Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISO Alert: Lessons from McDonald's Chatbot Breach

In June 2025, a disturbing security failure surfaced involving McDonald’s AI-powered hiring assistant, Olivia, operated by Paradox.ai. The platform, designed to screen job applicants via chatbot, exposed the personal information of over 64 million people. That included names, contact info, shift preferences, and even chat transcripts. The root cause? A combination of missteps that highlight the growing risk of insecure APIs in modern, AI-driven systems.

Best 7 Compromised Credentials Platforms for 2025

Every breach starts somewhere, but in 2025, the most common entry point for threat actors remains startlingly simple: compromised credentials. A password reused here, a leaked database there, these open doors invite attackers into the heart of organizations, bypassing firewalls and traditional defenses. From ransomware operators to cybercriminal marketplaces, hackers increasingly rely on stolen credential data to enable their attacks.

What you need to know about the Esse Health Data Breach

Established in 1996, Esse Health was the product of a merger of two physician-led institutions. It soon emerged as a leading independent physician group in the larger St. Louis area, operating in more than 50 locations. Esse Health has 100 doctors specializing in primary and specialty care. Unlike other corporate healthcare systems, Esse Health maintains a physician-owned and managed system. It prioritizes a collaborative approach where patients and doctors partner to make care-based decisions.

Before the Breach: Why You Need an IR Retainer Like a Golfer Needs a Caddie

An incident response retainer isn’t just a contract, it’s a relationship. It sets expectations, defines access methods, outlines pricing, and ensures your team and your IR partner are already speaking the same language.

The Breach Beyond the Runway: Cybercriminals Targeted Qantas Through a Trusted Partner

On July 3, 2025, Qantas confirmed in an update statement that a cyber incident had compromised data from one of its contact centers, following the detection of suspicious activity on June 30. The breach didn’t strike at the heart of Qantas’ systems; it snuck in through a third-party provider. The attack allegedly exposed the data of 6 million Qantas customers. Figure 1. Qantas’ latest statement posted on July 3, 2025.

Qantas airways 2025 Data Breach of 6 million customers | Cybersecurity

On 30th June 2025, Qantas Airlines suffered a massive data breach affecting over 6 million customers. Personal information like names, emails, phone numbers, and frequent flyer details were exposed in a cyber-attack targeting third-party vendor systems. In this video, we break down exactly what happened, how cybercriminal groups like Scattered Spider are exploiting vulnerabilities, and what this means for you as a customer and for the airline industry.

Inheritance Scams - How To Spot and Avoid Fraudulent Claims

Inheritance scams are deceptive tactics used by fraudsters to lure unsuspecting victims with promises of substantial wealth. These scams typically involve false claims of inheritance from unknown individuals or distant relatives, accompanied by requests for fees or personal data for funds to be released. Many victims succumbed to these schemes due to the emotional appeal of unexpected fortune, urgency created by scammers, and the presentation of seemingly legitimate documents of stories.

What You Need to Know about the Episource Data Breach

Episource is a California-based healthcare services and technology company that provides risk adjustment and medical coding services to healthcare plans, doctors, and several other types of healthcare organizations. The company offers point-of-care solutions and software services that enable healthcare providers to meet patients wherever they are. This helps close gaps in healthcare and ameliorate health outcomes.

Third-Party Breaches: Why You Should be Prioritizing Supply Chain Cyber Risk Today

Look at any collection of top 10 organizational security concerns from recent years, and “third-party breaches” are consistently high on the list. These attacks have caused financial and reputational damage to every sector, from banks to healthcare systems to retail to governments. And the problem is growing. Recent statistics highlight just how severe the issue has become.