VanishID Selected for Mastercard’s Award-Winning Start Path Program

Enterprise digital executive protection pioneer among five innovative startups chosen as part of a new Security Solutions-focused program to support accelerated cybersecurity and fraud prevention innovation Bethesda, MD- July 1st, 2025 – VanishID, the first agentic AI-powered digital executive protection service... Read More

SecurityWeek: Picnic Corporation Rebrands to VanishID, Raises $10 Million

Written by Eduard Kovacs, managing editor at SecurityWeek. Picnic Corporation announced on Tuesday that it has rebranded to VanishID and it has raised $10 million in funding. VanishID has developed a solution designed to provide online protection to executives and employees. Similar... Read More

CyberBytes Podcast with Matt Polak

In this episode of CyberBytes: The Podcast, Joseph Cooper was joined by Matt Polak, Founder and CEO of VanishID. VanishID is revolutionizing how organizations defend against social engineering by proactively identifying and removing the publicly available personal information that threat... Read More

VanishID Secures $10M in Funding as it Launches Digital CEO Protection Offering

Armed with investment from Dell Technologies Capital, agentic AI-powered digital executive protection leader prepares for its next stage of growth Washington, DC – April 22, 2025 – VanishID, the leader in agentic AI-powered digital executive protection for enterprises, today announced its rebrand... Read More

VanishID’s Executive Digital Privacy Snapshot Reveals Alarming Risks for C-Suite Executives Across All Industries

Data brokers make more than 93% of U.S. Chief Executives’ home addresses visible Washington, DC – March 5, 2025 – Digital executive protection leader VanishID (formerly Picnic) today released a summary report, “Digital Privacy Snapshot: Leadership at Risk,” revealing that U.S. chief... Read More

Matt Polak Interview on Hackernoon

/ In the News / By VanishID In this short interview by NewsByte.Tech published on HackerNoon, Matt answers the following questions: What is your company in 2–5 words? Why is now the time for your company to exist? What do you love about... Read More

Reactive vs. Proactive Security Controls: Why CISOs Must Shift Focus

Chief Information Security Officers (CISOs) are like sailing captains navigating their organizations through treacherous waters. The threats are ever-changing, and the stakes are incredibly high. Shifting winds sometimes originate from within the organization’s top leadership, not just from external events,... Read More

Picnic Corporation Unveils Game-Changing Human Risk API

/ Press Releases / By VanishID WASHINGTON, D.C., U.S., April 22, 2024 — Picnic Corporation, a pioneer in cybersecurity innovation, today announced the launch of its groundbreaking Human Risk API. This technology offers a unique solution for security teams, enabling the seamless integration... Read More

The Mother of All Breaches: What You Need to Know and How to Stay Safe

In an era where digital footprints are left everywhere, the recent unveiling of “The Mother of All Breaches” has sent shockwaves through the cybersecurity community. This extensive data breach, affecting platforms like LinkedIn, X (Twitter), and Dropbox, has compromised an unprecedented 26 billion records. Such a... Read More

Enhancing Security Against Social Engineering: Safeguarding Customer Interaction Centers and IT Support Teams

Customer service centers, commonly known as call centers and IT support teams, often referred to as help desks, are becoming an increasingly popular target for threat actors to infiltrate organizations through social engineering. These employee groups typically possess elevated privileges... Read More

Impersonation on LinkedIn: Recognizing the Top 10 Telltale Signs of Threat Actors

LinkedIn has become an essential tool for professionals to network, share knowledge, and seek career opportunities. Yet, like any popular platform, it has become a fertile ground for threat actors to exploit unsuspecting users. In fact, our research indicates it’s... Read More

Protecting Against Social Engineering and Credential Stuffing

NIST CSF, MITRE ATT&CK, and HASP frameworks In today’s digital world, the ever-evolving landscape of cybersecurity threats poses significant challenges for organizations. Two major concerns are social engineering and credential stuffing, the attack vectors responsible for most breaches. Organizations rely... Read More

How Threat Actors Exploit Generative AI For Social Engineering and Credential Compromise

Social engineering attacks are one of the most commonly used methods for cyber criminals to gain access to sensitive data and information. Recent advances in generative AI have enabled threat actors to utilize AI-generated content to fuel these attacks, making... Read More

Henry Ford Health Data Breach

Download PDF Incident Name: Henry Ford Health Data Breach Date of Public Report: July 18th, 2023 Date of Incident: March 3rd, 2023 Summary: Henry Ford Health is a Detroit based not-for-profit healthcare provider. On July 18, 2023, the company informed customers that it... Read More

How to Proactively Protect Your Organization’s High-Value Targets

Cybercriminals are always looking for ways to exploit the exposed personal data of high-value targets to breach companies. High-value targets (HVTs) are those individuals within an organization who have access to sensitive information or assets and have the potential to... Read More

Human Element Remains Key Factor in Cybersecurity: The 2023 Verizon DBIR Report and VanishID’s Global Threat Intelligence Findings

The spotlight in the fight against cybercrime continues to be an often overlooked yet pivotal factor – the human element. A profound understanding of this dimension is vital for safeguarding digital ecosystems, and the recently published 2023 Verizon Data Breach... Read More

VanishID joins the Tidal Product Registry™

We all know that the cybersecurity vendor landscape is extensive and looks complex. Although there is a gap in cybersecurity talent worldwide, there’s certainly no lack of products in the marketplace that provide defenders with threat visibility and security controls.... Read More

Keeping criminals from exploiting personally identifiable information

As specialists in human attack surface protection, we at VanishID know all too well the importance of preventing the exploitation of exposed personally identifiable information (PII) by cyber criminals. While we handle this problem for enterprises, individuals need resources to... Read More

Picnic Target Intelligence Report: Mailchimp

Social engineers collect intelligence on human targets to develop paths for attack and compromise. Picnic’s platform emulates this external, human attack surface reconnaissance to expose Target Intelligence about an organization. Picnic pairs this unique perspective of threat actors with automated... Read More

Threat-Informed Defense for Human Attack Surface: Mapping Threat Intelligence to Target Intelligence

The exploitation of human attack surface data and a crucial intelligence gap According to Verizon’s 2022 DBIR report, stolen passwords and phishing were the top two techniques used by threat actors last year, accounting for around 70% of all analyzed breaches.... Read More

Kodi February 2023 Data Breach

Download PDF Incident Name: Kodi February 2023 Data Breach Date of Public Report: April 8th, 2023 Date of Incident: February 16th and 21st, 2023 Summary: Kodi is an open-source media player software provider created by the non-profit XBMC Foundation. On April 8th, 2023,... Read More

Picnic Target Intelligence Report: Uber

Social engineers collect intelligence on human targets to develop paths for attack and compromise. Picnic’s platform emulates this external, human attack surface reconnaissance to expose Target Intelligence about an organization. Picnic pairs this unique perspective of threat actors with automated... Read More

Activision Dec 2022 Social Engineering Attack and Data Breach

Download PDF Incident Name: Activision December 2022 Social Engineering Attack and Data Breach Date of Public Report: February 27th, 2023 Date of Incident: December 4th, 2022 Summary: Activision is a video game developer most famous for creating Call of Duty and World of... Read More

Coinbase Feb 2023 Social Engineering Attack

Download PDF Incident Name: Coinbase Social Engineering Attack Date of Incident: February 5th, 2023 Summary: Coinbase is an American cryptocurrency exchange platform. On February 5th, 2023, the company came under a social engineering attack in which several employees were targeted with SMS messages... Read More

Copyright © 2019 – 2025 Picnic Corporation (dba VanishID)