{"id":2524,"date":"2024-07-12T18:10:38","date_gmt":"2024-07-12T18:10:38","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2524"},"modified":"2024-07-12T18:11:07","modified_gmt":"2024-07-12T18:11:07","slug":"ro-ri-du-lieu-lon-tai-att-nhung-dieu-khach-hang-can-biet","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/ro-ri-du-lieu-lon-tai-att-nhung-dieu-khach-hang-can-biet\/","title":{"rendered":"Vi ph\u1ea1m d\u1eef li\u1ec7u h\u00e0ng lo\u1ea1t t\u1ea1i AT&amp;T: Nh\u1eefng \u0111i\u1ec1u kh\u00e1ch h\u00e0ng c\u1ea7n bi\u1ebft"},"content":{"rendered":"<p>V\u00e0o ng\u00e0y 12 th\u00e1ng 7, AT&amp;T \u0111\u00e3 c\u00f4ng khai th\u00f4ng b\u00e1o r\u1eb1ng nh\u1eefng k\u1ebb t\u1ea5n c\u00f4ng tr\u00e1i ph\u00e9p \u0111\u00e3 truy c\u1eadp d\u1eef li\u1ec7u kh\u00e1ch h\u00e0ng tr\u00ean n\u1ec1n t\u1ea3ng \u0111\u00e1m m\u00e2y c\u1ee7a b\u00ean th\u1ee9 ba. AT&amp;T \u0111\u00e3 cung c\u1ea5p m\u1ed9t s\u1ed1 khuy\u1ebfn ngh\u1ecb v\u00e0 li\u00ean k\u1ebft \u0111\u1ebfn c\u00e1c ngu\u1ed3n t\u00e0i nguy\u00ean \u0111\u1ec3 gi\u00fap b\u1ea3o v\u1ec7 th\u00f4ng tin c\u00e1 nh\u00e2n c\u1ee7a b\u1ea1n n\u1ebfu b\u1ea1n b\u1ecb \u1ea3nh h\u01b0\u1edfng. C\u01a1 quan An ninh m\u1ea1ng v\u00e0 C\u01a1 s\u1edf h\u1ea1 t\u1ea7ng (CISA) c\u0169ng khuy\u1ebfn kh\u00edch Kh\u00e1ch h\u00e0ng \u0111\u1ecdc b\u00e0i vi\u1ebft c\u1ee7a AT&amp;T \u0111\u1ec3 bi\u1ebft th\u00eam th\u00f4ng tin v\u00e0 h\u01b0\u1edbng d\u1eabn gi\u1ea3m thi\u1ec3u.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"what-happened\"><strong>Chuy\u1ec7n g\u00ec \u0111\u00e3 x\u1ea3y ra th\u1ebf<\/strong><\/h3>\n\n\n<p>AT&amp;T ph\u00e1t hi\u1ec7n ra r\u1eb1ng d\u1eef li\u1ec7u kh\u00e1ch h\u00e0ng c\u1ee7a m\u00ecnh \u0111\u00e3 b\u1ecb t\u1ea3i xu\u1ed1ng b\u1ea5t h\u1ee3p ph\u00e1p t\u1eeb kh\u00f4ng gian l\u00e0m vi\u1ec7c c\u1ee7a m\u00ecnh tr\u00ean m\u1ed9t trong nh\u1eefng n\u1ec1n t\u1ea3ng \u0111\u00e1m m\u00e2y c\u1ee7a b\u00ean th\u1ee9 ba. Khi bi\u1ebft v\u1ec1 v\u1ee5 vi ph\u1ea1m, AT&amp;T \u0111\u00e3 ti\u1ebfn h\u00e0nh \u0111i\u1ec1u tra v\u00e0 li\u00ean h\u1ec7 v\u1edbi c\u00e1c chuy\u00ean gia an ninh m\u1ea1ng h\u00e0ng \u0111\u1ea7u \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh m\u1ee9c \u0111\u1ed9 c\u1ee7a v\u1ea5n \u0111\u1ec1. <\/p>\n\n\n\n<p>\u0110i\u1ec3m truy c\u1eadp \u0111\u00e3 \u0111\u01b0\u1ee3c b\u1ea3o m\u1eadt. Ng\u01b0\u1eddi ta x\u00e1c \u0111\u1ecbnh r\u1eb1ng vi ph\u1ea1m li\u00ean quan \u0111\u1ebfn h\u1ed3 s\u01a1 cu\u1ed9c g\u1ecdi \u0111i\u1ec7n tho\u1ea1i v\u00e0 tin nh\u1eafn v\u0103n b\u1ea3n v\u00e0 vi ph\u1ea1m li\u00ean quan \u0111\u1ebfn h\u1ed3 s\u01a1 cu\u1ed9c g\u1ecdi \u0111i\u1ec7n tho\u1ea1i v\u00e0 tin nh\u1eafn v\u0103n b\u1ea3n c\u1ee7a h\u1ea7u h\u1ebft kh\u00e1ch h\u00e0ng di \u0111\u1ed9ng AT&amp;T t\u1eeb ng\u00e0y 1 th\u00e1ng 5 n\u0103m 2022 \u0111\u1ebfn ng\u00e0y 31 th\u00e1ng 10 n\u0103m 2022 c\u0169ng nh\u01b0 v\u00e0o ng\u00e0y 2 th\u00e1ng 1 n\u0103m 2023. H\u1ed3 s\u01a1 bao g\u1ed3m s\u1ed1 \u0111i\u1ec7n tho\u1ea1i m\u00e0 cu\u1ed9c g\u1ecdi \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n ho\u1eb7c t\u1eeb s\u1ed1 \u0111i\u1ec7n tho\u1ea1i kh\u00f4ng d\u00e2y AT&amp;T th\u1ef1c hi\u1ec7n cu\u1ed9c g\u1ecdi nh\u01b0ng c\u0169ng bao g\u1ed3m c\u1ea3 kh\u00e1ch h\u00e0ng \u0111i\u1ec7n tho\u1ea1i c\u1ed1 \u0111\u1ecbnh AT&amp;T. <\/p>\n\n\n\n<p>M\u1ed9t s\u1ed1 h\u1ed3 s\u01a1 c\u00f2n \u0111i xa h\u01a1n khi bao g\u1ed3m s\u1ed1 ID c\u1ee7a trang web di \u0111\u1ed9ng li\u00ean quan \u0111\u1ebfn c\u00e1c t\u01b0\u01a1ng t\u00e1c. M\u1eb7c d\u00f9 \u0111i\u1ec1u n\u00e0y kh\u00f4ng li\u00ean quan \u0111\u1ebfn n\u1ed9i dung c\u1ee7a c\u00e1c cu\u1ed9c g\u1ecdi ho\u1eb7c tin nh\u1eafn, d\u1ea5u th\u1eddi gian, s\u1ed1 An sinh x\u00e3 h\u1ed9i, ng\u00e0y sinh v\u00e0 th\u00f4ng tin nh\u1eadn d\u1ea1ng c\u00e1 nh\u00e2n kh\u00e1c v\u1eabn c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i v\u1edbi t\u00ean th\u00f4ng qua c\u00e1c c\u00f4ng c\u1ee5 c\u00f4ng khai.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"data-involved\"><strong>D\u1eef li\u1ec7u li\u00ean quan<\/strong><\/h3>\n\n\n<p><strong>C\u00e1c \u0111i\u1ec3m d\u1eef li\u1ec7u \u0111\u01b0\u1ee3c bao g\u1ed3m<\/strong> bao g\u1ed3m s\u1ef1 k\u1ebft h\u1ee3p gi\u1eefa c\u00e1c s\u1ed1 \u0111i\u1ec7n tho\u1ea1i \u0111\u00e3 t\u01b0\u01a1ng t\u00e1c v\u1edbi s\u1ed1 AT&amp;T, s\u1ed1 l\u01b0\u1ee3ng cu\u1ed9c g\u1ecdi ho\u1eb7c tin nh\u1eafn v\u00e0 t\u1ed5ng th\u1eddi l\u01b0\u1ee3ng cu\u1ed9c g\u1ecdi. C\u00e1c \u0111i\u1ec3m d\u1eef li\u1ec7u kh\u00f4ng \u0111\u01b0\u1ee3c bao g\u1ed3m l\u00e0 n\u1ed9i dung c\u1ee7a c\u00e1c cu\u1ed9c g\u1ecdi ho\u1eb7c tin nh\u1eafn, d\u1ea5u th\u1eddi gian, s\u1ed1 An sinh x\u00e3 h\u1ed9i, ng\u00e0y sinh v\u00e0 c\u00e1c th\u00f4ng tin nh\u1eadn d\u1ea1ng c\u00e1 nh\u00e2n kh\u00e1c. AT&amp;T cho bi\u1ebft h\u1ecd kh\u00f4ng ngh\u0129 r\u1eb1ng d\u1eef li\u1ec7u l\u00e0 c\u00f4ng khai v\u00e0 \u0111\u00e3 chuy\u1ec3n giao th\u00f4ng tin chi ti\u1ebft cho c\u00e1c c\u01a1 quan th\u1ef1c thi ph\u00e1p lu\u1eadt \u0111\u00e3 b\u1eaft gi\u1eef \u00edt nh\u1ea5t m\u1ed9t c\u00e1 nh\u00e2n cho \u0111\u1ebfn nay.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"atampts-response\"><strong>Ph\u1ea3n h\u1ed3i c\u1ee7a AT&amp;T<\/strong><\/h3>\n\n\n<p>B\u1ea3o v\u1ec7 d\u1eef li\u1ec7u kh\u00e1ch h\u00e0ng l\u00e0 \u0111i\u1ec1u t\u1ed1i quan tr\u1ecdng \u0111\u1ed1i v\u1edbi AT&amp;T. H\u1ecd \u0111\u00e3 c\u00f4 l\u1eadp \u0111i\u1ec3m truy c\u1eadp c\u00f3 li\u00ean quan v\u00e0 li\u00ean t\u1ee5c truy c\u1eadp v\u00e0 n\u00e2ng c\u1ea5p c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt c\u1ee7a m\u00ecnh \u0111\u1ec3 theo k\u1ecbp c\u00e1c m\u1ed1i \u0111e d\u1ecda an ninh m\u1ea1ng \u0111ang kh\u00f4ng ng\u1eebng ph\u00e1t tri\u1ec3n. Thay \u0111\u1ed5i th\u00e0nh \u201cAT&amp;T cam k\u1ebft duy tr\u00ec m\u00f4i tr\u01b0\u1eddng ho\u1ea1t \u0111\u1ed9ng an to\u00e0n b\u1eb1ng c\u00e1ch \u0111\u1ea7u t\u01b0 v\u00e0o b\u1ea3o m\u1eadt m\u1ea1ng c\u1ee7a m\u00ecnh b\u1eb1ng c\u00e1c ngu\u1ed3n l\u1ef1c nh\u01b0 nh\u00e2n s\u1ef1, v\u1ed1n v\u00e0 c\u00e1c ti\u1ebfn b\u1ed9 c\u00f4ng ngh\u1ec7 ti\u00ean ti\u1ebfn.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"recommendations-for-customers\"><strong>Khuy\u1ebfn ngh\u1ecb cho kh\u00e1ch h\u00e0ng<\/strong><\/h3>\n\n\n<p>Ch\u1ec9 m\u1edf tin nh\u1eafn v\u0103n b\u1ea3n t\u1eeb c\u00e1c ngu\u1ed3n \u0111\u00e3 bi\u1ebft v\u00e0 \u0111\u00e1ng tin c\u1eady \u0111\u1ec3 gi\u00fap b\u1ea3o v\u1ec7 b\u1ea1n kh\u1ecfi l\u1eeba \u0111\u1ea3o, tin nh\u1eafn SMS v\u00e0 c\u00e1c h\u00e0nh vi gian l\u1eadn tr\u1ef1c tuy\u1ebfn kh\u00e1c. Kh\u00f4ng tr\u1ea3 l\u1eddi tin nh\u1eafn t\u1eeb ng\u01b0\u1eddi g\u1eedi kh\u00f4ng x\u00e1c \u0111\u1ecbnh y\u00eau c\u1ea7u th\u00f4ng tin c\u00e1 nh\u00e2n. Truy c\u1eadp tr\u1ef1c ti\u1ebfp v\u00e0o trang web c\u1ee7a c\u00f4ng ty v\u00e0 kh\u00f4ng th\u00f4ng qua c\u00e1c li\u00ean k\u1ebft \u0111\u01b0\u1ee3c cung c\u1ea5p trong tin nh\u1eafn v\u0103n b\u1ea3n. Ki\u1ec3m tra xem trang web c\u00f3 an to\u00e0n kh\u00f4ng b\u1eb1ng c\u00e1ch \u0111\u1ea3m b\u1ea3o \u0111\u1ecba ch\u1ec9 c\u00f3 \u201chttps\u201d v\u00e0 bao g\u1ed3m bi\u1ec3u t\u01b0\u1ee3ng \u1ed5 kh\u00f3a. Truy c\u1eadp trang web c\u1ee7a AT&amp;T. CyberAware c\u0169ng cung c\u1ea5p c\u00e1c m\u1eb9o v\u00e0 th\u00f4ng tin \u0111\u1ec3 gi\u00fap gi\u00e1o d\u1ee5c kh\u00e1ch h\u00e0ng v\u1ec1 gian l\u1eadn v\u00e0 c\u00e1c m\u1ed1i \u0111e d\u1ecda tr\u00ean m\u1ea1ng.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-check-if-your-data-was-impacted\"><strong>C\u00e1ch ki\u1ec3m tra xem d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n c\u00f3 b\u1ecb \u1ea3nh h\u01b0\u1edfng kh\u00f4ng<\/strong><\/h3>\n\n\n<p>AT&amp;T s\u1ebd th\u00f4ng b\u00e1o cho kh\u00e1ch h\u00e0ng b\u1ecb \u1ea3nh h\u01b0\u1edfng qua tin nh\u1eafn, email ho\u1eb7c th\u01b0 b\u01b0u \u0111i\u1ec7n Hoa K\u1ef3. Kh\u00e1ch h\u00e0ng c\u0169ng c\u00f3 th\u1ec3 \u0111\u0103ng nh\u1eadp v\u00e0o t\u00e0i kho\u1ea3n tr\u1ef1c tuy\u1ebfn c\u1ee7a m\u00ecnh \u0111\u1ec3 xem h\u1ecd c\u00f3 b\u1ecb \u1ea3nh h\u01b0\u1edfng hay kh\u00f4ng. <strong>Ng\u01b0\u1eddi ti\u00eau d\u00f9ng:<\/strong> \u0110\u0103ng nh\u1eadp v\u00e0o t\u00e0i kho\u1ea3n myAT&amp;T c\u1ee7a b\u1ea1n. <strong>C\u00e1c \u0111\u1ea1i l\u00fd v\u00e0 ng\u01b0\u1eddi \u0111\u0103ng k\u00fd c\u00e1 nh\u00e2n c\u1ee7a FirstNet\u00ae:<\/strong> \u0110\u0103ng nh\u1eadp v\u00e0o t\u00e0i kho\u1ea3n c\u1ee7a b\u1ea1n. <strong>Doanh nghi\u1ec7p:<\/strong> \u0110\u0103ng nh\u1eadp v\u00e0o t\u00e0i kho\u1ea3n myAT&amp;T ho\u1eb7c Premier c\u1ee7a b\u1ea1n.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-report-suspicious-activity\"><strong>C\u00e1ch b\u00e1o c\u00e1o ho\u1ea1t \u0111\u1ed9ng \u0111\u00e1ng ng\u1edd<\/strong><\/h3>\n\n\n<p><strong>Ho\u1ea1t \u0111\u1ed9ng v\u0103n b\u1ea3n \u0111\u00e1ng ng\u1edd:<\/strong> Kh\u00f4ng tr\u1ea3 l\u1eddi. Chuy\u1ec3n ti\u1ebfp tin nh\u1eafn \u0111\u1ebfn AT&amp;T \u0111\u1ec3 \u0111\u01b0\u1ee3c tr\u1ee3 gi\u00fap. Kh\u00f4ng m\u1ea5t ph\u00ed khi chuy\u1ec3n ti\u1ebfp tin nh\u1eafn v\u00e0 tin nh\u1eafn n\u00e0y s\u1ebd kh\u00f4ng \u0111\u01b0\u1ee3c t\u00ednh v\u00e0o g\u00f3i tin nh\u1eafn c\u1ee7a b\u1ea1n. <strong>Gian l\u1eadn tr\u00ean s\u1ed1 \u0111i\u1ec7n tho\u1ea1i kh\u00f4ng d\u00e2y AT&amp;T c\u1ee7a b\u1ea1n:<\/strong> G\u1eedi \u0111\u1ebfn nh\u00f3m ch\u1ed1ng gian l\u1eadn c\u1ee7a ATT. \u0110\u1ed1i v\u1edbi gian l\u1eadn tr\u00ean t\u00e0i kho\u1ea3n kh\u00e1c, h\u00e3y g\u1ecdi \u0111\u1ebfn s\u1ed1 d\u1ecbch v\u1ee5 kh\u00e1ch h\u00e0ng tr\u00ean h\u00f3a \u0111\u01a1n c\u1ee7a b\u1ea1n.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-liberty-customers\"><strong>D\u00e0nh cho kh\u00e1ch h\u00e0ng Liberty<\/strong><\/h3>\n\n\n<p>S\u1ef1 c\u1ed1 n\u00e0y x\u1ea3y ra khi kh\u00e1ch h\u00e0ng c\u1ee7a Liberty \u0111ang s\u1eed d\u1ee5ng m\u1ea1ng c\u1ee7a ATT. V\u00ec v\u1eady, ATT c\u00f3 th\u1ec3 h\u1ed7 tr\u1ee3 gi\u1ea3i \u0111\u00e1p c\u00e1c th\u1eafc m\u1eafc, n\u1ebfu c\u00f3, v\u1ec1 vi ph\u1ea1m n\u00e0y.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"requesting-your-data\"><strong>Y\u00eau c\u1ea7u d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n<\/strong><\/h3>\n\n\n<p>\u0110\u1ec3 bi\u1ebft s\u1ed1 \u0111i\u1ec7n tho\u1ea1i ch\u00ednh x\u00e1c c\u1ee7a c\u00e1c cu\u1ed9c g\u1ecdi v\u00e0 tin nh\u1eafn li\u00ean quan \u0111\u1ebfn v\u1ee5 vi ph\u1ea1m: <strong>Kh\u00e1ch h\u00e0ng hi\u1ec7n t\u1ea1i:<\/strong> G\u1eedi y\u00eau c\u1ea7u th\u00f4ng qua quy tr\u00ecnh tr\u1ef1c tuy\u1ebfn c\u1ee7a AT&amp;T, c\u00f3 hi\u1ec7u l\u1ef1c \u0111\u1ebfn th\u00e1ng 12 n\u0103m 2024. <strong>Kh\u00e1ch h\u00e0ng tr\u01b0\u1edbc \u0111\u00e2y:<\/strong> N\u1ebfu b\u1ea1n b\u1ecb \u1ea3nh h\u01b0\u1edfng, AT&amp;T s\u1ebd li\u00ean h\u1ec7 v\u1edbi b\u1ea1n v\u00e0 cung c\u1ea5p cho b\u1ea1n s\u1ed1 t\u00e0i kho\u1ea3n v\u00e0 s\u1ed1 v\u1ee5 vi\u1ec7c m\u00e0 b\u1ea1n c\u00f3 th\u1ec3 g\u1eedi \u0111\u1ec3 th\u1ef1c hi\u1ec7n y\u00eau c\u1ea7u c\u1ee7a m\u00ecnh. \u0110\u1ec3 bi\u1ebft h\u01b0\u1edbng d\u1eabn v\u1ec1 c\u00e1ch g\u1eedi y\u00eau c\u1ea7u ho\u1eb7c n\u1ebfu b\u1ea1n c\u00f3 t\u00e0i kho\u1ea3n doanh nghi\u1ec7p, vui l\u00f2ng quay l\u1ea1i trang web n\u00e0y v\u00e0o ng\u00e0y 19 th\u00e1ng 7 n\u0103m 2024.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-complete-notice\"><strong>Th\u00f4ng b\u00e1o \u0111\u1ea7y \u0111\u1ee7<\/strong><\/h3>\n\n\n<p>Kh\u00e1ch h\u00e0ng c\u00f3 th\u00eam th\u1eafc m\u1eafc c\u00f3 th\u1ec3 li\u00ean h\u1ec7 v\u1edbi AT&amp;T theo s\u1ed1 800.852.4346.<\/p>\n\n\n\n<p><strong>Ghi ch\u00fa:<\/strong><\/p>\n\n\n\n<p>Ph\u1ea3n \u1ee9ng nhanh ch\u00f3ng c\u1ee7a AT&amp;T \u0111\u1ed1i v\u1edbi v\u1ee5 vi ph\u1ea1m d\u1eef li\u1ec7u n\u00e0y v\u00e0 s\u1ef1 minh b\u1ea1ch c\u1ee7a h\u1ecd v\u1ec1 nh\u1eefng g\u00ec \u0111\u00e3 x\u1ea3y ra c\u00e0ng ch\u1ee9ng minh th\u00eam nh\u1eefng c\u00e2n nh\u1eafc v\u1ec1 b\u1ea3o m\u1eadt li\u00ean quan \u0111\u1ebfn kh\u00e1ch h\u00e0ng. Th\u1ef1c hi\u1ec7n theo c\u00e1c b\u01b0\u1edbc \u0111\u01b0\u1ee3c khuy\u1ebfn ngh\u1ecb b\u00ean d\u01b0\u1edbi v\u00e0 b\u1ea3o v\u1ec7 kh\u1ecfi r\u1ee7i ro s\u1ebd gi\u00fap kh\u00e1ch h\u00e0ng c\u00f3 v\u1ecb th\u1ebf t\u1ed1t h\u01a1n nhi\u1ec1u \u0111\u1ec3 b\u1ea3o v\u1ec7 th\u00f4ng tin c\u00e1 nh\u00e2n. Chi ti\u1ebft c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y trong b\u00e0i \u0111\u0103ng ch\u00ednh th\u1ee9c sau \u0111\u00e2y c\u1ee7a AT&amp;T v\u1ec1 v\u1ee5 vi ph\u1ea1m.<\/p>","protected":false},"excerpt":{"rendered":"<p>V\u00e0o ng\u00e0y 12 th\u00e1ng 7, AT&amp;T \u0111\u00e3 c\u00f4ng khai th\u00f4ng b\u00e1o r\u1eb1ng nh\u1eefng k\u1ebb t\u1ea5n c\u00f4ng tr\u00e1i ph\u00e9p \u0111\u00e3 truy c\u1eadp d\u1eef li\u1ec7u kh\u00e1ch h\u00e0ng tr\u00ean n\u1ec1n t\u1ea3ng \u0111\u00e1m m\u00e2y c\u1ee7a b\u00ean th\u1ee9 ba. AT&amp;T \u0111\u00e3 cung c\u1ea5p m\u1ed9t s\u1ed1 khuy\u1ebfn ngh\u1ecb v\u00e0 li\u00ean k\u1ebft \u0111\u1ebfn c\u00e1c ngu\u1ed3n t\u00e0i nguy\u00ean \u0111\u1ec3 gi\u00fap b\u1ea3o v\u1ec7\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/ro-ri-du-lieu-lon-tai-att-nhung-dieu-khach-hang-can-biet\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">Vi ph\u1ea1m d\u1eef li\u1ec7u h\u00e0ng lo\u1ea1t t\u1ea1i AT&amp;T: Nh\u1eefng \u0111i\u1ec1u kh\u00e1ch h\u00e0ng c\u1ea7n bi\u1ebft<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2525,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,16],"tags":[],"class_list":["post-2524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","category-data-breaches","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/ro-ri-du-lieu-lon-tai-att-nhung-dieu-khach-hang-can-biet\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"On July 12, AT&amp;T publicly announced that unauthorized actors accessed customer data on a third-party cloud platform. AT&amp;T has provided some recommendations and links to resources to help protect your&hellip; Continue reading Massive Data Breach at AT&amp;T: What Customers Need to Know\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/ro-ri-du-lieu-lon-tai-att-nhung-dieu-khach-hang-can-biet\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T18:10:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T18:11:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"956\" \/>\n\t<meta property=\"og:image:height\" content=\"515\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Massive Data Breach at AT&amp;T: What Customers Need to Know\",\"datePublished\":\"2024-07-12T18:10:38+00:00\",\"dateModified\":\"2024-07-12T18:11:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\"},\"wordCount\":813,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"articleSection\":[\"Cyber Threats\",\"Data Breaches\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\",\"name\":\"Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"datePublished\":\"2024-07-12T18:10:38+00:00\",\"dateModified\":\"2024-07-12T18:11:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg\",\"width\":956,\"height\":515,\"caption\":\"Massive Data Breach at AT&T What Customers Need to Know\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Massive Data Breach at AT&amp;T: What Customers Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"V\u1ee5 R\u00f2 R\u1ec9 D\u1eef Li\u1ec7u L\u1edbn T\u1ea1i AT&amp;T: Nh\u1eefng \u0110i\u1ec1u Kh\u00e1ch H\u00e0ng C\u1ea7n Bi\u1ebft | B\u00e1o C\u00e1o An Ninh","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/ro-ri-du-lieu-lon-tai-att-nhung-dieu-khach-hang-can-biet\/","og_locale":"vi_VN","og_type":"article","og_title":"Massive Data Breach at AT&amp;T: What Customers Need to Know | Security Briefing","og_description":"On July 12, AT&amp;T publicly announced that unauthorized actors accessed customer data on a third-party cloud platform. AT&amp;T has provided some recommendations and links to resources to help protect your&hellip; Continue reading Massive Data Breach at AT&amp;T: What Customers Need to Know","og_url":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/ro-ri-du-lieu-lon-tai-att-nhung-dieu-khach-hang-can-biet\/","og_site_name":"Security Briefing","article_published_time":"2024-07-12T18:10:38+00:00","article_modified_time":"2024-07-12T18:11:07+00:00","og_image":[{"width":956,"height":515,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"4 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Massive Data Breach at AT&amp;T: What Customers Need to Know","datePublished":"2024-07-12T18:10:38+00:00","dateModified":"2024-07-12T18:11:07+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/"},"wordCount":813,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","articleSection":["Cyber Threats","Data Breaches"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/","name":"V\u1ee5 R\u00f2 R\u1ec9 D\u1eef Li\u1ec7u L\u1edbn T\u1ea1i AT&amp;T: Nh\u1eefng \u0110i\u1ec1u Kh\u00e1ch H\u00e0ng C\u1ea7n Bi\u1ebft | B\u00e1o C\u00e1o An Ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","datePublished":"2024-07-12T18:10:38+00:00","dateModified":"2024-07-12T18:11:07+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Massive-Data-Breach-at-ATT-What-Customers-Need-to-Know.jpeg","width":956,"height":515,"caption":"Massive Data Breach at AT&T What Customers Need to Know"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/massive-data-breach-at-att-what-customers-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Massive Data Breach at AT&amp;T: What Customers Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=2524"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2524\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/2525"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=2524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=2524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=2524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}