I knew things were not quite right when I had to throw a towel over a broken Ikea lamp to block out its light. How did I get here? I cover fancy and capable tech for a living, and yet, it took me two years to get rid of a pair of old, broken Ikea lamps in my bedroom. Then I got some floor lamps from Govee that changed everything.
Technology
Data breach exposes 400,000 bank customers’ info
NEWYou can now listen to Fox News articles!
A major data breach tied to U.S. fintech firm Marquis is rippling through banks, credit unions and their customers. Hackers broke into Marquis systems by exploiting a known but unpatched vulnerability in a SonicWall firewall, gaining access to deeply sensitive consumer data.
At least 400,000 people are confirmed to be affected so far across multiple states. Texas has been hit the hardest with more than 354,000 residents affected. That number is expected to rise as additional breach notifications are filed.
Marquis operates as a marketing and compliance provider for financial institutions. The company says it serves more than 700 banks and credit unions nationwide. That role gives Marquis access to centralized pools of customer data, which also makes it a high-value target.
PASSWORD MANAGER FINED AFTER MAJOR DATA BREACH
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
A major data breach tied to fintech firm Marquis exposed sensitive banking and identity data for hundreds of thousands of people. (Kurt “CyberGuy” Knutsson)
What information was stolen in the Marquis cyberattack
According to legally required disclosures filed in Texas, Maine, Iowa, Massachusetts and New Hampshire, hackers accessed a wide range of personal and financial data. Stolen information includes customer names, dates of birth, postal addresses, Social Security numbers and bank account, debit and credit card numbers. The breach dates back to Aug. 14, when attackers gained access through the SonicWall firewall vulnerability. Marquis later confirmed the incident was a ransomware attack.
While Marquis did not publicly name the attackers, the campaign has been widely linked to the Akira ransomware gang. Akira has previously targeted organizations running SonicWall appliances during large-scale exploitation waves. This was not a routine credential leak.
We reached out to Marquis for comment, and a company spokesperson provided CyberGuy with the following statement:
“In August, Marquis Marketing Services experienced a data security incident. Upon discovery, we immediately enacted our response protocols and proactively took the affected systems offline to protect our data and our customers’ information. We engaged leading third-party cybersecurity experts to conduct a comprehensive investigation and notified law enforcement.
“The incident was quickly contained, and our investigation was recently completed. It was determined that an unauthorized third party accessed certain non-public information within our network. However, there is no evidence indicating that any personal information has been used for identity theft or financial fraud. We have notified potentially affected individuals.
“We know our customers place great trust in us, and at Marquis, we take that responsibility seriously by making the protection of their information our highest priority. We are extremely appreciative of the cooperation, understanding, and support of our employees and customers during this time.”
HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET
Why the Marquis data breach creates long-term identity risk
When a data breach exposes your full identity, the danger does not disappear after the news cycle ends. Unlike a stolen password, this kind of information cannot be changed, which means the risk can stick around for a long time.
“With a typical credential leak, you reset passwords, rotate tokens and move on,” Ricardo Amper, CEO and Founder of Incode Technologies, a digital identity verification company, tells CyberGuy. “But core identity data is static. You cannot meaningfully change your date of birth or SSN, and once those are exposed, they can circulate on criminal markets for years. The breach is a moment in time, but the exposure it creates can follow people for the rest of their financial lives.”
That is why identity breaches are so dangerous. Criminals can reuse the same stolen data years later to open new accounts, build fake identities or run highly targeted scams that feel personal and convincing. Many attackers now combine this data with AI tools to scale their efforts. As a result, phishing emails, phone calls and even voice impersonations are harder to spot when they reference real details about your bank or account history.
The most likely scams after identity data is stolen
When criminals obtain verified identity data, fraud becomes targeted rather than opportunistic.
“Once criminals get their hands on rich, verified identity data, fraud stops being a guessing game and becomes a targeted execution,” Amper said.
The first major threat is account takeover. With enough personal details, attackers can bypass knowledge-based checks, reset passwords, change contact information and abuse accounts in ways that often look legitimate. The second risk is new account fraud. This includes credit cards, loans, buy now pay later services and even new bank accounts. High-quality data helps these applications pass automated systems and manual reviews.
The fastest-growing threat is synthetic identity fraud. Real data, like a Social Security number, is blended with fabricated details to create a new identity that matures over time before a large financial bust.
“These attacks are hard to catch early because the data being presented is accurate and often reused across multiple institutions,” Amper noted. “If your defenses can’t reliably tell a real human from an AI-generated impersonation, you are starting every decision from a position of disadvantage,” he added.
Why unpatched firewall flaws pose such a serious threat
Ransomware groups like Akira increasingly focus on widely deployed infrastructure to maximize impact. Firewalls sit at the boundary of trusted networks. When one is compromised, everything behind it becomes reachable.
“What we’re seeing with groups like Akira is a focus on maximizing impact by targeting widely used infrastructure. The strategy remains the same: Find a single weak point that gives access to many downstream victims at once,” Amper said.
This approach exposes a persistent blind spot in traditional cybersecurity thinking. Many organizations still assume traffic passing through a firewall is safe.
“When the perimeter device itself is the entry point, static defenses and outdated controls simply can’t keep up,” Amper explained.
Hackers accessed names, Social Security numbers and bank details by exploiting an unpatched firewall vulnerability. (Kurt “CyberGuy” Knutsson)
How long affected consumers should assume risk remains high
Identity data does not expire. Social Security numbers and birth dates stay the same for life.
“When core identity data reaches criminal markets, the risk does not fade quickly,” Amper emphasized. “Fraud rings treat stolen identity data like inventory. They hold it, bundle it, resell it and combine it with information from new breaches.”
Warning signs of misuse can be subtle. These include credit inquiries you did not authorize, account recovery alerts from unfamiliar services or phone calls that convincingly mimic a bank’s verification process using deepfake voice tools.
“The most damaging fraud often starts long after the breach is no longer in the news,” Amper added.
The overlooked impact of identity theft
Financial losses are only part of the damage. Victims often experience a lasting erosion of trust.
Amper says, “The most overlooked consequence is the psychological toll of knowing that you can no longer trust who is contacting you. Deepfake impersonation turns every phone call, video message or urgent request into a potential attack.”
Ways to stay safe after the Marquis data breach
When a breach exposes Social Security numbers, bank details and birth dates, the risk does not end with a password reset. These steps focus on protections that reduce long-term identity misuse and help you detect fraud early.
1) Freeze your credit with all major bureaus
A credit freeze prevents criminals from opening new accounts in your name using stolen identity data. This is critical after the Marquis breach, where full identity profiles were exposed. Freezing credit does not affect your score and can be lifted temporarily when needed. Place a free credit freeze with Equifax, Experian and TransUnion online or by phone. Each bureau must be contacted separately. Once frozen, new credit cannot be opened unless you temporarily lift or remove the freeze using a PIN or account login.
2) Place a fraud alert on your credit file
A fraud alert tells lenders to take extra steps to verify your identity before approving credit. It adds protection if you are not ready to freeze credit everywhere or want an extra layer on top of a freeze. Fraud alerts last for one year and can be renewed. You only need to contact one credit bureau to place a fraud alert. Equifax, Experian or TransUnion will notify the others for you. Fraud alerts are free and last for one year.
3) Enable transaction and account alerts
Turn on alerts for withdrawal, purchase, login attempts and password changes across all financial accounts. Real-time alerts can help you catch account takeovers or unauthorized activity before serious damage occurs.
4) Review bank statements and credit reports regularly
Check statements and credit reports often, even months or years after the breach. Identity data from incidents like this is frequently reused later for delayed fraud. Watch for unfamiliar accounts, hard inquiries or small test charges.
5) Use phishing-resistant two-factor authentication
Text message codes can be intercepted or socially engineered. Where possible, switch to app-based or hardware-backed two-factor authentication. These options are harder for attackers to bypass, even when they know your personal details.
6) Rely on strong device-based biometrics where available
Biometrics tied to your physical device add a layer that criminals cannot easily replicate. Face and fingerprint authentication help block account takeovers driven by stolen identity data or AI-powered impersonation.
7) Use strong antivirus software
Reputable antivirus software helps detect malicious links, fake login pages and follow-up attacks that target breach victims. This adds protection against phishing and ransomware tied to identity-based scams.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS
8) Consider a data removal service
Data brokers collect and resell personal information that can be combined with breach data to fuel targeted fraud. A data removal service reduces how much of your personal information is publicly available and lowers your exposure over time.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Experts warn this type of identity exposure can fuel fraud and scams for years after the breach is discovered. (Kurt ‘CyberGuy’ Knutsson)
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
9) Add an identity theft protection service
Identity theft services monitor credit files, dark web markets and account activity for signs that your stolen data is being misused. Many also offer recovery assistance in the event of fraud, which can save time and stress when dealing with banks, credit bureaus and government agencies. This monitoring is especially useful after breaches like Marquis, where identity data can resurface long after the initial incident.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
10) Verify unexpected outreach through official channels
Be cautious of urgent calls, emails or texts that reference real banking or personal details. Scammers now use accurate breach data to sound legitimate. Hang up and contact your bank directly using the number on your card or official website.
11) Lock down tax and government accounts
Create or secure online accounts with the IRS, Social Security Administration and your state tax agency. Enable strong authentication and monitor for unexpected notices. Stolen identity data is often used for tax refund fraud or benefit scams long after a breach.
Kurt’s key takeaways
The Marquis data breach highlights how dangerous unpatched infrastructure vulnerabilities have become for the financial sector. When a single vendor holds data for hundreds of institutions, the fallout spreads quickly. For you, identity protection is no longer a one-time response. It is an ongoing necessity that can last years beyond the initial breach.
What questions do you still have about protecting your identity after a major data breach like this one? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Trump fires the entire National Science Board
Multiple sources are reporting that the Trump administration has dismissed the entire National Science Board (NSB). The NSB advises the president and Congress on the National Science Foundation (NSF), which has already been funding research at historically low levels and has seen significant delays in doling out that funding. The NSF has been fundamental in helping develop technology used in MRIs, cellphones, and it even helped get Duolingo get off the ground.
In a statement, Zoe Lofgren, the ranking Democrat on the House Science, Space, and Technology Committee, said:
“This is the latest stupid move made by a president who continues to harm science and American innovation. The NSB is apolitical. It advises the president on the future of NSF. It unfortunately is no surprise a president who has attacked NSF from day one would seek to destroy the board that helps guide the Foundation. Will the president fill the NSB with MAGA loyalists who won’t stand up to him as he hands over our leadership in science to our adversaries? A real bozo the clown move.”
Technology
How scammers build a profile on you using data brokers
NEWYou can now listen to Fox News articles!
Go to any people finder site right now and type in your name. What comes back might shock you: your age, home address, phone number, the names of your relatives, where you used to live and even what your property is worth.
You didn’t put that there, and you never consented to it. Still, it’s out there, and anyone with an internet connection can see it.
Scammers figured this out a long time ago. Since then, they’ve turned it into a system for targeting you, your parents and your kids.
So how does it actually work, and more importantly, what can you do to stop it?
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com, trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE SEARCH SITES
A single person search result can reveal your address, relatives and years of personal history in seconds. (Kury “CyberGuy” Knutsson)
How scammers find your personal data online
Before a criminal sends a phishing email or makes a call, they do their homework. Importantly, they don’t need to hack anything. Instead, they use the same public websites that anyone can access.
In less than 10 minutes, a scammer can build a detailed profile on you using data broker sites like Spokeo, Whitepages, BeenVerified and Intelius. Here’s what that profile looks like and how they build it step by step.
Step 1: How scammers search your name on people finder sites
It starts simply. A scammer types your name into a search site. Within seconds, they see results like:
John M. Patterson | Age: 61 | Cleveland, OH
- Also known as: John Michael Patterson
- Current address: [your street address]
- Previous addresses: 4 records found
- Phone numbers: 2 found
- Email addresses: 3 found
- Relatives: 5 found
That is the starting point. Many sites show partial data for free. That is often enough to confirm identity. Full reports cost only a few dollars, so access is easy. Scammers can repeat this process hundreds of times a day, building detailed profiles with very little effort.
Step 2: How scammers map your family and relatives
Next, this is where things get personal. Data broker profiles show more than your name. They reveal your family network.
That often includes:
- Spouse or partner
- Children
- Parents
- Siblings
- Roommates
As a result, scammers can target more than one person. For example, they may learn that your elderly parent lives alone or your child just moved. Because of that, scams like the grandparent scam feel real instead of random.
Step 3: How scammers use your address history
At this point, your address history becomes critical. It is not just about where you live. Instead, scammers use it to:
- Verify identity
- Find relatives
- Build trust
For example, referencing a past address makes a caller sound legitimate. That detail alone can lower suspicion.
Step 4: How scammers use your financial data
More importantly, data brokers also reveal financial clues. These may include:
- Estimated income
- Home value
- Ownership status
- Length of residence
This information comes from public records, not hacking. Because of this, scammers tailor their approach. Higher-income targets may see investment scams.
Others may get job or rental scams instead.
GOOGLE SEARCH LED TO A COSTLY SCAM CALL
Scammers use data broker profiles to map your family and build more convincing, targeted attacks. (Kurt “CyberGuy” Knutsson)
Step 5: How scammers verify and cross-check your data
Before launching a scam, criminals often double-check everything. They don’t rely on just one site. Instead, they compare multiple data broker profiles, social media accounts and public records to confirm details are accurate.
For example, they may:
- Match your address across different sites
- Check Facebook or LinkedIn to confirm family relationships
- Look for recent moves, job changes or life events
Because of this, the profile becomes more reliable. That extra step is what turns a guess into something that feels real.
Step 6: How scammers create targeted scams
At that point, they have everything they need. They know your name, family, address and financial details. Now the scam becomes highly specific.
By the time you hear from them, they already know enough to sound like someone you trust.
- They may call your parent pretending to be you
- They may bypass bank security questions
- They may send texts that look like your child
- They may send emails that reference your life
As a result, the scam feels believable.
Data broker scams are already being prosecuted
This has already landed in court. The U.S. Department of Justice has prosecuted companies like Epsilon, Macromark Inc. and KBM Group for selling data to scammers. Epsilon alone paid $150 million to victims.
At the same time, data tied to the FBI Internet Crime Complaint Center shows more than half of fraud cases involving older Americans were linked to exposed personal data. That shows how serious this problem has become.
Why is your personal data on data broker sites
You do not need to sign up for these sites. Instead, your data comes from many sources, including:
- Voter records
- Property records
- Court filings
- Social media
- Marketing surveys
- Loyalty programs
- Phone directories
- Other data brokers
Because of this, your information spreads quickly.
Why your data keeps reappearing online
Even after removal, your data often comes back. Data brokers constantly update their databases. They buy and resell fresh records. Because of that, one-time removal is not enough.
By the time a scam reaches you or your family, it is often built on real data pulled from multiple public sources. (Wei Leng Tay/Bloomberg)
How to disrupt a scammer’s research before they reach your family
The goal isn’t to disappear completely. It’s to make the profile messy enough, incomplete enough and hard enough to find that scammers move on to easier targets.
Here’s what you can do:
- Search for yourself first. Go to Spokeo, Whitepages, BeenVerified or any other people search site, and look up your own name. See exactly what’s there before a scammer does. That snapshot is your starting point.
- Submit opt-out requests manually. Every major data broker is required to honor removal requests. The catch: There are hundreds of them, each with its own process, and they relist your information regularly. It’s a full-time job.
- Use an automated removal service. This is where I strongly recommend a data removal service. Instead of spending hours submitting individual opt-out forms, a data removal service sends removal requests to 420-plus data brokers on your behalf and keeps sending them when your data reappears. Because it will reappear.
- Set up family alerts. Tell your elderly relatives that you will never ask for money via text from an unknown number. Establish a code word. Scams work because they create panic. A simple family protocol breaks the spell.
- Change your security questions. If your bank still uses “mother’s maiden name” or “city you were born in” as verification, that information is likely already on a data broker site. Switch to nonsense answers that only you know and store them in a password manager.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaways
This kind of scam works because it feels personal. When someone knows your name, your family and even where you used to live, your guard drops. That is exactly what criminals are counting on.
The uncomfortable truth is that your information is already out there, often in more places than you realize. You do not need to panic, but you do need to be proactive. The more you limit what is easily accessible, the harder it becomes for someone to build a convincing story around you. Start with a simple search of your own name. That one step can completely change how you think about your digital footprint. From there, take action to remove what you can and protect what you cannot.
If a stranger can build a detailed profile on your family in minutes, what does that say about how much of your life is already exposed online? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
The Govee smart lamp brightened up my room, and then my life
Those Ikea lamps were around for two years after I moved from Orange County to Los Angeles. Soon after that move, my mom’s Parkinson’s disease — a neurodegenerative condition with no cure — progressed quickly, my mental health took a hit, and most of my own to-do list quietly slid to the back burner as she lost mobility and more urgent things took over. So the big, ugly lamps just… stayed. They became part of the background, like everything else I wasn’t taking care of.
I didn’t even have them plugged into a smart plug — another small upgrade I kept meaning to add to my bedroom, despite having them all over the apartment — which meant I had to get up every time I wanted to turn one on.
One blasted harsh, overpoweringly bright light through a cracked shade. The other was warmer — but not warm enough — so I solved that problem one exhausted night by just throwing a towel over it. Yes, a fire hazard. Yes, I meant it as a temporary fix for a few days. But scattered caregiving brain means temporary fixes can turn into long-term solutions. At some point, it stopped feeling temporary and just became my new normal, even if it clearly wasn’t.
Then my brother bought my mom and me two separate Govee Uplighter Floor Lamps for Christmas, and my Ikea lamp troubles were over. I did not expect to develop an emotional attachment to a lamp. But I did, and now it’s one of my favorite gadgets.
The Govee was quick and easy to assemble, and much slimmer, taking up way less space than the old lamps. As I got rid of the old and set up the new, I felt an odd sense of relief and a small sense of control I hadn’t felt since the move.
Within a week, the old lamp was out of my room. That small shift gave me momentum. I started decluttering other corners that had quietly piled up, things I’d been stepping around for months without really seeing anymore.
The bedroom stopped feeling like an unfinished project I was merely surviving, and started feeling steadier. Calmer. Like a place I could finally exhale in. My days often feel structured around what my mom needs and what has to get done next. I don’t really think about my own space at all, except as something else I haven’t gotten to yet. Having a room that felt calm, even a little bit, made it easier to wind down at the end of the day instead of carrying that feeling of being “on” all the time into the night. It brought me back to myself, even if only a little.

I could relax in a way I hadn’t in a while, without feeling like I should be getting up to do something else. I could dim the lamp from my phone instead of standing up. I could shift from cool to warm without needing a towel and risking starting a fire. There’s a ripple effect that slowly moves across the wall and, for reasons I can’t fully explain, genuinely helps me fall asleep. Cycling through soft colors in the app and syncing it with ambient music is soothing. Sometimes, the changing colors feel a little bit like magic, and I find myself watching them the way I might have as a kid, reminded — briefly — that life can be more playful than it’s felt in a while. The warm, shifting light seems to have a similar effect on my mom, who lives with me, sometimes comforting and even dazzling her as she navigates some of the more difficult parts of the disease, like sundowning, along with her own quiet grief of losing pieces of herself.
And I love that it does all that and more without demanding much. Setup took about 15 to 20 minutes and didn’t require that I try to wrap my head around tools. You control it through the Govee app on your phone, and because it supports Matter, you can also pair it with platforms like Amazon Alexa or Google Assistant for voice control. It offers a wide range of colors, along with 80 preset scenes and seven music modes. At $179.99, it’s pricey, but it’s versatile, basically acting as three lights in one: a top section that casts a soft ripple onto the ceiling, a colorful middle light, and a regular white light at the bottom.
It’s an amazing gift, truly, and I am so grateful for it. Mine, however, had just one problem: It sometimes forgets to be a lamp. It doesn’t lose Wi-Fi. It doesn’t show as offline in the app. It just turns off randomly. The first time it happened, I was rewatching Stranger Things to prepare for the last season. The lights flickered on screen, and then my room went dark. The vibe went from relaxing to terrifying in a second, as I briefly wondered if reality and TV had merged (I might have also had too much wine). Once my brain rebooted, I opened the Govee app and turned it back on. No problem. I assumed it was a power or Wi-Fi issue. Govee sent me a new unit that worked perfectly.
When it works — which is most of the time — it quietly makes my life better. And somehow, that’s been enough to make it one of my new favorite gadgets. It didn’t fix everything, but it helped me start taking care of my space — and myself — again.
-
Detroit, MI24 minutes agoDetroit Red Wings 2025-26 grades feature some A’s, some D’s
-
San Francisco, CA36 minutes agoThe 2026 NFL Draft is complete. See the 49ers projected depth chart
-
Dallas, TX42 minutes agoDAL@MIN Postgame: Jason Robertson | Dallas Stars
-
Boston, MA54 minutes agoPols & Politics: Boston’s $325M White Stadium deal could be killed with booze ban
-
Denver, CO1 hour agoPHOTOS: Denver Nuggets vs. Minnesota Timberwolves in Game 4 of first-round NBA playoff series
-
Seattle, WA1 hour agoFC Dallas Suffers 2-1 Defeat to Seattle Sounders FC | FC Dallas
-
San Diego, CA1 hour agoHector Estevane – San Diego Union-Tribune
-
Milwaukee, WI1 hour agoMilwaukee food trucks will have to close earlier starting next month; here’s why