Technology
Hertz data breach exposes customer information

Most companies use different vendors to run different parts of their business, such as customer management, finances, payroll and social media. To do this, they share access to customer data with these platforms. The issue is that not all vendors take cybersecurity seriously, and hackers are well aware of that.
More and more, attackers are going after these weaker links in the digital supply chain. These kinds of breaches often happen quietly, exposing large amounts of customer information without touching a company’s main systems. It’s becoming a serious concern for both businesses and their customers.
One of the latest cases involves Hertz, the car rental giant, which recently confirmed that customer data was exposed because of a cyberattack on one of its software vendors.
Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!
Hertz rental location (Hertz)
What happened at Hertz?
Hertz, the global car rental company that also operates Dollar and Thrifty, has disclosed a data breach affecting thousands of its customers. The incident stems from a cyberattack on one of its third-party vendors, software provider Cleo, between October and December 2024. The breach did not compromise Hertz’s internal systems directly but involved data that had been shared with the vendor as part of its operational workflow.
The compromised data varies by region but includes sensitive personal information such as names, dates of birth, contact details, driver’s license numbers and, in some cases, Social Security numbers and other government-issued IDs. Certain financial information, including payment card details and workers’ compensation claims, was also among the stolen records.
In the U.S., disclosures were filed with regulatory bodies in California, Texas and Maine. Specifically, 3,457 individuals were affected in Maine and 96,665 in Texas. The total global impact, however, is believed to be far greater. Customers in Australia, Canada, the EU, New Zealand and the U.K. were also notified via breach notices on Hertz’s regional websites.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
The breach is believed to be the work of the Clop ransomware gang, a well-known Russia-linked hacking group. Clop exploited a zero-day vulnerability in Cleo’s enterprise file transfer software, technology used by many large organizations to securely transmit sensitive business data. In 2024, the gang launched a mass-hacking campaign targeting Cleo users, ultimately stealing data from more than 60 companies, including Hertz.
Interestingly, while Hertz was named on Clop’s dark web leak site in 2024, the company initially stated it had “no evidence” its systems or data had been compromised.
When contacted by CyberGuy, a Hertz spokesperson said, “At Hertz, we take the privacy and security of personal information seriously. This vendor event involves Cleo, a file transfer platform used by Hertz for limited purposes. Importantly, to date, our forensic investigation has found no evidence that Hertz’s own network was affected by this event. However, among many other companies affected by this event, we have confirmed that Hertz data was acquired by an unauthorized third party that we understand exploited zero-day vulnerabilities within Cleo’s platform in October 2024 and December 2024.”

Hertz rental location (Hertz)
200 MILLION SOCIAL MEDIA RECORDS LEAKED IN MAJOR X DATA BREACH
What does this mean for customers?
While Hertz’s internal systems were not breached, the exposure of personal data, including driver’s license numbers, contact details and government-issued IDs, poses serious risks. Affected individuals may be vulnerable to identity theft, fraudulent account openings and targeted phishing attempts. If Social Security numbers were involved, the potential for harm increases significantly. Anyone who rented from Hertz, Dollar or Thrifty between October and December 2024 should be on high alert.

A hacker at work (Kurt “CyberGuy” Knutsson)
MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT
7 ways to protect yourself after the Hertz data breach
If you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Hertz data breach.
1. Watch out for phishing scams and use strong antivirus software: With access to your email, phone number or identification documents, attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks of the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
2. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Hertz breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.
3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Hertz breach, including Social Security numbers, driver’s license and bank information. This makes you a prime target for identity theft. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.
4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.
5. Monitor your credit reports: Check your credit reports regularly through AnnualCreditReport.com, where you can access free reports from each bureau once per year or more frequently if you’re concerned about fraud. Spotting unauthorized accounts early can prevent larger financial damage.
6. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.
7. Be wary of social engineering attacks: Hackers may use stolen details like names or birth dates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.
HACKERS USING MALWARE TO STEAL DATA FROM USB FLASH DRIVES
Kurt’s key takeaway
Cyber risk doesn’t always come from a company’s own network. It often originates in unseen corners of the digital supply chain. Even as companies double down on internal cybersecurity, they must be equally rigorous in how they vet and monitor third-party vendors. For consumers, it’s no longer enough to trust the big brand on the label. The data trail is wider, the attack surface larger and the consequences far more opaque.
If companies can’t protect our data, should they be allowed to collect so much of it? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.

Technology
Meta asks judge to throw out antitrust case mid-trial

Meta has filed a motion for judgment on the antitrust case it’s currently fighting in court. The motion argues that the Federal Trade Commission (FTC) has failed to produce any evidence that Meta unlawfully monopolized part of the social networking market, something the government argues it did through its acquisitions of Instagram and WhatsApp.
The filing was submitted this evening, shortly after the FTC rested its case in a protracted trial before DC District Court Judge James Boasberg. “After five weeks of trial, it is clear that the FTC has failed to meet the legal standard required under antitrust law,” said Meta spokesperson Christopher Sgro. “Regardless, we will present our case to show what every 17-year-old in the world knows: Instagram competes with TikTok (and YouTube and X and many other apps). The FTC spent tens of millions of taxpayer dollars bringing a weak case with a market definition that ignores reality.”
A judgment on partial findings asks a judge to consider a case’s merits before it has been fully argued in court, attempting to speed its resolution. The trial is still currently scheduled to proceed, with Meta launching into its defense against the FTC’s allegations, but the filing offers a preview of its case.
As Meta’s lawyers have done in cross-examination, it takes aim at the agency’s description of Meta monopolizing a “personal social networking services” market that people use to share information with family and friends. It argues that the FTC has failed to demonstrate Meta reduced the quality of its services (a key sign that a company lacks competition) or that it bought Instagram to neutralize a potential rival.
The FTC has made its case with testimony from several high-profile players in Meta’s businesses, including Instagram’s co-founder Kevin Systrom — who aired complaints about Meta’s handling of his company — and its current head, Adam Mosseri, who offered a more optimistic take. Meta has countered by emphasizing the company’s persistent struggles against social networks that the FTC doesn’t consider full competitors, particularly TikTok, which, in the war for those aforementioned 17-year-olds’ attention, Meta portrays as a constant scourge.
Technology
What hackers can learn about you from a data broker file

Hackers are pretty scary. Amoral, hooded figures with magical computer skills that can break into anything within minutes.
At least that is what most of us think of when we hear the term “hacker.” It is not exactly a realistic or particularly representative image, but, at the same time, it is not too far off the mark either.
What many people do not realize is just how much hackers can learn about you from a data broker file, detailed profiles compiled from your personal information collected and sold by data brokers. This hidden industry fuels much of what hackers use to target individuals today.
Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts, and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!
Illustration of a person’s personal data. (Kurt “CyberGuy” Knutsson)
What is a data broker, and why should you care?
When most people hear the term “data broker,” on the other hand, they draw a blank. Is it a person or company that buys and sells data? Basically, yes. Data brokers collect, sort, analyze, package and sell access to personal information. Whose personal information? Anyone’s and everyone’s, including yours.
THINK YOU CAN DELETE YOUR DATA YOURSELF? HERE’S WHY YOU’RE PROBABLY WRONG

Illustration of a person’s personal data. (Kurt “CyberGuy” Knutsson)
THINK YOU CAN DELETE YOUR OWN DATA? WHY IT’S HARDER THAN YOU THINK
What kinds of personal information do they deal in?
Here is a list of possible data points you, random companies, your worst enemy, your neighbors and, yes, hackers can find in a data broker file:
- Full name
- Past legal names
- Known aliases
- Social media handles
- Gender
- Sexual preferences
- Date of birth or age
- Social Security number (SSN)
- Current and past home addresses
- Current and past phone numbers
- Current, past and secret email addresses
- Political preferences and affiliations
- Occupation
- Current employer
- Employment history
- Business associates
- Education
- Marital status
- Marriage and divorce records
- Family status (number and ages of children)
- Relatives
- Property information
- Vehicle registration
- Assets
- Financial information
- Bankruptcies, judgments and liens
- Licenses (drivers license, firearms permits, etc.)
- Court records
- Criminal records
- Mugshots
- Sex-offender status
- Health history
- Location data
- IP information
- Device information (phone, tablet and computer models)
- Web browser information
- Shopping habits
- Interests and hobbies.
Quite the list, is it not? It is not exhaustive; there is more that data brokers collect and more yet that they and their customers can infer from data points like these. What exactly a given data broker has will depend on which category it falls into.
HACKERS CLAIM MASSIVE BREACH OF COMPANY THAT TRACKS AND SELLS AMERICANS’ LOCATION DATA

Illustration of a person’s personal data. (Kurt “CyberGuy” Knutsson)
HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES
Types of data brokers: Who’s collecting and selling your information?
The most visible data brokers are commonly known as people search sites or people finder sites. These are the sites that show up when you Google yourself, or a hacker Googles you. They are just the tip of the iceberg, though. There are other data brokers that do not bother indexing individual profiles with search engines, preferring instead to deal with other companies and even governments directly. These are the other major types of data brokers, in addition to people search sites:
Marketing data brokers focus more on your browsing habits, past purchases and interests. They are responsible for “personalized marketing” as well as helping other companies target you with those surprisingly relevant ads you see online.
Recruitment data brokers collect and process personal information to offer background screening services to organizations evaluating job candidates or performing background checks before making an offer. Unfortunately, although illegal, there is nothing actually stopping unscrupulous employers from using the much less regulated and reliable people search sites for the same purposes.
Risk mitigation brokers aggregate a variety of background, criminal, property and other information to provide assessment reports to various investment and business companies. The information they collect is aimed at helping such companies manage risk in taking on new business.
Financial information brokers collect various personal finance and background information for credit companies and banks to calculate your credit score and may influence your eligibility to get loans and lines of credit.
Health information data brokers collect information about your general health and sell it to companies in healthcare and related fields. This information can be used to target you with health product ads and even set your insurance premiums.
Hackers are most likely to use people search sites, though; they are easily accessible, eminently searchable, relatively cheap (with trial offers for as little as a dollar) and do not ask any questions. Other data brokers may also sell personal information to hackers, but they tend to sell profiles in bulk.
DATA REMOVAL DOES WHAT VPNS DON’T: HERE’S WHY YOU NEED BOTH
Want your data taken off this market?
It is perfectly normal to want no part in any of this. Unfortunately, there is no federal law on the books in the U.S. that would either prevent this kind of data trade or give you an easy, legally enforced way to opt out.
The good news is that, thanks to an incomplete patchwork of state laws, personal information removal services can approach hundreds of individual data brokers on your behalf with legally binding data-removal requests.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.
Kurt’s key takeaways
It is easy to feel overwhelmed when you realize just how much of your personal information is out there, and how many different players are collecting, selling and using it. But knowing how data brokers operate is the first step to taking back control. Whether it is people search sites or the less visible brokers working behind the scenes, your data is valuable, and you deserve to know who has it and what they are doing with it. The good news is, there are tools and services out there that can help you clean up your digital footprint and protect your privacy. So, do not just sit back and hope for the best — take action and make your data work for you, not against you.
In your opinion, what should be done to give people more control over their data? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Love, Death, and Robots keeps a good thing going in volume 4

At its best, Netflix’s Love, Death, and Robots creates the same feeling as picking up a collection of sci-fi short stories. You don’t always know what to expect, and not everything is brilliant, but you’re guaranteed to experience something interesting. That was especially true of volume 3 of the animated anthology, which offered nine shorts, all of which were excellent. The latest volume doesn’t quite hit the same heights, nor does it have a singular standout episode like “The Very Pulse of the Machine,” but it’s still a strong offering.
What volume 4 does do well — and it’s something that’s a strength of LDR as a whole — is offer a wide variety of tones and styles. There are still the dark, violent, and hyperreal episodes that are so closely associated with LDR, like “Spider Rose,” a follow-up to last season’s “Swarm,” which tells a cyberpunk story about a woman consumed with revenge who ends up finding it with the help of a very strange creature. There’s also “The Screaming of the Tyrannosaur,” in which trained warriors fight to the death in front of rich dignitaries and royalty, all while racing on dinosaurs. In a strangely inspired bit of casting, the death races are hosted by MrBeast.
But the show also continues to push beyond classic, darker science fiction. There’s a lot of comedy here, for instance. One episode is a confessional for smart devices like connected toothbrushes and toilets, which complain about how horrible it is to serve humans. Another follows a cat intent on world domination, who finds the perfect accomplice when its owners bring home a robotic assistant. And if you enjoyed last season’s “Night of the Mini Dead,” there’s a sequel that similarly turns an alien invasion into a cutesy diorama of death and destruction.
And while the show still skews heavily toward CG animation, there are a pair of great 2D episodes, as well. “How Zeke Got Religion” is pure Heavy Metal and is a story about a group of WWII soldiers who end up fighting a demonic monstrosity summoned by the Nazis. It’s filled with copious amounts of blood and gore and a truly terrifying monster that’s all hands, mouths, and screams. That’s joined by “400 Boys,” a wild and kinetic post-apocalyptic action story about a world filled with warring gangs that join together to fight a group of towering, naked babies that are simply called “boys.”
Volume 4 takes a few fun risks, as well. “Golgotha” is the show’s first fully live-action short, a simple story about a priest, an alien invasion, and a resurrected dolphin who might be the messiah. Like the best of LDR, the episode is satisfying on its own, but it also leaves you wanting to see and learn much more about its world. Not all the episodes are quite so successful. “For He Can Creep” is a fine-if-forgettable tale of a cat fighting Satan, while “Can’t Stop” is an impressive-looking music video that turns the Red Hot Chili Peppers into marionettes but feels pretty out of place amid the rest of the season (and LDR as a whole).
But even the worst episodes of volume 4 are still interesting, and that’s the promise of Love, Death, and Robots, really. Streaming services have helped usher in a new wave of sci-fi anthologies, which have ranged from prophetic and impactful to completely unnecessary. LDR might be the most consistent modern example of the form. It’s funny, violent, and surprising — and almost never boring.
Volume 4 of Love, Death, and Robots is now streaming on Netflix.
-
Austin, TX5 days ago
Best Austin Salads – 15 Food Places For Good Greens!
-
Technology1 week ago
Be careful what you read about an Elden Ring movie
-
Technology1 week ago
Netflix is removing Black Mirror: Bandersnatch
-
World1 week ago
The Take: Can India and Pakistan avoid a fourth war over Kashmir?
-
News1 week ago
Reincarnated by A.I., Arizona Man Forgives His Killer at Sentencing
-
News1 week ago
Jefferson Griffin Concedes Defeat in N.C. Supreme Court Race
-
Health1 week ago
N.I.H. Bans New Funding From U.S. Scientists to Partners Abroad
-
News1 week ago
Who is the new Pope Leo XIV and what are his views?