How I Would Hack You

/ In the News / By VanishID Demo by Rachel Tobac at Elevate Festival In this video, Rachel Tobac, CEO of Social Proof Security and a member of Picnic’s Board of Advisors, demonstrates how threat actors use exposed personally identifiable information available on data brokers,... Read More

Podcast Interview – The Pulse on the CISO Community

Whether you are a cybersecurity professional, a product marketer, or a cybersecurity start-up founder, you will find this episode of Picnic Podcast Interviews very insightful. On this occasion, Matt Polak (Founder & CEO of Picnic) interviews Jason Cenamor, Founder & Chief... Read More

Reactive vs. Proactive Security Controls: Why CISOs Must Shift Focus

Chief Information Security Officers (CISOs) are like sailing captains navigating their organizations through treacherous waters. The threats are ever-changing, and the stakes are incredibly high. Shifting winds sometimes originate from within the organization’s top leadership, not just from external events,... Read More

Podcast Interview – The Intersection Between Privacy, AI, and Cybersecurity

If you are a GRC professional or a Cybersecurity practitioner, you will find this episode of Picnic’s Podcast Interviews very timely and relevant. Matt Polak, CEO of Picnic, hosts a panel discussion with guests Tom Kemp and David Ross. Tom is the author of... Read More

Podcast Interview – Lt. General (ret.) Charles Moore, fmr. Deputy Commander, US Cyber Command

We are thrilled to share with you a podcast interview with Lt. General (ret.) Charles Moore, also known as “Tuna.” Tuna is a former F-16 Pilot (hence the callsign), Squadron Group Commander, Wing Commander, and former Deputy Commander of the US... Read More

Picnic Corporation Unveils Game-Changing Human Risk API

/ Press Releases / By VanishID WASHINGTON, D.C., U.S., April 22, 2024 — Picnic Corporation, a pioneer in cybersecurity innovation, today announced the launch of its groundbreaking Human Risk API. This technology offers a unique solution for security teams, enabling the seamless integration... Read More

Picnic Demo at UniCon24

Ben Andreas, VP of Managed Services at Picnic, offers a demo of the digital risk protection services (DRPS) platform to the attendees of UniCon24, a virtual day-long event hosted by Scythe and sponsored by Picnic. Read More

The Mother of All Breaches: What You Need to Know and How to Stay Safe

In an era where digital footprints are left everywhere, the recent unveiling of “The Mother of All Breaches” has sent shockwaves through the cybersecurity community. This extensive data breach, affecting platforms like LinkedIn, X (Twitter), and Dropbox, has compromised an unprecedented 26 billion records. Such a... Read More

Uniting Pre and Post-Access Threat Defense

In this session, recorded on 02/05/2024, Picnic and Scythe joined forces to offer a perspective on prevention that spans the entire kill chain. Learn how attackers conduct target reconnaissance pre-access by leveraging OSINT and exploiting human vulnerabilities. Discover how emulating... Read More

Enhancing Security Against Social Engineering: Safeguarding Customer Interaction Centers and IT Support Teams

Customer service centers, commonly known as call centers and IT support teams, often referred to as help desks, are becoming an increasingly popular target for threat actors to infiltrate organizations through social engineering. These employee groups typically possess elevated privileges... Read More

Introduction to Picnic

If you want to learn about Picnic and how we protect the human attack surface with digital risk protection services, this is the webinar to watch. Matt Polak, CEO and founder of Picnic, explains the rationale behind Picnic’s approach to... Read More

OGE Energy Corp

Jason Nations is the Director of Enterprise Security at OG&E. A seasoned IT and OT security executive, Jason highlights in this video interview the high value and easy uptake and execution of including VanishID (formerly dba Picnic) in his data... Read More

Impersonation on LinkedIn: Recognizing the Top 10 Telltale Signs of Threat Actors

LinkedIn has become an essential tool for professionals to network, share knowledge, and seek career opportunities. Yet, like any popular platform, it has become a fertile ground for threat actors to exploit unsuspecting users. In fact, our research indicates it’s... Read More

UCLA Anderson School of Management

Howard Miller is the CIO at UCLA Anderson School of Management. He has been a VanishID customer since 2023 and, in this video, shares the challenges VanishID helps to solve and the value that the service brings to his organization’s... Read More

Okta October 2023 Breach

Download PDF Incident Name: Okta October 2023 Breach Date of Incident: 2nd – 18th October 2023 Summary: Okta, a well-known identity and authentication provider based in the US, suffered a data breach in October 2023. On October 20, 2023, Okta released details... Read More

23andMe October 2023 Credential Stuffing Attack

Download PDF Incident Name: 23andMe October 2023 Credential Stuffing Attack Date of Incident: October 2nd, 2023 Summary: 23andMe is a biotechnology company based in California. They provide genetic testing to customers, offering details on their ancestors and genetic health data. On October... Read More

Rosen’s Diversified (RDI)

Brent Baker is the Executive Vice President of Information Technology at Rosen’s Diversified (RDI), a conglomerate of businesses in the Agriculture, Manufacturing, and Life Sciences industries. He spent time with us to share the value and security outcomes of partnering... Read More

Protecting Against Social Engineering and Credential Stuffing

NIST CSF, MITRE ATT&CK, and HASP frameworks In today’s digital world, the ever-evolving landscape of cybersecurity threats poses significant challenges for organizations. Two major concerns are social engineering and credential stuffing, the attack vectors responsible for most breaches. Organizations rely... Read More

Retool August 2023 Social Engineering Attack

Download PDF Incident Name: Retool August 2023 Social Engineering Attack Date of Incident: August 27th, 2023 Summary: Retool, a popular software company, announced on September 13, 2023, that it had fallen victim to a cyber attack in August 2023. According to their... Read More

MGM Resorts International September 2023 Ransomware Attack

Download PDF Incident Name: MGM Resorts International September 2023 Ransomware Attack Date of Incident: September 10th, 2023 Summary: On September 11th, 2023, MGM Resorts International announced that they are currently dealing with a cyber attack that is impacting their company’s systems and... Read More

Kroll August 2023 SIM Swap Attack

Download PDF Incident Name: Kroll August 2023 SIM Swap Attack Date of Incident: August 19th, 2023 Summary: Kroll is a global company providing organizations with risk and financial solutions. On August 19th, 2023, they discovered that a T-Mobile account belonging to a... Read More

Okta August 2023 Social Engineering Attack Advisory

Download PDF Incident Name: Okta August 2023 Social Engineering Attack Advisory Date of Incident: August 2023 Summary: Okta, a provider of identity and authentication services, recently issued a warning to its customers regarding an ongoing, sophisticated social engineering attack that has been... Read More

CoinsPaid July 2023 Social Engineering Attack

Download PDF Incident Name: CoinsPaid Social Engineering Attack Date of Report: August 7th, 2023 Date of Incident: July 22nd, 2023 Summary: CoinsPaid, one of the world’s largest cryptocurrency payment providers, suffered a cyber attack on July 22, 2023, which resulted in the theft... Read More

Henry Ford Health Data Breach

Download PDF Incident Name: Henry Ford Health Data Breach Date of Public Report: July 18th, 2023 Date of Incident: March 3rd, 2023 Summary: Henry Ford Health is a Detroit based not-for-profit healthcare provider. On July 18, 2023, the company informed customers that it... Read More

Copyright © 2019 – 2025 Picnic Corporation (dba VanishID)