion p\u00e5 det h\u00e4r dataintr\u00e5nget och deras \u00f6ppenhet om vad som h\u00e4nde visar ytterligare p\u00e5 s\u00e4kerhetsaspekterna i f\u00f6rh\u00e5llande till kunden. Genom att f\u00f6lja de rekommenderade stegen nedan och skydda sig mot risker kommer kunderna att f\u00e5 en mycket b\u00e4ttre position f\u00f6r skydd av personuppgifter. Detaljer finns i f\u00f6ljande officiella AT&amp;T-inl\u00e4gg om intr\u00e5nget.<\/p>","protected":false},"excerpt":{"rendered":"<p>Den 12 juli meddelade AT&amp;T offentligt att obeh\u00f6riga akt\u00f6rer f\u00e5tt tillg\u00e5ng till kunddata p\u00e5 en molnplattform fr\u00e5n tredje part. AT&amp;T har tillhandah\u00e5llit n\u00e5gra rekommendationer och l\u00e4nkar till resurser f\u00f6r att hj\u00e4lpa till att skydda din ... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/cyberhot\/massiv-datalacka-pa-att-vad-kunder-behover-veta\/\">Continue reading <span class=\"screen-reader-text\">Massivt dataintr\u00e5ng vid AT&amp;T: Vad kunder beh\u00f6ver veta<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2525,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,16],"tags":[],"class_list":["post-2524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","category-data-breaches","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/cyberhot\/massiv-datalacka-pa-att-vad-kunder-behover-veta\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"On July 12, AT&amp;T publicly announced that unauthorized actors accessed customer data on a third-party cloud platform. AT&amp;T has provided some recommendations and links to resources to help protect your&hellip; Forts\u00e4tt l\u00e4sa Massive Data Breach at AT&amp;T: What Customers Need to Know\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/cyberhot\/massiv-datalacka-pa-att-vad-kunder-behover-veta\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T18:10:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T18:11:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"956\" \/>\n\t<meta property=\"og:image:height\" content=\"515\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Massive Data Breach at AT&amp;T: What Customers Need to Know\",\"datePublished\":\"2024-07-12T18:10:38+00:00\",\"dateModified\":\"2024-07-12T18:11:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\"},\"wordCount\":813,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"articleSection\":[\"Cyber Threats\",\"Data Breaches\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\",\"name\":\"Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"datePublished\":\"2024-07-12T18:10:38+00:00\",\"dateModified\":\"2024-07-12T18:11:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"width\":956,\"height\":515,\"caption\":\"Massive Data Breach at AT&T What Customers Need to Know\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Massive Data Breach at AT&amp;T: What Customers Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Massiv datal\u00e4cka hos AT&amp;T: Vad kunder beh\u00f6ver veta | S\u00e4kerhetsinformation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/cyberhot\/massiv-datalacka-pa-att-vad-kunder-behover-veta\/","og_locale":"sv_SE","og_type":"article","og_title":"Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing","og_description":"On July 12, AT&amp;T publicly announced that unauthorized actors accessed customer data on a third-party cloud platform. AT&amp;T has provided some recommendations and links to resources to help protect your&hellip; Forts\u00e4tt l\u00e4sa Massive Data Breach at AT&amp;T: What Customers Need to Know","og_url":"https:\/\/securitybriefing.net\/sv\/cyberhot\/massiv-datalacka-pa-att-vad-kunder-behover-veta\/","og_site_name":"Security Briefing","article_published_time":"2024-07-12T18:10:38+00:00","article_modified_time":"2024-07-12T18:11:07+00:00","og_image":[{"width":956,"height":515,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"C\u00e9sar Daniel Barreto","Ber\u00e4knad l\u00e4stid":"4 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Massive Data Breach at AT&amp;T: What Customers Need to Know","datePublished":"2024-07-12T18:10:38+00:00","dateModified":"2024-07-12T18:11:07+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/"},"wordCount":813,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","articleSection":["Cyber Threats","Data Breaches"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/","name":"Massiv datal\u00e4cka hos AT&amp;T: Vad kunder beh\u00f6ver veta | S\u00e4kerhetsinformation","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","datePublished":"2024-07-12T18:10:38+00:00","dateModified":"2024-07-12T18:11:07+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","width":956,"height":515,"caption":"Massive Data Breach at AT&T What Customers Need to Know"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Massive Data Breach at AT&amp;T: What Customers Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar Daniel Barreto","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u00e4r en uppskattad cybers\u00e4kerhetsskribent och expert, k\u00e4nd f\u00f6r sin djupg\u00e5ende kunskap och f\u00f6rm\u00e5ga att f\u00f6renkla komplexa cybers\u00e4kerhets\u00e4mnen. Han har l\u00e5ng erfarenhet av n\u00e4tverkss\u00e4kerhet och dataskydd och bidrar regelbundet med insiktsfulla artiklar och analyser om de senaste trenderna inom cybers\u00e4kerhet, som utbildar b\u00e5de yrkesverksamma och allm\u00e4nheten.","url":"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/2524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=2524"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/2524\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/2525"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=2524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=2524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=2524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}