What happened: Attackers phished their way into a CRM platform used by Workday. After discovery on Aug 6, Workday blocked access and disclosed on Aug 15.
Why it matters: A continuing wave of CRM-focused, voice-phishing campaigns. Review how your org authenticates staff over the phone.
What happened: Data tied to a third-party customer-service system was accessed; impacted data includes contact details and loyalty info.
Why it matters: Another example of supplier compromise in travel—tighten vendor controls and customer-support data retention.
What happened: July attack exposed account data (e.g., phone numbers, SIM/PUK codes).
Why it matters: SIM/PUK details can aid SIM-swap attempts; add account PINs and watch for port-out alerts.
What happened: WarLock ransomware actors posted samples and auctioned internal Colt documents.
Why it matters: WarLock is ramping up against telecoms; suppliers are at elevated risk for extortion and exposure.
Multiple summer breaches share a pattern: attackers phoned their way into helpdesks/CRMs, then exfiltrated support records. Treat your contact-center access like crown jewels: MFA, SSO, strict roles, session alerts.
CISA/FBI/HHS issued a joint advisory on Interlock ransomware (Windows/Linux encryptors; VM targeting). Review backups, segmentation, and detection coverage.
Password Tester Tool (beta): a safe way to evaluate password strength and learn how to upgrade weak ones—without sending us your actual password.