Everbridge, a prominent provider of crisis management and public warning solutions, disclosed a recent breach in its corporate systems, where unknown attackers gained unauthorized access to files containing business and user data. This breach affects over 6,500 global customers, including notable entities like the U.S. Army and major airports. The intrusion, detected on May 21, stemmed from a previous phishing attack targeting Everbridge employees, underscoring the persistent threat of social engineering tactics in cybersecurity breaches.
While the investigation is ongoing, Everbridge assured customers that there’s no evidence of a ransomware attack. The company promptly notified law enforcement agencies and engaged cybersecurity firms, including Mandiant and Stroz Friedberg, to assess the extent of the breach’s impact. It’s reported that the compromised data includes admin user and limited other users’ contact information, along with details about subscribed Everbridge services, necessitating swift action to mitigate potential risks.
In response to the breach, Everbridge is urging all customers to enable multi-factor authentication (MFA) on their accounts, emphasizing its effectiveness in combating phishing attacks. The company plans to enforce MFA on all accounts by June 3, 2024, to bolster security measures across its platform. With customer information exposed and the breach’s severity being assessed, Everbridge aims to strengthen its defenses and restore trust among its clientele by swiftly addressing vulnerabilities and implementing robust security protocols.
Despite the breach, Everbridge remains a crucial player in crisis management, catering to a diverse range of clients worldwide. With its proactive approach to cybersecurity and collaboration with industry experts, Everbridge is striving to uphold its reputation as a trusted provider of public warning and risk intelligence services, ensuring the resilience of its platform in the face of evolving cyber threats.