KXIP vs KKR Live Score

Vickery told CNN that the data were exposed by NICE Systems, a company based in Israel that Verizon was working with to facilitate customer service calls.

Nice has remained quiet on the issue, noting that the data was part of a "demo system" and that no other Nice customer has been impacted.

According to ZDNet's report, Verizon also had no prior knowledge that all of this data was exported by Nice Systems, which makes the whole situation even more concerning.

Exposed were text files logging calls made to Verizon call centers between January 1, 2017 and June 22, O'Sullivan said. Leaks tied to data on Amazon's S3 servers seem to be a common thing lately.

Verizon apologized to their customers for this data leak and claimed that PIN numbers exposed in this incident were not actually connected to customer accounts. The data includes names, phone numbers, and account PIN codes for the customers.

UpGuard, a Silicon Valley security firm that first reported the data breach, said as many as 14 million Verizon accounts may have been affected.

A security lapse has exposed data from millions of Verizon customers, leaking names, addresses and personal identification numbers, or PINs, according to a security researcher. The discovery was made by UpGuard on June 13, and they immediately informed Verizon. The leak was due to human error, and the hole has since been patched, but Verizon customers are going to want to take some action to be sure their accounts aren't compromised further.

Hackers will be able to use the PIN codes to easily gain access to online accounts that are protected by two-factor authentication, which is a security measure that confirms the actions of users by sending a code to their mobile phone number. Sophisticated state actors, looking for, say, information on government workers, were of particular concern, he added. (VZ) has confirmed a data breach that exposed the personal data of millions of its customers, but said that an employee of one of its third-party vendors was at fault.

"This breach once again demonstrates the fact that cloud services like [Amazon Web Services] can be secure, but it is up to organizations using them to ensure that services are configured in a secure fashion", Rich Campagna, CEO of cloud security firm Bitglass told International Business Times.