{"id":953384,"date":"2025-08-08T07:29:06","date_gmt":"2025-08-08T01:59:06","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=953384"},"modified":"2025-08-08T07:39:06","modified_gmt":"2025-08-08T02:09:06","slug":"cisco-suffers-data-breach-how-hackers-used-voice-attack-to-steal-user-information","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2025\/08\/08\/cisco-suffers-data-breach-how-hackers-used-voice-attack-to-steal-user-information\/","title":{"rendered":"Cisco suffers data breach: How hackers used \u2018voice attack\u2019 to steal user information"},"content":{"rendered":"<p>Cisco has disclosed a recent data breach, revealing that a cybercriminal successfully tricked a company representative into granting access to a third-party database. The attack, identified as a voice phishing or \u201cvishing\u201d scheme, led to the theft of basic profile information for users registered on Cisco.com. The networking giant stated that the hackers accessed and exported a subset of user data, though the company did not specify the number of people affected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco has disclosed a recent data breach, revealing that a cybercriminal successfully tricked a company representative into granting access to a third-party database. The attack, identified as a voice phishing or \u201cvishing\u201d scheme, led to the theft of basic profile information for users registered on Cisco.com. The networking giant stated that the hackers accessed and exported a subset of user data, though the company did not specify the number of people affected.<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59,4,10],"tags":[],"class_list":["post-953384","post","type-post","status-publish","format-standard","hentry","category-it-2-the-economic-times","category-newspapers","category-the-economic-times"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/953384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=953384"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/953384\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=953384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=953384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=953384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}