When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

In the FBI’sPrivate Industry Notification, the Bureau explained that there has been an uptick in fraudulent requests.

The threat actor,Lapsus$, was an extortion group that apparently pioneered using EDR to gain information.

An FBI agent typing on a computer

The problem is that the hackers are targeting companies, something we as buyers don’t have control over.

See the entire mitigation list starting onpage 3 of this documentfor more recommendations.

This means that we need to be vigilant when we see reports of data breaches and hacked companies.

Aura

It is one of the many reasons that identify theft is scary and quite difficult to recover from.

Watch out foremails from unknown sendersor with blank subject lines.

It’s best just to delete it.

A hacker typing on a computer

More from Tom’s Guide

A hacker typing quickly on a keyboard

An FBI agent typing on a computer

An open lock depicting a data breach

Green skull on smartphone screen.

Galaxy S25 Plus held in the hand.

iPhone 16 Pro shown held in hand

A woman�s hands holding a smartphone with a lock symbol on it, in front of a laptop that also has a lock symbol on it.

NYTimes Connections

iPhone X in hand

Michael B. Jordan as Stack and Smoke in "Sinners" movie

Casely Power Pod recall image

Motorola Razr 2024 Review.