Military Contractor’s Vendor Leaks Resumes in Misconfigured AWS S3

Thousands of resumes and job applications from U.S. military veterans, law enforcement, and others were leaked by a recruiting vendor in an unsecured AWS S3 bucket. Continue reading Military Contractor’s Vendor Leaks Resumes in Misconfigured AWS S3

Vendor Exposes Backup of Chicago Voter Roll via AWS Bucket

Voter registration data belonging to the entirety of Chicago’s electoral roll—1.8 million records—was found a week ago in an Amazon Web Services bucket. Continue reading Vendor Exposes Backup of Chicago Voter Roll via AWS Bucket

Report: personal data of more than 14M Verizon customers is exposed in server breach

The personal data of as many as 14 million U.S. Verizon customers has been exposed in a publicly accessible server owned and operated by a third-party vendor. NICE Systems, an Israeli firm that provides call center and back-office operations for Verizon, administered the server that contained customer names, addresses, account details and account personal identification numbers (PINS), according to a new report from UpGuard’s Cyber Risk Team, who discovered the breach. Given NICE Systems’ history of supplying technology for state-sponsored — and often intrusive — surveillance, these findings are concerning, the report stated. “This offshore logging of Verizon customer information in a downloadable repository should be alarming to all customers who entrust their private data to major US companies, only to see it shared with unknown parties,” the report reads. The data was stored in an Amazon Web Services S3 bucket that “appears to have been created to log customer […]

The post Report: personal data of more than 14M Verizon customers is exposed in server breach appeared first on Cyberscoop.

Continue reading Report: personal data of more than 14M Verizon customers is exposed in server breach

200 million registered voters exposed due to open AWS repository

A misconfigured database containing sensitive personal information of 198 million American voters was left exposed to the internet for 12 days by a Republican data analysis firm, the largest known data exposure of its kind. According to UpGuard Cyber Risk Analyst Chris Vickery, republican contractors Deep Root Analytics, TargetPoint consulting, Inc. and Data Trust stored the data on a public cloud owned by Deep Root Analytics. The names, dates of birth, home addresses, phone numbers, and voter registration details of nearly all of America’s registered voters were exposed, including “modeled” data of voter ethnicities and religions. The enormous amount of political data, compiled by the RNC and contracting firms after Mitt Romney’s loss in the 2012 presidential election, held around 9.5 billion data points of three out of five americans, grading the 198 million registered voters on political leanings across forty-eight categories using algorithmic modeling. Vickery discovered the Amazon Web Services S3 […]

The post 200 million registered voters exposed due to open AWS repository appeared first on Cyberscoop.

Continue reading 200 million registered voters exposed due to open AWS repository