We’re thrilled to share some exciting news: our founder, Lawrence Baldwin, is featured in a gripping new BBC World Service podcast series that dives deep into one of the most remarkable true stories in cyber history.
Listen to Cyber Hack “Evil Corp” on the BBC →
About the Series
The BBC’s Cyber Hack series “Evil Corp” takes listeners inside the high-stakes world of international cybercrime, where hackers, governments, and investigators cross paths in a web of digital intrigue. It’s a global story that touches on billions of dollars, state-backed hacking, and the people who work tirelessly to uncover the truth.
Learn more →myNetWatchman, a leader in real-time compromised credential monitoring and account takeover (ATO) prevention, is delighted to announce the appointment of Madhura Belani as Chief Product Officer. This strategic addition to the leadership team underscores myNetWatchman’s unwavering commitment to advancing cybersecurity solutions for digital businesses.
Madhura is a seasoned executive with extensive leadership experience in payments, fraud prevention, and identity management. She has a proven track record of launching and scaling category-defining products, implementing successful go-to-market strategies, and forging strategic partnerships to drive sustainable growth.
Learn more →The recent news of 23andMe filing for bankruptcy resonates deeply for anyone in fraud prevention. While reports highlight various financial struggles for the genetic testing company, the seeds of this downfall were significantly sown by the massive 2023 data breach that began with credential stuffing attacks.
What Happened
Attackers leveraged credentials compromised elsewhere — that consumers unfortunately reused on their 23andMe accounts — to expose sensitive genetic and ancestry data of over 6.9 million customers.
Learn more →The PowerSchool data leak serves as a stark reminder of the critical importance of protecting user credentials — implementing a service to check whether usernames and passwords are known to be compromised, and enforcing a strong password change policy.
What Happened
Hackers gained access to PowerSchool’s system — likely through stolen credentials — exploiting a vulnerability in the PowerSource support portal. This highlights a common attack vector: compromised credentials. Weak passwords, phishing scams, or credential reuse across platforms can grant unauthorized access to sensitive data.
Learn more →