Henry Ford Health Data Breach

Download PDF Incident Name: Henry Ford Health Data Breach Date of Public Report: July 18th, 2023 Date of Incident: March 3rd, 2023 Summary: Henry Ford Health is a Detroit based not-for-profit healthcare provider. On July 18, 2023, the company informed customers that it... Read More

Audience 1st Podcast: CISO Approaches to Human Attack Surface Protection Amidst Budget Cuts

44 Minutes of Cybersecurity Insights Picnic CEO Matt Polak joined Jeff Farinich, CISO of New American Funding, on an Audience 1st podcast hosted by Dani Woolf. With the accelerating proliferation of cyber threats, a challenge at hand involves addressing the human attack surface –... Read More

The human element and continuous threat exposure management: How to protect the human attack surface

The importance of understanding and managing the human element in your organization’s security strategy cannot be overstated as the stakes rise in the cybersecurity landscape. This whitepaper explores and exposes the intersection of threat intelligence, attack surface management, and human vulnerabilities... Read More

Tidal Cyber Fireside Chat with Picnic CEO Matt Polak

We Got This Covered: Picnic Picnic CEO Matt Polak recently joined Tidal Cyber’s Chief Innovation Officer Frank Duff on the “We’ve Got This Covered” fireside chat series to discuss Picnic joining the Tidal Product Registry™, Picnic’s scope within the MITRE ATT&CK® framework,... Read More

How Picnic Protects the Human Attack Surface

Human vulnerabilities create risks to infrastructure and data, which impacts operational, legal, financial, and reputational risks. Picnic prioritizes the vulnerabilities by mapping them to external threat intelligence and target intelligence. We then mitigate these risks with automatic protection and response... Read More

Picnic Corporation Launches Practical Framework to Combat Human-Centric Attacks

Company arms the cybersecurity community with best practices aligned to NIST CSF and MITRE ATT&CK to proactively protect the human attack surface WASHINGTON, D.C., U.S., June 15, 2023 /EINPresswire.com/ — Most organizational breaches today continue to be the result of... Read More

The Threat Show! Ep. 29 with guest Matt Polak

The Threat of the Human Attack Surface Picnic CEO Matt Polak shares practical steps that businesses can take to protect themselves from ransomware, including simulating social engineering attacks, safeguarding the human attack surface, and more. The podcast also goes over 5 threats... Read More

Picnic Corporation Appoints Entrepreneur and Cybersecurity Executive Christopher Key to its Board of Directors

VanishID is the first platform I’ve seen that can map threat intelligence to an organization’s employee population and proactively mitigate the risk of humancentric attacks.” — Chris Key, former Chief Product Officer of Mandiant and founder of Verodin WASHINGTON, D.C.,... Read More

Picnic Target Intelligence Report: Mailchimp

Social engineers collect intelligence on human targets to develop paths for attack and compromise. Picnic’s platform emulates this external, human attack surface reconnaissance to expose Target Intelligence about an organization. Picnic pairs this unique perspective of threat actors with automated... Read More

Kodi February 2023 Data Breach

Download PDF Incident Name: Kodi February 2023 Data Breach Date of Public Report: April 8th, 2023 Date of Incident: February 16th and 21st, 2023 Summary: Kodi is an open-source media player software provider created by the non-profit XBMC Foundation. On April 8th, 2023,... Read More

Picnic Target Intelligence Report: Uber

Social engineers collect intelligence on human targets to develop paths for attack and compromise. Picnic’s platform emulates this external, human attack surface reconnaissance to expose Target Intelligence about an organization. Picnic pairs this unique perspective of threat actors with automated... Read More

How Picnic Protects Against Credential Stuffing Attacks

Threat actors leverage exposed credentials, including passwords associated with employee and contractor personal accounts, in order to power credential stuffing attacks and gain initial access to targeted infrastructure. Picnic provides visibility and continuous monitoring of breach data to identify exposed... Read More

Activision Dec 2022 Social Engineering Attack and Data Breach

Download PDF Incident Name: Activision December 2022 Social Engineering Attack and Data Breach Date of Public Report: February 27th, 2023 Date of Incident: December 4th, 2022 Summary: Activision is a video game developer most famous for creating Call of Duty and World of... Read More

Cybersecurity and the Human Element: Knowing your full attack surface to prevent employee compromise

Webinar with Scott Goodhart, CISO Emeritus We talk with Scott Goodhart, CISO Emeritus, on the importance of knowing your human attack surface and how to manage exposed employee data to mitigate social engineering and credential compromise risk. Read More

Practical guide to secure your organization against credential stuffing attacks

Most cybersecurity whitepapers start with a scary anecdote, a statistic on annual losses in the billions, some specifics on hard-hit industries or recent attack variations, and then move on to practical information. Not this one. Cybersecurity teams understand credential stuffing.... Read More

Coinbase Feb 2023 Social Engineering Attack

Download PDF Incident Name: Coinbase Social Engineering Attack Date of Incident: February 5th, 2023 Summary: Coinbase is an American cryptocurrency exchange platform. On February 5th, 2023, the company came under a social engineering attack in which several employees were targeted with SMS messages... Read More

Reddit Feb 2023 Social Engineering Attack and Data Breach

Download PDF Incident Name: Reddit Feb 2023 Social Engineering Attack and Data Breach Date of Incident: February 5th, 2023 Summary: Reddit, a popular news and social media platform, announced recently that on February 5, 2023, the company suffered a data breach. The breach... Read More

Preventing the Exploitation of Public Data: How Cybersecurity Teams Can Disrupt Attacker Reconnaissance

Webinar with Dr. Max Kilger We talk with Dr. Max Kilger, Director of the Data Analytics Program and Associate Professor of Practice at the University of Texas at San Antonio, about how cybercriminals harness big data to find pathways to... Read More

Riot Games Jan 2023 Social Engineering Attack

Download PDF Incident Name: Riot Games Jan 2023 Date of Incident: January 20th, 2023 Summary: Riot Games is an American video game developer and publisher, most famous for the games League of Legends and Valorant. The company reported on January 20th via their... Read More

Focus on security education, not cyber awareness training

Written by Karen Walsh Phishing scams and other social engineering attacks work because cybercriminals use people’s digital footprints against them. Threat actors scrape social media and the internet, looking for insights about people. Cybersecurity awareness training programs, however, rarely teach people... Read More

Social engineering: What you need to know

What you’ll learn:  What social engineering is Why social engineering matters Which organizations should be concerned Which individuals should be concerned Why current solutions fail to stop attacks How to evaluate potential solutions How Picnic works and how it’s different... Read More

Brilliance Security Podcast – S4E20

The Role of OSINT in social engineering and how to manage your human attack surface Picnic CEO Matt Polak recently joined award-winning journalist Steven Bowcut of the Brilliance Security Magazine Podcast to discuss the role of OSINT in social engineering and how to manage your human attack surface.... Read More

Picnic Target Intelligence Report: Twilio

Social engineers collect intelligence on human targets to develop identity paths for attack and compromise. Picnic emulates this external, human attack surface reconnaissance to provide customers with Target Intelligence about their organization seen from the perspective of threat actors. Picnic’s... Read More

Your digital footprint: It’s bigger than you realize

Every day, people follow a set of digital routines. Some people read the news online while drinking their morning coffee. Others check their work email from their smartphone. Still others log into social media to see what’s going on with... Read More

Copyright © 2019 – 2025 Picnic Corporation (dba VanishID)