Report: Leadership at Risk in a Data Exposed World

A 2025 snapshot of the exposure of more than 10,000 C-suite executives in the USA across different sectors and roles, and how compromised privacy impacts cyber and physical security. The numbers tell a troubling story: 93% of C-suite executives have... Read More

VanishID Selected for Mastercard’s Award-Winning Start Path Program

Enterprise digital executive protection pioneer among five innovative startups chosen as part of a new Security Solutions-focused program to support accelerated cybersecurity and fraud prevention innovation Bethesda, MD- July 1st, 2025 – VanishID, the first agentic AI-powered digital executive protection service... Read More

VanishID Secures $10M in Funding as it Launches Digital CEO Protection Offering

Armed with investment from Dell Technologies Capital, agentic AI-powered digital executive protection leader prepares for its next stage of growth Washington, DC – April 22, 2025 – VanishID, the leader in agentic AI-powered digital executive protection for enterprises, today announced its rebrand... Read More

Guide for Choosing the Right PII Removal Service for Your Business

This guide will help you: Frame the problem for your stakeholders Understand the different solutions available to your organization Avoid common pitfalls when choosing a PII removal service Understand the long-term considerations of your selection Understand when VanishID is the... Read More

VanishID’s Executive Digital Privacy Snapshot Reveals Alarming Risks for C-Suite Executives Across All Industries

Data brokers make more than 93% of U.S. Chief Executives’ home addresses visible Washington, DC – March 5, 2025 – Digital executive protection leader VanishID (formerly Picnic) today released a summary report, “Digital Privacy Snapshot: Leadership at Risk,” revealing that U.S. chief... Read More

The first page of Google search results about you is a lot scarier than the dark web

The first page of Google search results about you is a lot scarier than the dark web. But news organizations and some security vendors love to scare people about the dark web, so I thought I’d offer some thoughts on that... Read More

Reactive vs. Proactive Security Controls: Why CISOs Must Shift Focus

Chief Information Security Officers (CISOs) are like sailing captains navigating their organizations through treacherous waters. The threats are ever-changing, and the stakes are incredibly high. Shifting winds sometimes originate from within the organization’s top leadership, not just from external events,... Read More

Picnic Corporation Unveils Game-Changing Human Risk API

/ Press Releases / By VanishID WASHINGTON, D.C., U.S., April 22, 2024 — Picnic Corporation, a pioneer in cybersecurity innovation, today announced the launch of its groundbreaking Human Risk API. This technology offers a unique solution for security teams, enabling the seamless integration... Read More

Picnic Demo at UniCon24

Ben Andreas, VP of Managed Services at Picnic, offers a demo of the digital risk protection services (DRPS) platform to the attendees of UniCon24, a virtual day-long event hosted by Scythe and sponsored by Picnic. Read More

The Mother of All Breaches: What You Need to Know and How to Stay Safe

In an era where digital footprints are left everywhere, the recent unveiling of “The Mother of All Breaches” has sent shockwaves through the cybersecurity community. This extensive data breach, affecting platforms like LinkedIn, X (Twitter), and Dropbox, has compromised an unprecedented 26 billion records. Such a... Read More

Uniting Pre and Post-Access Threat Defense

In this session, recorded on 02/05/2024, Picnic and Scythe joined forces to offer a perspective on prevention that spans the entire kill chain. Learn how attackers conduct target reconnaissance pre-access by leveraging OSINT and exploiting human vulnerabilities. Discover how emulating... Read More

Enhancing Security Against Social Engineering: Safeguarding Customer Interaction Centers and IT Support Teams

Customer service centers, commonly known as call centers and IT support teams, often referred to as help desks, are becoming an increasingly popular target for threat actors to infiltrate organizations through social engineering. These employee groups typically possess elevated privileges... Read More

Introduction to Picnic

If you want to learn about Picnic and how we protect the human attack surface with digital risk protection services, this is the webinar to watch. Matt Polak, CEO and founder of Picnic, explains the rationale behind Picnic’s approach to... Read More

Impersonation on LinkedIn: Recognizing the Top 10 Telltale Signs of Threat Actors

LinkedIn has become an essential tool for professionals to network, share knowledge, and seek career opportunities. Yet, like any popular platform, it has become a fertile ground for threat actors to exploit unsuspecting users. In fact, our research indicates it’s... Read More

23andMe October 2023 Credential Stuffing Attack

Download PDF Incident Name: 23andMe October 2023 Credential Stuffing Attack Date of Incident: October 2nd, 2023 Summary: 23andMe is a biotechnology company based in California. They provide genetic testing to customers, offering details on their ancestors and genetic health data. On October... Read More

Protecting Against Social Engineering and Credential Stuffing

NIST CSF, MITRE ATT&CK, and HASP frameworks In today’s digital world, the ever-evolving landscape of cybersecurity threats poses significant challenges for organizations. Two major concerns are social engineering and credential stuffing, the attack vectors responsible for most breaches. Organizations rely... Read More

How Threat Actors Exploit Generative AI For Social Engineering and Credential Compromise

Social engineering attacks are one of the most commonly used methods for cyber criminals to gain access to sensitive data and information. Recent advances in generative AI have enabled threat actors to utilize AI-generated content to fuel these attacks, making... Read More

How to Proactively Protect Your Organization’s High-Value Targets

Cybercriminals are always looking for ways to exploit the exposed personal data of high-value targets to breach companies. High-value targets (HVTs) are those individuals within an organization who have access to sensitive information or assets and have the potential to... Read More

The human element and continuous threat exposure management: How to protect the human attack surface

The importance of understanding and managing the human element in your organization’s security strategy cannot be overstated as the stakes rise in the cybersecurity landscape. This whitepaper explores and exposes the intersection of threat intelligence, attack surface management, and human vulnerabilities... Read More

Human Element Remains Key Factor in Cybersecurity: The 2023 Verizon DBIR Report and VanishID’s Global Threat Intelligence Findings

The spotlight in the fight against cybercrime continues to be an often overlooked yet pivotal factor – the human element. A profound understanding of this dimension is vital for safeguarding digital ecosystems, and the recently published 2023 Verizon Data Breach... Read More

VanishID joins the Tidal Product Registry™

We all know that the cybersecurity vendor landscape is extensive and looks complex. Although there is a gap in cybersecurity talent worldwide, there’s certainly no lack of products in the marketplace that provide defenders with threat visibility and security controls.... Read More

Keeping criminals from exploiting personally identifiable information

As specialists in human attack surface protection, we at VanishID know all too well the importance of preventing the exploitation of exposed personally identifiable information (PII) by cyber criminals. While we handle this problem for enterprises, individuals need resources to... Read More

Threat-Informed Defense for Human Attack Surface: Mapping Threat Intelligence to Target Intelligence

The exploitation of human attack surface data and a crucial intelligence gap According to Verizon’s 2022 DBIR report, stolen passwords and phishing were the top two techniques used by threat actors last year, accounting for around 70% of all analyzed breaches.... Read More

How Picnic Protects Against Credential Stuffing Attacks

Threat actors leverage exposed credentials, including passwords associated with employee and contractor personal accounts, in order to power credential stuffing attacks and gain initial access to targeted infrastructure. Picnic provides visibility and continuous monitoring of breach data to identify exposed... Read More

Copyright © 2019 – 2025 Picnic Corporation (dba VanishID)