Connect with us

Technology

Major US shipping platform left customer data wide open to hackers

Published

on

Major US shipping platform left customer data wide open to hackers

NEWYou can now listen to Fox News articles!

Cargo theft is no longer just about stolen trucks and forged paperwork. Over the past year, security researchers have been warning that hackers are increasingly targeting the technology behind global shipping, quietly manipulating systems that move goods worth millions of dollars. 

In some cases, organized crime groups use hacked logistics platforms to redirect shipments, allowing criminals to steal goods without ever setting foot in a warehouse. One recent case involving a critical U.S. shipping technology provider shows just how exposed parts of the supply chain have been, and for how long.

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter     

A key shipping platform was left wide open

CRIME RINGS, HACKERS JOIN FORCES TO HIJACK TRUCKS NATIONWIDE, FUELING MAJOR HOLIDAY SHIPPING SECURITY FEARS

Advertisement

Digital shipping platforms now control how goods move worldwide, making cybersecurity failures a direct risk to the global supply chain. (John Keeble/Getty Images)

The company at the center of this incident is Bluspark Global, a New York-based firm whose Bluvoyix platform is used by hundreds of companies to manage and track freight moving around the world. While Bluspark isn’t a household name, its software supports a large slice of global shipping, including major retailers, grocery chains and manufacturers.

For months, Bluspark’s systems reportedly contained basic security flaws that effectively left its shipping platform exposed to anyone on the internet. According to the company, five vulnerabilities were eventually fixed, including the use of plaintext passwords and the ability to remotely access and interact with the Bluvoyix platform. These flaws could have given attackers access to decades of shipment records and customer data.

Bluspark says those issues are now resolved. But the timeline leading up to the fixes raises serious concerns about how long the platform was vulnerable and how difficult it was to alert the company in the first place.

How a researcher uncovered the flaws

Security researcher Eaton Zveare discovered the vulnerabilities in October while examining the website of a Bluspark customer. What started as a routine look at a contact form quickly escalated. By viewing the website’s source code, Zveare noticed that messages sent through the form passed through Bluspark’s servers using an application programming interface, or API.

Advertisement

From there, things unraveled fast. The API’s documentation was publicly accessible and included a built-in feature that allowed anyone to test commands. Despite claiming authentication was required, the API returned sensitive data without any login at all. Zveare was able to retrieve large amounts of user account information, including employee and customer usernames and passwords stored in plaintext.

Worse, the API allowed the creation of new administrator-level accounts without proper checks. That meant an attacker could grant themselves full access to Bluvoyix and view shipment data going back to 2007. Even security tokens designed to limit access could be bypassed entirely.

Why it took weeks to fix critical shipping security flaws

One of the most troubling parts of this story isn’t just the vulnerabilities themselves, but how hard it was to get them fixed. Zveare spent weeks trying to contact Bluspark after discovering the flaws, sending emails, voicemails, and even LinkedIn messages, without success.

With no clear vulnerability disclosure process in place, Zveare eventually turned to Maritime Hacking Village, which helps researchers notify companies in the shipping and maritime industries. When that failed, he contacted the press as a last resort.

Only after that did the company respond, through its legal counsel. Bluspark later confirmed it had patched the flaws and said it plans to introduce a formal vulnerability disclosure program. The company has not said whether it found evidence that attackers exploited the bugs to manipulate shipments, stating only that there was no indication of customer impact. It also declined to share details about its security practices or any third-party audits.

Advertisement

10 ways you can stay safe when cyberattacks hit supply chains

Hackers can break into a shipping or logistics platform without you ever realizing your data was involved. These steps help you reduce risk when attacks like this happen.

1) Watch for delivery-related scams and fake shipping notices

After supply chain breaches, criminals often send phishing emails or texts pretending to be shipping companies, retailers, or delivery services. If a message pressures you to click a link or “confirm” shipment details, slow down. Go directly to the retailer’s website instead of trusting the message.

2) Use a password manager to protect your accounts

If attackers gain access to customer databases, they often try the same login details on shopping, email, and banking accounts. A password manager ensures every account has a unique password, so one breach doesn’t give attackers the keys to everything else.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

Advertisement

3) Reduce your exposed personal data online

Security researchers found exposed APIs that allowed access to sensitive shipping data without proper authentication. (Portra/Getty Images)

Criminals often combine data from one breach with information scraped from data broker sites. Personal data removal services can help reduce how much of your information is publicly available, making it harder for criminals to target you with convincing scams.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

Advertisement

4) Run strong antivirus software on your devices

Strong antivirus software can block malicious links, fake shipping pages, and malware-laced attachments that often follow high-profile breaches. Keeping real-time protection enabled adds an important layer when criminals try to exploit confusion.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

HUGE DATA LEAK EXPOSES 14 MILLION CUSTOMER SHIPPING RECORDS

5) Enable two-factor authentication wherever possible

Two-factor authentication (2FA) makes it much harder for attackers to take over accounts, even if they have your password. Prioritize email, shopping accounts, cloud storage and any service that stores payment or delivery information.

Advertisement

6) Review your account activity and delivery history

Check your online shopping accounts for unfamiliar orders, address changes, or saved payment methods you don’t recognize. Catching changes early can prevent fraud from escalating.

7) Consider identity theft protection

Identity theft protection services can alert you to suspicious credit activity and help you recover if attackers access your name, address or other personal details. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

8) Place a free credit freeze to stop new fraud

If your name, email, or address was exposed, consider placing a credit freeze with the major credit bureaus. A freeze prevents criminals from opening new accounts in your name, even if they obtain additional personal data later. It’s free, easy to lift temporarily, and one of the most effective steps you can take after a breach. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

9) Lock down your shipping and retailer accounts

Review the security settings on major shopping and delivery accounts, including retailers, grocery services and shipping providers. Pay close attention to saved delivery addresses, default shipping locations and linked payment methods. Attackers sometimes add their own address quietly and wait before making a move.

Advertisement

10) Businesses should review third-party logistics access

If you run a business that relies on shipping or logistics platforms, incidents like this are a reminder to review vendor access controls. Limit administrative permissions, rotate API keys regularly, and confirm vendors have a clear vulnerability disclosure process. Supply chain security depends on more than just your own systems.

Hackers increasingly target logistics technology, manipulating systems to redirect shipments without physical theft.  (Thomas Trutschel/Photothek via Getty Images)

Kurt’s key takeaway

Shipping platforms sit at the intersection of physical goods and digital systems, making them attractive targets for cybercriminals. When basic protections like authentication and password encryption are missing, the consequences can spill into the real world, from stolen cargo to supply chain disruption. The incident also highlights how many companies still lack clear, public ways for researchers to report vulnerabilities responsibly.

Do you think companies that quietly power global supply chains are doing enough to protect themselves from cyber threats?  Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

4chan’s creator says ‘Epstein had nothing to do’ with creating infamous far-right board /pol/

Published

on

4chan’s creator says ‘Epstein had nothing to do’ with creating infamous far-right board /pol/

Epstein had nothing to do with the reintroduction of a politics board to 4chan, nor anything else related to the site. The decision to add the board was made weeks beforehand, and the board was added almost 24 hours prior to a first, chance encounter at a social event. His assistant reached out to me afterward, and I met with him one time for an unmemorable lunch meeting. This happened at a time when I was meeting hundreds of people a month while speaking and networking at tech events.

I did not meet him again nor maintain contact. I regret having ever encountered him at all, and have deep sympathy for all of his victims.

Continue Reading

Technology

Woman owes $3,556 for cruise she already paid for after falling victim to elaborate Zelle scam

Published

on

Woman owes ,556 for cruise she already paid for after falling victim to elaborate Zelle scam

NEWYou can now listen to Fox News articles!

A family vacation turned into a five-year nightmare. And it started with one payment.

L. Williams found a cruise consultant online who booked her family a week on Carnival Freedom. Great price. One catch. He only accepted Zelle. She sent $3,556. The family sailed the Western Caribbean. Gorgeous sunsets. Wonderful memories.

Five years later, she tried to book another cruise. Nope.

Carnival told her she was on the Do Not Sail list. Turns out her “consultant” pocketed the Zelle cash, then used a stolen credit card to book the trip. When the real cardholder disputed the charge, Williams got the blame.

Advertisement

DON’T LOCK YOUR FAMILY OUT: A DIGITAL LEGACY GUIDE

She now owes $3,556 for a trip she already paid for. Banned for life. The scammer’s phone? Disconnected. (Of course.)

The deals are real right now

Here’s what you need to know. The cheapest window for domestic spring break flights is about 43 days before departure. For late March trips, that’s this week. Wait until late February, and prices jump 20% to 25%. That’s your cash walking out the door.

Fly Tuesday, Wednesday or Saturday, and save up to 30% over weekend flights. Set Google Flights alerts now. Caribbean fares are down 17% from last year. 

Bundle flights with hotels through Costco, Expedia or Delta Vacations, and you can knock hundreds off the total.

Advertisement

Travelers arrive at Los Angeles International Airport on Monday, Nov. 3, 2025 in Los Angeles, CA.  (Juliana Yamada / Los Angeles Times via Getty Images)

Scammers circling like sharks

Williams’ story isn’t a one-off. Over 38 million people are expected to cruise in 2026, and scammers know it. Here are the big cons I’m seeing.

  • The Google trap. Fake cruise line phone numbers are showing up in search results. One man called what he thought was Carnival’s customer service line and got hit with a $650 per person “docking fee.” That’s not a thing. Real cruise lines don’t charge surprise fees by phone. Always go directly to the official website for contact info.
  • The free cruise postcard. Got one in the mail? Toss it. The fine print buries you in hundreds of dollars of hidden fees and a windowless cabin with bunk beds. How romantic. One investigation found the company behind these changes its name every year so you can’t look them up.

AI JOBS THAT PAY $200K OR MORE

  • The Facebook agent. Scammers pose as travel agents in Facebook groups and collect payments through Zelle, Venmo or Cash App. Then they vanish. These apps have zero buyer protection. They’re for sending money to people you trust, not strangers selling Caribbean getaways.
  • Your three rules: Always pay with a credit card. Never call a customer service number from a Google search, go to the official site. If you want a travel agent, verify them at ASTA.org.

Book smart and you’ll be sipping something tropical in a few weeks. Book carelessly and you might end up on the Do Not Sail list, which, ironically, is the worst kind of cruise control.

TRAVELING SOON? KNOW HOW TO NAVIGATE FLIGHT CANCELLATIONS NOW

If anyone you know is booking a spring break trip, send them this first. It takes two seconds to forward and could save them thousands. One payment to the wrong person cost a woman her vacation money, her cruise line privileges and years of debt headaches.

Advertisement

An RV parked in a campsite during the early autumn.  (iStock)

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

National radio show airing on 500+ stations, a free daily newsletter, videos on YouTube, plus the podcast wherever you listen. 

Advertisement

Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.

Continue Reading

Technology

Tenways’ compact e-bike twists and folds to go flat

Published

on

Tenways’ compact e-bike twists and folds to go flat

Tenways just launched its new CGO Compact electric bike in Europe that’s designed to fit into tight spaces like car trunks, apartment hallways, and train compartments.

To achieve this, the CGO Compact is fitted with small 20-inch wheels, folding pedals, and a handlebar fitted with a twistable stem to create a slim, wall-hugging profile. The adjustable steering column and low-step through frame also make it suitable for a wide range of rider heights, so it could be a good shareable e-bike for families. And its MIK HD rear carrier system is good for hauling up to 27kg (almost 60 pounds) around town, with mounting points for additional accessories like a crate or child seat.

Tenways might not be a household name globally, but the Chinese e-bike company headquartered in the Netherlands is making a name for itself in Europe thanks to aggressive pricing, sleek designs, and over 1,500 shops and service centers. And while the CGO Compact’s €1,999 (about $2,365) price tag isn’t cheap, it’s well below the €2,681 average for European e-bikes.

The company does sell e-bikes in the US, but the CGO Compact is only for sale in Europe as of today. It features a 250W rear-hub motor connected to a Gates Carbon belt drive for maintenance-free propulsion. It promises a range of up to 100km from its 500Wh removable battery, but its single-speed drivetrain produces only 45Nm of torque so it’s best suited for relatively flat cities. If your commute does stray from asphalt then the suspension seat post should help absorb bumps. There’s also an integrated torque sensor to ensure the smooth delivery of pedal-assisted power, and Tektro hydraulic disc brakes should keep any sudden stops under control.

The CGO Compact lives up to its name regarding size, but it’s not all that lightweight. Stripped down it weighs 19.8kg (almost 44 pounds), or 22.1kg (almost 49 pounds) with all the accessories you’ll want in wet urban environments. That makes it heavier than many full-sized e-bikes, even from Tenways, and less versatile than the excellent 20-inch Brompton G foldable which also weighs less but costs more than twice as much.

Advertisement
Continue Reading

Trending