In partnership with

Analytics on Live Data Without Leaving Postgres

When analytics on Postgres slows down, most teams add a second database. TimescaleDB by Tiger Data takes a different approach: extend Postgres with columnar storage and time-series primitives to run analytics on live data, no split architecture, no pipeline lag, no new query language to learn. Start building for free. No credit card required.

Data Exfiltration
US bank reports itself after slinging customer data at 'unauthorized AI app'

Community Bank reported an infrastructure safety issue to the government after customer details were exposed through an unapproved application.

The incident highlights a major compliance issue for corporate security teams tasked with managing data privacy boundaries.

The risk of unapproved tools

Modern software platforms help employees work faster, but they often send personal files to outside computer servers.

Community Bank discovered that private records were sent to an external software program without permission from the technology department.

The leaked files included customer names, birthdates, and Social Security numbers, which can lead to identity fraud.

The company is now checking the full scope of the exposure and sending out legal notifications to all impacted clients.

The key lesson is that company leaders must build strict safety rules to stop workers from sharing sensitive files with external artificial intelligence tools.

Supply Chain
OpenAI confirms security breach in TanStack supply chain attack

OpenAI confirmed that a safety breach occurred due to a malicious update in the TanStack code framework.

This specific attack allowed intruders to gain unauthorized entry into a small section of developer systems.

The incident shows that modern software builders face major threats when using open source tools.

Infected software updates

Software developers frequently use pre-made code libraries like TanStack to build web applications much faster.

Bad actors gained control of the official distribution network and added harmful scripts into the software packages.

Engineers at OpenAI noticed the abnormal network activity quickly and removed the bad components from their environment.

The security team confirmed that main internal models and user databases remained safe from the hackers.

The primary takeaway is that tracking third party software building blocks is essential to protect enterprise systems from code contamination.

๐Ÿ“บ๏ธ Podcast
CISO as CFO, From Citi to Celery, It's All about the Cabbage

Threat Models in the Logistics Sector

Securing a large grocery supply chain introduces risk variables completely different from corporate financial services.

Arvin Bansal, the security leader at C&S Wholesale Grocers, describes managing a $30 billion logistics infrastructure that spans thousands of retail stores and distribution warehouses.

The security strategy at a massive wholesale provider focuses primarily on operational uptime rather than protecting digital intellectual property.

A technical outage in this industry directly causes physical supply chain failures, leading to spoiled food inventory and empty retail shelves.

The Realities of Low Margin Budgets

Transitioning from a massive bank like Citigroup to a wholesale grocery company requires a fundamental shift in technical spending habits.

Logistics firms operate on incredibly thin financial margins, meaning security executives must justify software purchases based on strict business metrics.

Instead of buying expensive standalone enterprise security suites, teams must focus on highly efficient cloud architectures and automated operational guardrails.

This environment forces defensive teams to build lightweight internal tools and outsource standard maintenance tasks to maximize their budget allocation.

Securing Automated Supply Chains

Modern distribution warehouses rely heavily on connected industrial machinery and machine learning systems to optimize cargo placement and fleet tracking.

The security team must protect Internet of Things devices and delivery trucks from remote tampering that could halt physical shipping networks.

Furthermore, using machine learning models to adjust seasonal retail pricing requires strong validation to prevent data contamination attacks.

The security roadmap focuses on technical resilience, ensuring the core supply chain can continue moving food safely even during a severe network disruption.

Extortion Strike
Hackers Claim 11M Files Stolen From Foxconn, Supplier to Apple and Nvidia

Foxconn, a major electronics provider that builds parts for Apple and Nvidia, recently suffered a severe digital infrastructure attack.

An outside extortion group claims they took over eleven million internal files from the manufacturing network.

The compromise highlights how top global supply chain targets remain at risk from extortion campaigns.

The threat of extortion attacks

Hackers broke into the secondary business systems of the massive parts maker and encrypted several internal files.

The group responsible for this incident is demanding a large money payment to delete the stolen company data.

Security engineers at Foxconn noticed the abnormal network activity and immediately isolated the affected business nodes.

The electronics company confirmed that its main manufacturing facilities and product assembly lines kept running without any operational pauses.

The core lesson is that securing supply chain partners is vital because a breach at an outside supplier can expose the sensitive details of global technology brands.

Consumer Exposure
Skoda warns of customer data breach after online shop hack

ล koda Auto, an international car manufacturer owned by Volkswagen Group, confirmed a data security incident involving its main internet merchandise portal.

Malicious actors exploited a software weakness to gain unauthorized access to databases containing consumer records.

The incident underscores the ongoing technical challenge of defending standalone e-commerce sites from targeted intrusions.

Portal exploitation details

External attackers leveraged a security flaw within the standard shop software deployment to view internal database tables.

The exposed records included customer names, physical delivery addresses, telephone contacts, and encrypted account password hashes.

Data protection teams quickly took the entire shopping portal offline to isolate the web servers and patch the underlying software code.

Financial payment details remained safe because the automobile manufacturer handles all monetary transactions through separate third-party processing firms.

The ultimate takeaway is that regular technical monitoring and fast software patching are critical to prevent commercial retail portals from becoming open doorways into corporate customer databases.

Data Misuse
GM fined $12.75M for selling OnStar driver data without consent

General Motors agreed to pay a record setting cash penalty to settle a major consumer privacy lawsuit in California.

State legal officials found that the automobile company collected and shared driving records from its connected dashboard system over several years.

The settlement sets a new precedent for how government regulators enforce digital privacy rules against major manufacturing corporations.

The tracking of driver habits

Modern vehicles contain smart computer systems that log detailed information about speed, braking habits, and daily travel destinations.

General Motors gathered this telemetry data through its OnStar service and sold the records to outside data brokers like LexisNexis and Verisk Analytics.

Insurance companies then purchased these detailed profiles to help determine premium costs for individual vehicle owners.

The legal agreement requires the car manufacturer to halt these data sales, delete the stored records, and establish an independent privacy review program.

The main lesson is that corporate governance teams must ensure explicit customer consent before treating user data as a business asset.

โ

Stay safe!

Eyal Estrin, Author @ CSec Weekly