Connect with us

Technology

Data breach exposes 400,000 bank customers’ info

Published

on

Data breach exposes 400,000 bank customers’ info

NEWYou can now listen to Fox News articles!

A major data breach tied to U.S. fintech firm Marquis is rippling through banks, credit unions and their customers. Hackers broke into Marquis systems by exploiting a known but unpatched vulnerability in a SonicWall firewall, gaining access to deeply sensitive consumer data.

At least 400,000 people are confirmed to be affected so far across multiple states. Texas has been hit the hardest with more than 354,000 residents affected. That number is expected to rise as additional breach notifications are filed.

Marquis operates as a marketing and compliance provider for financial institutions. The company says it serves more than 700 banks and credit unions nationwide. That role gives Marquis access to centralized pools of customer data, which also makes it a high-value target.

PASSWORD MANAGER FINED AFTER MAJOR DATA BREACH

Advertisement

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

A major data breach tied to fintech firm Marquis exposed sensitive banking and identity data for hundreds of thousands of people. (Kurt “CyberGuy” Knutsson)

What information was stolen in the Marquis cyberattack

According to legally required disclosures filed in Texas, Maine, Iowa, Massachusetts and New Hampshire, hackers accessed a wide range of personal and financial data. Stolen information includes customer names, dates of birth, postal addresses, Social Security numbers and bank account, debit and credit card numbers. The breach dates back to Aug. 14, when attackers gained access through the SonicWall firewall vulnerability. Marquis later confirmed the incident was a ransomware attack.

While Marquis did not publicly name the attackers, the campaign has been widely linked to the Akira ransomware gang. Akira has previously targeted organizations running SonicWall appliances during large-scale exploitation waves. This was not a routine credential leak.

We reached out to Marquis for comment, and a company spokesperson provided CyberGuy with the following statement:

Advertisement

“In August, Marquis Marketing Services experienced a data security incident. Upon discovery, we immediately enacted our response protocols and proactively took the affected systems offline to protect our data and our customers’ information. We engaged leading third-party cybersecurity experts to conduct a comprehensive investigation and notified law enforcement.

“The incident was quickly contained, and our investigation was recently completed. It was determined that an unauthorized third party accessed certain non-public information within our network. However, there is no evidence indicating that any personal information has been used for identity theft or financial fraud. We have notified potentially affected individuals.  

“We know our customers place great trust in us, and at Marquis, we take that responsibility seriously by making the protection of their information our highest priority. We are extremely appreciative of the cooperation, understanding, and support of our employees and customers during this time.”

HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET 

Why the Marquis data breach creates long-term identity risk

When a data breach exposes your full identity, the danger does not disappear after the news cycle ends. Unlike a stolen password, this kind of information cannot be changed, which means the risk can stick around for a long time.

Advertisement

“With a typical credential leak, you reset passwords, rotate tokens and move on,” Ricardo Amper, CEO and Founder of Incode Technologies, a digital identity verification company, tells CyberGuy. “But core identity data is static. You cannot meaningfully change your date of birth or SSN, and once those are exposed, they can circulate on criminal markets for years. The breach is a moment in time, but the exposure it creates can follow people for the rest of their financial lives.”

That is why identity breaches are so dangerous. Criminals can reuse the same stolen data years later to open new accounts, build fake identities or run highly targeted scams that feel personal and convincing. Many attackers now combine this data with AI tools to scale their efforts. As a result, phishing emails, phone calls and even voice impersonations are harder to spot when they reference real details about your bank or account history.

The most likely scams after identity data is stolen

When criminals obtain verified identity data, fraud becomes targeted rather than opportunistic. 

“Once criminals get their hands on rich, verified identity data, fraud stops being a guessing game and becomes a targeted execution,” Amper said. 

The first major threat is account takeover. With enough personal details, attackers can bypass knowledge-based checks, reset passwords, change contact information and abuse accounts in ways that often look legitimate. The second risk is new account fraud. This includes credit cards, loans, buy now pay later services and even new bank accounts. High-quality data helps these applications pass automated systems and manual reviews.

Advertisement

The fastest-growing threat is synthetic identity fraud. Real data, like a Social Security number, is blended with fabricated details to create a new identity that matures over time before a large financial bust. 

“These attacks are hard to catch early because the data being presented is accurate and often reused across multiple institutions,” Amper noted. “If your defenses can’t reliably tell a real human from an AI-generated impersonation, you are starting every decision from a position of disadvantage,” he added.

Why unpatched firewall flaws pose such a serious threat

Ransomware groups like Akira increasingly focus on widely deployed infrastructure to maximize impact. Firewalls sit at the boundary of trusted networks. When one is compromised, everything behind it becomes reachable. 

“What we’re seeing with groups like Akira is a focus on maximizing impact by targeting widely used infrastructure. The strategy remains the same: Find a single weak point that gives access to many downstream victims at once,” Amper said. 

This approach exposes a persistent blind spot in traditional cybersecurity thinking. Many organizations still assume traffic passing through a firewall is safe. 

Advertisement

“When the perimeter device itself is the entry point, static defenses and outdated controls simply can’t keep up,” Amper explained.

Hackers accessed names, Social Security numbers and bank details by exploiting an unpatched firewall vulnerability.  (Kurt “CyberGuy” Knutsson)

How long affected consumers should assume risk remains high

Identity data does not expire. Social Security numbers and birth dates stay the same for life. 

“When core identity data reaches criminal markets, the risk does not fade quickly,” Amper emphasized. “Fraud rings treat stolen identity data like inventory. They hold it, bundle it, resell it and combine it with information from new breaches.” 

Warning signs of misuse can be subtle. These include credit inquiries you did not authorize, account recovery alerts from unfamiliar services or phone calls that convincingly mimic a bank’s verification process using deepfake voice tools. 

Advertisement

“The most damaging fraud often starts long after the breach is no longer in the news,” Amper added.

The overlooked impact of identity theft

Financial losses are only part of the damage. Victims often experience a lasting erosion of trust. 

Amper says, “The most overlooked consequence is the psychological toll of knowing that you can no longer trust who is contacting you. Deepfake impersonation turns every phone call, video message or urgent request into a potential attack.”

Ways to stay safe after the Marquis data breach

When a breach exposes Social Security numbers, bank details and birth dates, the risk does not end with a password reset. These steps focus on protections that reduce long-term identity misuse and help you detect fraud early.

1) Freeze your credit with all major bureaus

A credit freeze prevents criminals from opening new accounts in your name using stolen identity data. This is critical after the Marquis breach, where full identity profiles were exposed. Freezing credit does not affect your score and can be lifted temporarily when needed. Place a free credit freeze with Equifax, Experian and TransUnion online or by phone. Each bureau must be contacted separately. Once frozen, new credit cannot be opened unless you temporarily lift or remove the freeze using a PIN or account login.

Advertisement

2) Place a fraud alert on your credit file

A fraud alert tells lenders to take extra steps to verify your identity before approving credit. It adds protection if you are not ready to freeze credit everywhere or want an extra layer on top of a freeze. Fraud alerts last for one year and can be renewed. You only need to contact one credit bureau to place a fraud alert. Equifax, Experian or TransUnion will notify the others for you. Fraud alerts are free and last for one year.

3) Enable transaction and account alerts

Turn on alerts for withdrawal, purchase, login attempts and password changes across all financial accounts. Real-time alerts can help you catch account takeovers or unauthorized activity before serious damage occurs.

4) Review bank statements and credit reports regularly

Check statements and credit reports often, even months or years after the breach. Identity data from incidents like this is frequently reused later for delayed fraud. Watch for unfamiliar accounts, hard inquiries or small test charges.

5) Use phishing-resistant two-factor authentication

Text message codes can be intercepted or socially engineered. Where possible, switch to app-based or hardware-backed two-factor authentication. These options are harder for attackers to bypass, even when they know your personal details.

6) Rely on strong device-based biometrics where available

Biometrics tied to your physical device add a layer that criminals cannot easily replicate. Face and fingerprint authentication help block account takeovers driven by stolen identity data or AI-powered impersonation.

Advertisement

7) Use strong antivirus software

Reputable antivirus software helps detect malicious links, fake login pages and follow-up attacks that target breach victims. This adds protection against phishing and ransomware tied to identity-based scams.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS

8) Consider a data removal service

Data brokers collect and resell personal information that can be combined with breach data to fuel targeted fraud. A data removal service reduces how much of your personal information is publicly available and lowers your exposure over time.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Experts warn this type of identity exposure can fuel fraud and scams for years after the breach is discovered. (Kurt ‘CyberGuy’ Knutsson)

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

9) Add an identity theft protection service

Identity theft services monitor credit files, dark web markets and account activity for signs that your stolen data is being misused. Many also offer recovery assistance in the event of fraud, which can save time and stress when dealing with banks, credit bureaus and government agencies. This monitoring is especially useful after breaches like Marquis, where identity data can resurface long after the initial incident.

Advertisement

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

10) Verify unexpected outreach through official channels

Be cautious of urgent calls, emails or texts that reference real banking or personal details. Scammers now use accurate breach data to sound legitimate. Hang up and contact your bank directly using the number on your card or official website.

11) Lock down tax and government accounts

Create or secure online accounts with the IRS, Social Security Administration and your state tax agency. Enable strong authentication and monitor for unexpected notices. Stolen identity data is often used for tax refund fraud or benefit scams long after a breach.

Kurt’s key takeaways 

The Marquis data breach highlights how dangerous unpatched infrastructure vulnerabilities have become for the financial sector. When a single vendor holds data for hundreds of institutions, the fallout spreads quickly. For you, identity protection is no longer a one-time response. It is an ongoing necessity that can last years beyond the initial breach.

What questions do you still have about protecting your identity after a major data breach like this one? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

AO3 is finally out of beta after 17 years

Published

on

AO3 is finally out of beta after 17 years

Archive of Our Own (AO3) is officially exiting beta. The Organization for Transformative Works — the nonprofit behind the fanfiction site — announced the update on Thursday, which comes 17 years after AO3’s launch in 2009.

“Since 2009, AO3 has grown and changed a lot,” the announcement says. “We’ve introduced many features over the years through the efforts of our volunteers and coding contributors, as well as the contractors we’ve been able to hire thanks to generous donations from our users.”

The post highlights some of the features that AO3 has since its launch, including a tagging system, fanworks downloads, privacy settings that allow creators to limit access to their work, and more. Just because AO3 is exiting beta, doesn’t mean the updates will stop flowing:

As the AO3 software has been stable for a long time, the change is mostly cosmetic and does not indicate that everything is finalized or perfectly working. Exiting beta doesn’t mean we’ll stop continuing to improve AO3—our volunteer coders and community contributors will still be working to add to and improve AO3 every day.

One of the most significant changes to the site is the absence of the tiny “beta” label inside the AO3 logo displayed at the top of the platform. (AO3 briefly changed the beta to “omega” for April Fools’ Day this year).

You can keep tabs on the updates coming to AO3 by viewing its projects on Jira

Advertisement
Continue Reading

Technology

US targets Chinese robots over security fears

Published

on

US targets Chinese robots over security fears

NEWYou can now listen to Fox News articles!

A bipartisan group of lawmakers wants to draw a clear line on where certain robots may operate in the United States. Senators Tom Cotton (R-Ark.) and Chuck Schumer (D-N.Y.) recently introduced legislation that would ban the federal government from using robots made by foreign adversaries, a category that includes China but can also apply to other designated countries.

The proposal, called the American Security Robotics Act, targets unmanned ground systems. That includes humanoid robots and remote-controlled surveillance machines. The concern is not just what these robots can do. It is what they could be doing behind the scenes. Lawmakers say these systems are already being marketed to U.S. research labs, universities, law enforcement agencies and even consumers.

Sign up for my FREE CyberGuy Report 

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Advertisement

WHITE HOUSE UNVEILS ITS FIRST FEDERAL AI FRAMEWORK, PUSHES CONGRESS TO ACT ‘THIS YEAR’

Advanced humanoid robots like this from Unitree Robotics highlight how quickly the technology is evolving and why officials are raising data security concerns. (Unitree)

Why lawmakers say these robots pose a risk

According to statements from the lawmakers involved, the core issue is security. Schumer warned that Chinese robotics companies could embed hidden access points inside their systems. These so-called backdoors could allow unauthorized access to sensitive data or even enable remote control. Lawmakers warn that these systems could include hidden access points or be vulnerable to remote control. Schumer said, “The Chinese Communist Party has shown that they are willing to lie and cheat to get ahead at the expense of the American people and our national security. They are running their standard playbook, this time in robotics, trying to flood the U.S. market with their technology, which presents real security risks and threats to Americans’ privacy and American research and industry.”

He said the Chinese government has a track record of prioritizing its own strategic goals over transparency, raising concerns about how that approach could extend into robotics.

TOP AI FIRM ALLEGES CHINESE LABS USED 24K FAKE ACCOUNTS TO SIPHON US TECH

Advertisement

A humanoid robot from Unitree Robotics, similar to the systems lawmakers are scrutinizing over potential security risks in government use. (Unitree)

What the bill would actually do

The American Security Robotics Act focuses specifically on federal use. The bill targets countries designated as foreign adversaries, including Communist China, according to the lawmakers.

The legislation targets “unmanned ground vehicle systems,” including humanoid robots and autonomous patrol technologies used by federal agencies. If passed, it would block U.S. government agencies from purchasing or operating unmanned ground vehicles built by companies tied to foreign adversaries. That includes:

  • Humanoid robots used in public-facing roles
  • Remote surveillance robots
  • Other automated ground systems used in government operations

It also blocks federal agencies from using these systems through contractors or funding their use through grants or agreements. Cotton said, “Robots made by Communist China threaten Americans’ privacy and our national security. Our bill will ban the federal government from buying and operating these devices made in countries that wish us harm.”

The operational ban would take effect one year after the law is enacted. The bill includes exceptions for national security, research, testing and certain law enforcement or intelligence activities under strict conditions.

The bill does not ban these products outright for consumers or private companies. Instead, it draws a boundary around government adoption where sensitive data and infrastructure are involved. Meanwhile, Rep. Elise Stefanik (R-N.Y.) is introducing a companion bill in the House, signaling coordinated support across both chambers of Congress.

Advertisement

The timing matters as robotics competition heats up

This legislation comes at a moment when China is rapidly advancing in robotics. Recent demonstrations in Beijing showcased a new generation of highly capable robots, highlighting how quickly the technology is evolving. That momentum has raised alarms in Washington about falling behind while also importing potential risks. Stefanik said, “We must continue to promote and propel America’s robotics superiority while safeguarding our privacy and national security from adversaries.

At the same time, U.S. companies are pushing forward. One example came when a humanoid robot from Figure AI recently appeared at a White House education summit alongside First Lady Melania Trump. She suggested robots like these could eventually play a role in education, hinting at how deeply this technology could integrate into everyday life.

DEMOCRATS WARN TRUMP GREEN-LIGHTING NVIDIA AI CHIP SALES COULD BOOST CHINA’S MILITARY EDGE

Multiple humanoid robots developed by Unitree Robotics show the growing capabilities of foreign-made systems now entering global markets. (Unitree)

What this means for you

If you are not working inside the federal government, this bill will not directly affect what you can buy or use. Still, it signals something bigger. It does raise questions about how much access foreign-made devices could have to data inside your home or workplace. First, it shows that robotics is no longer just about convenience or innovation. It is now part of national security conversations. Second, it highlights growing concern about where your data goes when you interact with connected devices. That applies whether it is a robot, a smart home device or a surveillance system. Finally, it suggests that future restrictions could expand beyond government use if risks are confirmed or public concern grows.

Advertisement

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com   

Kurt’s key takeaways

This is not just about robots walking through offices or classrooms. It is about trust. Lawmakers are drawing attention to a question that has followed other technologies before. Who built it, and who might still have access to it after it is deployed? As robotics becomes more common in public spaces, homes and workplaces, those questions will only get louder. The technology is moving fast. Policy is trying to catch up.

Would you feel comfortable interacting with a humanoid robot if you did not know who ultimately controlled its data?  Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report 

Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

The best AirPods deals you can get right now

Published

on

The best AirPods deals you can get right now

If you know where to look, you can often score deals on Apple’s ever-expanding AirPods lineup. Both the AirPods Pro 3 and the AirPods 4 (with and without ANC) now consistently receive discounts, as do the AirPods Pro 3. And while major shopping events like Black Friday and Amazon Prime Day have delivered some of the biggest price drops, there are still good deals to be found on every model — including the recently released AirPods Max 2.

Below, we’ve rounded up the best deals currently available on each set of AirPods, including both iterations of the AirPods 4 and AirPods Max, as well as the third-gen AirPods Pro.

At the end of 2024, Apple introduced the AirPods 4, a pair of wireless earbuds available in two variations: a $129 standard model and a $179 noise-canceling model. Both versions represent significant upgrades over the third-gen AirPods, with a more comfortable design and improved audio performance. They’re also better for taking calls thanks to Apple’s Voice Isolation feature, which focuses the mics on your voice so you can be heard more clearly in noisy environments.

The $179 AirPods 4 with Active Noise Cancellation offer a surprisingly effective noise-canceling mode, a helpful transparency mode, and several other Pro-level features. The latest AirPods Pro do a better job of tuning out noise, but the AirPods 4 with ANC still do a good job of reducing sound. They also feature other perks formerly reserved for Apple’s top-of-the-line earbuds, including wireless charging and a case with a built-in speaker that allows you to easily track it down via Apple’s Find My app.

Given they’ve been out for over a year, we consistently see discounts for both iterations of the AirPods 4. During Black Friday, we saw the standard model drop to a new low of $74; however, right now, they’re only down to $119 ($10 off) at Amazon, Walmart, and B&H Photo. The AirPods 4 with ANC, meanwhile, are on sale for $154.99 ($24 off) at Amazon, Walmart, and Costco (for members), which is significantly more than their recent low of $99.

Advertisement

The best AirPods Pro 3 deals

At its “Awe Dropping” event in September, Apple introduced the AirPods Pro 3. In addition to improved ANC and sound, the third-gen earbuds include a built-in heart rate sensor that syncs with the iPhone Fitness app, allowing you to track your pulse and calories burned across more than 50 workout types. They’re also more comfortable and secure than their predecessor, thanks to a redesigned, angled fit and five ear tip sizes — including a new XXS option. Additionally, they carry a more robust IP57 rating and support Apple’s new live translation feature, which, in our testing, generally conveys the gist well but still can’t beat a human interpreter.

Given how recently they launched, we’ve been surprised by how often the AirPods Pro 3 have been discounted. In fact, last month we saw them drop to $199 ($50 off), which is $15 shy of their all-time low. Unfortunately, while they’re still on sale, they’ve since increased in price to $224 ($25 off) at retailers like Amazon and Walmart.

The best AirPods Max deals

The AirPods Max aren’t the iconic in-ears that have become synonymous with the AirPods name. Both the first-gen Max and the newer AirPods Max 2 are large and luxurious, comprised of aluminum, steel, and mesh fabric that remains comfortable during extended listening sessions. The original pair delivered clear, expansive sound, great noise cancellation, and lossless audio over USB-C; however, with the Max 2, Apple built upon that excellent foundation with improved ANC and a built-in amplifier for better sound. They also feature Apple’s newer H2 chip, enabling AI-powered live translation, adaptive audio, and other features once reserved for the AirPods Pro line. The over-ears aren’t the best noise-canceling headphones for everyone — blame the sticker price — but for iPhone users, they’re hard to beat.

Advertisement

The AirPods Max 2 retail for $549 — the same price as the original model — but you can currently save $20 on both the black and white versions at Amazon and Costco (if you’re a member), which is the first discount we’ve seen on the recently released headphones. If you’re okay with picking up the last-gen model, the original AirPods Max with USB-C are on sale in select colors for $399.99 ($150 off) at Woot through April 3rd, matching their best price to date. They’re also available in a wider range of hues at Amazon, Walmart, Target, and other retailers for $449.99 ($100 off), which is still a hefty discount.

Update, April 2nd: Updated to reflect current pricing and availability, as well as the recent release of the AirPods Max 2.

Continue Reading

Trending