Technology
Data breach exposes 400,000 bank customers’ info
NEWYou can now listen to Fox News articles!
A major data breach tied to U.S. fintech firm Marquis is rippling through banks, credit unions and their customers. Hackers broke into Marquis systems by exploiting a known but unpatched vulnerability in a SonicWall firewall, gaining access to deeply sensitive consumer data.
At least 400,000 people are confirmed to be affected so far across multiple states. Texas has been hit the hardest with more than 354,000 residents affected. That number is expected to rise as additional breach notifications are filed.
Marquis operates as a marketing and compliance provider for financial institutions. The company says it serves more than 700 banks and credit unions nationwide. That role gives Marquis access to centralized pools of customer data, which also makes it a high-value target.
PASSWORD MANAGER FINED AFTER MAJOR DATA BREACH
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
A major data breach tied to fintech firm Marquis exposed sensitive banking and identity data for hundreds of thousands of people. (Kurt “CyberGuy” Knutsson)
What information was stolen in the Marquis cyberattack
According to legally required disclosures filed in Texas, Maine, Iowa, Massachusetts and New Hampshire, hackers accessed a wide range of personal and financial data. Stolen information includes customer names, dates of birth, postal addresses, Social Security numbers and bank account, debit and credit card numbers. The breach dates back to Aug. 14, when attackers gained access through the SonicWall firewall vulnerability. Marquis later confirmed the incident was a ransomware attack.
While Marquis did not publicly name the attackers, the campaign has been widely linked to the Akira ransomware gang. Akira has previously targeted organizations running SonicWall appliances during large-scale exploitation waves. This was not a routine credential leak.
We reached out to Marquis for comment, and a company spokesperson provided CyberGuy with the following statement:
“In August, Marquis Marketing Services experienced a data security incident. Upon discovery, we immediately enacted our response protocols and proactively took the affected systems offline to protect our data and our customers’ information. We engaged leading third-party cybersecurity experts to conduct a comprehensive investigation and notified law enforcement.
“The incident was quickly contained, and our investigation was recently completed. It was determined that an unauthorized third party accessed certain non-public information within our network. However, there is no evidence indicating that any personal information has been used for identity theft or financial fraud. We have notified potentially affected individuals.
“We know our customers place great trust in us, and at Marquis, we take that responsibility seriously by making the protection of their information our highest priority. We are extremely appreciative of the cooperation, understanding, and support of our employees and customers during this time.”
HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET
Why the Marquis data breach creates long-term identity risk
When a data breach exposes your full identity, the danger does not disappear after the news cycle ends. Unlike a stolen password, this kind of information cannot be changed, which means the risk can stick around for a long time.
“With a typical credential leak, you reset passwords, rotate tokens and move on,” Ricardo Amper, CEO and Founder of Incode Technologies, a digital identity verification company, tells CyberGuy. “But core identity data is static. You cannot meaningfully change your date of birth or SSN, and once those are exposed, they can circulate on criminal markets for years. The breach is a moment in time, but the exposure it creates can follow people for the rest of their financial lives.”
That is why identity breaches are so dangerous. Criminals can reuse the same stolen data years later to open new accounts, build fake identities or run highly targeted scams that feel personal and convincing. Many attackers now combine this data with AI tools to scale their efforts. As a result, phishing emails, phone calls and even voice impersonations are harder to spot when they reference real details about your bank or account history.
The most likely scams after identity data is stolen
When criminals obtain verified identity data, fraud becomes targeted rather than opportunistic.
“Once criminals get their hands on rich, verified identity data, fraud stops being a guessing game and becomes a targeted execution,” Amper said.
The first major threat is account takeover. With enough personal details, attackers can bypass knowledge-based checks, reset passwords, change contact information and abuse accounts in ways that often look legitimate. The second risk is new account fraud. This includes credit cards, loans, buy now pay later services and even new bank accounts. High-quality data helps these applications pass automated systems and manual reviews.
The fastest-growing threat is synthetic identity fraud. Real data, like a Social Security number, is blended with fabricated details to create a new identity that matures over time before a large financial bust.
“These attacks are hard to catch early because the data being presented is accurate and often reused across multiple institutions,” Amper noted. “If your defenses can’t reliably tell a real human from an AI-generated impersonation, you are starting every decision from a position of disadvantage,” he added.
Why unpatched firewall flaws pose such a serious threat
Ransomware groups like Akira increasingly focus on widely deployed infrastructure to maximize impact. Firewalls sit at the boundary of trusted networks. When one is compromised, everything behind it becomes reachable.
“What we’re seeing with groups like Akira is a focus on maximizing impact by targeting widely used infrastructure. The strategy remains the same: Find a single weak point that gives access to many downstream victims at once,” Amper said.
This approach exposes a persistent blind spot in traditional cybersecurity thinking. Many organizations still assume traffic passing through a firewall is safe.
“When the perimeter device itself is the entry point, static defenses and outdated controls simply can’t keep up,” Amper explained.
Hackers accessed names, Social Security numbers and bank details by exploiting an unpatched firewall vulnerability. (Kurt “CyberGuy” Knutsson)
How long affected consumers should assume risk remains high
Identity data does not expire. Social Security numbers and birth dates stay the same for life.
“When core identity data reaches criminal markets, the risk does not fade quickly,” Amper emphasized. “Fraud rings treat stolen identity data like inventory. They hold it, bundle it, resell it and combine it with information from new breaches.”
Warning signs of misuse can be subtle. These include credit inquiries you did not authorize, account recovery alerts from unfamiliar services or phone calls that convincingly mimic a bank’s verification process using deepfake voice tools.
“The most damaging fraud often starts long after the breach is no longer in the news,” Amper added.
The overlooked impact of identity theft
Financial losses are only part of the damage. Victims often experience a lasting erosion of trust.
Amper says, “The most overlooked consequence is the psychological toll of knowing that you can no longer trust who is contacting you. Deepfake impersonation turns every phone call, video message or urgent request into a potential attack.”
Ways to stay safe after the Marquis data breach
When a breach exposes Social Security numbers, bank details and birth dates, the risk does not end with a password reset. These steps focus on protections that reduce long-term identity misuse and help you detect fraud early.
1) Freeze your credit with all major bureaus
A credit freeze prevents criminals from opening new accounts in your name using stolen identity data. This is critical after the Marquis breach, where full identity profiles were exposed. Freezing credit does not affect your score and can be lifted temporarily when needed. Place a free credit freeze with Equifax, Experian and TransUnion online or by phone. Each bureau must be contacted separately. Once frozen, new credit cannot be opened unless you temporarily lift or remove the freeze using a PIN or account login.
2) Place a fraud alert on your credit file
A fraud alert tells lenders to take extra steps to verify your identity before approving credit. It adds protection if you are not ready to freeze credit everywhere or want an extra layer on top of a freeze. Fraud alerts last for one year and can be renewed. You only need to contact one credit bureau to place a fraud alert. Equifax, Experian or TransUnion will notify the others for you. Fraud alerts are free and last for one year.
3) Enable transaction and account alerts
Turn on alerts for withdrawal, purchase, login attempts and password changes across all financial accounts. Real-time alerts can help you catch account takeovers or unauthorized activity before serious damage occurs.
4) Review bank statements and credit reports regularly
Check statements and credit reports often, even months or years after the breach. Identity data from incidents like this is frequently reused later for delayed fraud. Watch for unfamiliar accounts, hard inquiries or small test charges.
5) Use phishing-resistant two-factor authentication
Text message codes can be intercepted or socially engineered. Where possible, switch to app-based or hardware-backed two-factor authentication. These options are harder for attackers to bypass, even when they know your personal details.
6) Rely on strong device-based biometrics where available
Biometrics tied to your physical device add a layer that criminals cannot easily replicate. Face and fingerprint authentication help block account takeovers driven by stolen identity data or AI-powered impersonation.
7) Use strong antivirus software
Reputable antivirus software helps detect malicious links, fake login pages and follow-up attacks that target breach victims. This adds protection against phishing and ransomware tied to identity-based scams.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS
8) Consider a data removal service
Data brokers collect and resell personal information that can be combined with breach data to fuel targeted fraud. A data removal service reduces how much of your personal information is publicly available and lowers your exposure over time.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Experts warn this type of identity exposure can fuel fraud and scams for years after the breach is discovered. (Kurt ‘CyberGuy’ Knutsson)
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
9) Add an identity theft protection service
Identity theft services monitor credit files, dark web markets and account activity for signs that your stolen data is being misused. Many also offer recovery assistance in the event of fraud, which can save time and stress when dealing with banks, credit bureaus and government agencies. This monitoring is especially useful after breaches like Marquis, where identity data can resurface long after the initial incident.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
10) Verify unexpected outreach through official channels
Be cautious of urgent calls, emails or texts that reference real banking or personal details. Scammers now use accurate breach data to sound legitimate. Hang up and contact your bank directly using the number on your card or official website.
11) Lock down tax and government accounts
Create or secure online accounts with the IRS, Social Security Administration and your state tax agency. Enable strong authentication and monitor for unexpected notices. Stolen identity data is often used for tax refund fraud or benefit scams long after a breach.
Kurt’s key takeaways
The Marquis data breach highlights how dangerous unpatched infrastructure vulnerabilities have become for the financial sector. When a single vendor holds data for hundreds of institutions, the fallout spreads quickly. For you, identity protection is no longer a one-time response. It is an ongoing necessity that can last years beyond the initial breach.
What questions do you still have about protecting your identity after a major data breach like this one? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Why Microsoft’s war on Windows’ Control Panel is taking so long
Microsoft first started trying to get rid of the Control Panel in 2012, with the launch of Windows 8. More than a decade later, it’s still working on migrating all the old Control Panel items into the modern Settings app in Windows 11. While there have been hints that the Control Panel might finally go away, the reality is a lot more complicated for Microsoft.
“We’re doing it carefully because there are a lot of different network and printer devices & drivers we need to make sure we don’t break in the process,” explains March Rogers, partner director of design at Microsoft. I could be wrong, but I think this is the first full explanation we’ve had from Microsoft about why it’s taken so long to get rid of the Control Panel.
It looked like Microsoft was about to finally cut the Control Panel in 2024, after years of Microsoft pushing aside the Control Panel in its latest Windows 11 updates. But a support note hinting at the imminent removal of the Control Panel was quickly updated to confirm Microsoft was still in the process of migrating the Control Panel to the Settings app.
Last year Microsoft also migrated clock settings, keyboard character repeat delay, mouse cursor blink rate, and formatting for time, number, and currency into the Settings app. There are also plenty of other mouse settings in the main Settings app that let you avoid the Control Panel these days.
I can’t remember the last time I used the Control Panel thanks to Microsoft’s recent mouse and keyboard improvements to the main Settings app, but a lot of Windows users used to prefer the legacy interface simply because you don’t have to dig into multiple levels to find different controls.
Microsoft is “focusing on design craft in Windows at the moment,” according to Rogers. The Settings interface is being “redesigned for clarity” this month, alongside other improvements to Windows 11 that are part of a broader effort to fix the OS.
Technology
Home robot cooks, cleans and organizes your life
NEWYou can now listen to Fox News articles!
Ready for a home robot that wakes you up, makes breakfast and even cleans the house afterward? It may sound far-fetched. However, the Chinese robotics company UniX AI says it is closer than most people think.
The company’s new Panther series robot is designed to handle full daily routines rather than just one task at a time. It can move through a home, interact with objects and complete multistep actions without constant input.
UniX AI is already testing the system in real homes and service environments. That shift from the lab to everyday use is what makes this worth paying attention to.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
AI ROBOT NOW HELPS TRAVELERS AT SAN JOSÉ AIRPORT
A new home robot from UniX AI is being tested on chores like laundry, kitchen work and picking up household items. The company says the goal is a machine that can finish full routines with limited input. (CFOTO/Future Publishing via Getty Images)
The tech behind this AI home robot
The robot stands about 5 feet 3 inches to 5 feet, 9 inches tall and weighs roughly 170 pounds based on reported specs. Instead of walking like a humanoid, it moves on wheels. That choice improves stability and helps it run longer on a single charge. This robot can run roughly 6 to 12 hours, depending on use.
A six-microphone array lets it hear and respond to voice commands. That gives it a more natural way to interact with people. Its robotic arms are another key piece. They have multiple joints and can lift up to about 26 pounds. That allows for precise movements like picking up items or placing them exactly where they belong.
Under the hood, the robot is packed with sensors and hardware that help it understand and move through your home. It uses cameras and depth sensors to see objects and spaces. It can also rely on LiDAR to map its surroundings and avoid obstacles.
What this AI home robot can actually do
This robot is designed to follow through on tasks from start to finish. Instead of stopping after one action, it can continue working through a routine without needing constant input.
In recent demonstrations, UniX AI shows the robot preparing food, organizing items and interacting with home appliances inside real residential settings.
That matters because real homes are messy and unpredictable. The robot has to recognize objects, adjust to different layouts and handle tasks in sequence.
Here are a few examples of what it is being tested to do:
- Prepare simple meals and handle kitchen tasks
- Assist with basic routines like morning prep
- Clean rooms and surfaces
- Pick up and organize everyday items
- Move objects from one place to another
- Handle laundry tasks like moving clothes and hanging them to dry
Some of these tasks may sound simple, but they are difficult for machines. Handling objects, moving through tight spaces and working around everyday clutter are still major challenges in robotics.
This is what makes the system stand out. It is not just completing one action. It is working through a series of steps in real environments.
US TARGETS CHINESE ROBOTS OVER SECURITY FEARS
UniX AI says its new Panther robot can handle daily household routines, from meal prep to cleaning, in real homes. The company is positioning it as a general-purpose home assistant, not a single-task machine. (REUTERS/Steve Marcus)
Why this AI home robot is different
Most home robots you see today are built for one job. Think robot vacuums or lawn mowers. This system brings those functions into one platform. It works more like a general-purpose helper.
The difference comes down to how it handles tasks. It can plan and complete a sequence instead of waiting for step-by-step instructions. That is where embodied AI comes in.
It connects software intelligence with physical movement in the real world. Instead of only answering questions, the robot can take action.
What is holding AI home robots back
Even with all this progress, there are real hurdles. Homes are unpredictable. Lighting changes throughout the day. Objects come in all shapes and textures. Spaces get cluttered fast. Tasks that seem simple to humans can be difficult for machines. Folding clothes, handling soft materials or moving through tight spaces are still major challenges. Cost and safety matter too. Most people will not bring a robot into their home unless it can handle all of that and work reliably every single day.
What this means to you
You are not replacing your morning routine with a robot tomorrow. But this shows where things are heading. The idea of a home assistant that handles chores is moving closer to reality. That could mean less time spent cleaning and more time for everything else.
At the same time, it raises questions about trust, privacy and cost. A robot that sees your home and hears your voice needs strong safeguards.
For now, think of this as an early glimpse. It is not about buying one today. It is about understanding what could become normal sooner than expected.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
HUMANOID ROBOT SHOWS SPEED AND REAL SKILL
UniX AI’s robot is designed to cook, clean, organize and assist with daily routines in residential settings. The early tests offer a glimpse at how embodied AI could reshape life at home. (REUTERS/Tingshu Wang)
Kurt’s key takeaways
The idea of a robot that cooks, cleans and organizes your life has been around for decades. What feels different now is how close the pieces are coming together. This robot shows real progress in combining movement, perception and decision-making. It is still early, but it is already being tested in real homes. The next few years will show whether it becomes something more of us rely on every day.
If a robot could handle your daily chores, would you trust it inside your home? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Nothing’s noise-canceling CMF Buds 2A are down to just $19.99 just for today
It’s not every day you find a decent pair of wireless earbuds with active noise cancellation, a transparency mode, and app support for less than $20, which is why the current lighting deal on the CMF Buds 2A stands out. Now through 11:15PM ET today, April 7th, Nothing’s budget earbuds are available on Amazon in all three colors for just $19.99 ($29 off), which matches their lowest price to date.
For the price, the Buds 2A cover the basics and then some. They deliver decent (albeit a little tinny) sound and 42 decibels of noise cancellation, along with an IP54 rating and a useful transparency mode for staying aware of your surroundings. They also provide a commendable eight hours of battery life per charge with ANC disabled — or up to 35.5 with the included charging case — and feature four onboard mics that leverage Nothing’s noise reduction tech, which helps boost voice call quality. I wouldn’t say voice clarity is their strong suit, though, again, they’re a $20 pair of earbuds.
Like the rest of Nothing’s entry-level earbuds, the 2A also work with the Nothing X app, adding a level of flexibility that’s hard to find at this price. With the app, you can tweak EQ settings, adjust the bass response, switch between ANC modes, or quickly enable multi-device pairing. There’s even a “find my earbuds” feature if you lose them, and you can assign a gesture to trigger your phone’s virtual assistant on the fly, whether that’s Siri or Google Assistant. On top of that, if you’re using a Nothing or CMF phone, you can use your voice to access ChatGPT directly through the earbuds.
-
Atlanta, GA4 days ago1 teenage girl killed, another injured in shooting at Piedmont Park, police say
-
Movie Reviews6 days agoVaazha 2 first half review: Hashir anchors a lively, chaos-filled teen tale
-
Culture1 week agoDo You Know Where These Famous Authors Are Buried?
-
Georgia1 day agoGeorgia House Special Runoff Election 2026 Live Results
-
Pennsylvania2 days agoParents charged after toddler injured by wolf at Pennsylvania zoo
-
Entertainment6 days agoInside Ye’s first comeback show at SoFi Stadium
-
Milwaukee, WI2 days agoPotawatomi Casino Hotel evacuated after fire breaks out in rooftop HVAC system
-
Indianapolis, IN6 days agoFighting Illini begin Final Four preparations in Indianapolis