Connect with us

Technology

Major US shipping platform left customer data wide open to hackers

Published

on

Major US shipping platform left customer data wide open to hackers

NEWYou can now listen to Fox News articles!

Cargo theft is no longer just about stolen trucks and forged paperwork. Over the past year, security researchers have been warning that hackers are increasingly targeting the technology behind global shipping, quietly manipulating systems that move goods worth millions of dollars. 

In some cases, organized crime groups use hacked logistics platforms to redirect shipments, allowing criminals to steal goods without ever setting foot in a warehouse. One recent case involving a critical U.S. shipping technology provider shows just how exposed parts of the supply chain have been, and for how long.

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter     

A key shipping platform was left wide open

CRIME RINGS, HACKERS JOIN FORCES TO HIJACK TRUCKS NATIONWIDE, FUELING MAJOR HOLIDAY SHIPPING SECURITY FEARS

Advertisement

Digital shipping platforms now control how goods move worldwide, making cybersecurity failures a direct risk to the global supply chain. (John Keeble/Getty Images)

The company at the center of this incident is Bluspark Global, a New York-based firm whose Bluvoyix platform is used by hundreds of companies to manage and track freight moving around the world. While Bluspark isn’t a household name, its software supports a large slice of global shipping, including major retailers, grocery chains and manufacturers.

For months, Bluspark’s systems reportedly contained basic security flaws that effectively left its shipping platform exposed to anyone on the internet. According to the company, five vulnerabilities were eventually fixed, including the use of plaintext passwords and the ability to remotely access and interact with the Bluvoyix platform. These flaws could have given attackers access to decades of shipment records and customer data.

Bluspark says those issues are now resolved. But the timeline leading up to the fixes raises serious concerns about how long the platform was vulnerable and how difficult it was to alert the company in the first place.

How a researcher uncovered the flaws

Security researcher Eaton Zveare discovered the vulnerabilities in October while examining the website of a Bluspark customer. What started as a routine look at a contact form quickly escalated. By viewing the website’s source code, Zveare noticed that messages sent through the form passed through Bluspark’s servers using an application programming interface, or API.

Advertisement

From there, things unraveled fast. The API’s documentation was publicly accessible and included a built-in feature that allowed anyone to test commands. Despite claiming authentication was required, the API returned sensitive data without any login at all. Zveare was able to retrieve large amounts of user account information, including employee and customer usernames and passwords stored in plaintext.

Worse, the API allowed the creation of new administrator-level accounts without proper checks. That meant an attacker could grant themselves full access to Bluvoyix and view shipment data going back to 2007. Even security tokens designed to limit access could be bypassed entirely.

Why it took weeks to fix critical shipping security flaws

One of the most troubling parts of this story isn’t just the vulnerabilities themselves, but how hard it was to get them fixed. Zveare spent weeks trying to contact Bluspark after discovering the flaws, sending emails, voicemails, and even LinkedIn messages, without success.

With no clear vulnerability disclosure process in place, Zveare eventually turned to Maritime Hacking Village, which helps researchers notify companies in the shipping and maritime industries. When that failed, he contacted the press as a last resort.

Only after that did the company respond, through its legal counsel. Bluspark later confirmed it had patched the flaws and said it plans to introduce a formal vulnerability disclosure program. The company has not said whether it found evidence that attackers exploited the bugs to manipulate shipments, stating only that there was no indication of customer impact. It also declined to share details about its security practices or any third-party audits.

Advertisement

10 ways you can stay safe when cyberattacks hit supply chains

Hackers can break into a shipping or logistics platform without you ever realizing your data was involved. These steps help you reduce risk when attacks like this happen.

1) Watch for delivery-related scams and fake shipping notices

After supply chain breaches, criminals often send phishing emails or texts pretending to be shipping companies, retailers, or delivery services. If a message pressures you to click a link or “confirm” shipment details, slow down. Go directly to the retailer’s website instead of trusting the message.

2) Use a password manager to protect your accounts

If attackers gain access to customer databases, they often try the same login details on shopping, email, and banking accounts. A password manager ensures every account has a unique password, so one breach doesn’t give attackers the keys to everything else.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

Advertisement

3) Reduce your exposed personal data online

Security researchers found exposed APIs that allowed access to sensitive shipping data without proper authentication. (Portra/Getty Images)

Criminals often combine data from one breach with information scraped from data broker sites. Personal data removal services can help reduce how much of your information is publicly available, making it harder for criminals to target you with convincing scams.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

Advertisement

4) Run strong antivirus software on your devices

Strong antivirus software can block malicious links, fake shipping pages, and malware-laced attachments that often follow high-profile breaches. Keeping real-time protection enabled adds an important layer when criminals try to exploit confusion.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

HUGE DATA LEAK EXPOSES 14 MILLION CUSTOMER SHIPPING RECORDS

5) Enable two-factor authentication wherever possible

Two-factor authentication (2FA) makes it much harder for attackers to take over accounts, even if they have your password. Prioritize email, shopping accounts, cloud storage and any service that stores payment or delivery information.

Advertisement

6) Review your account activity and delivery history

Check your online shopping accounts for unfamiliar orders, address changes, or saved payment methods you don’t recognize. Catching changes early can prevent fraud from escalating.

7) Consider identity theft protection

Identity theft protection services can alert you to suspicious credit activity and help you recover if attackers access your name, address or other personal details. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

8) Place a free credit freeze to stop new fraud

If your name, email, or address was exposed, consider placing a credit freeze with the major credit bureaus. A freeze prevents criminals from opening new accounts in your name, even if they obtain additional personal data later. It’s free, easy to lift temporarily, and one of the most effective steps you can take after a breach. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

9) Lock down your shipping and retailer accounts

Review the security settings on major shopping and delivery accounts, including retailers, grocery services and shipping providers. Pay close attention to saved delivery addresses, default shipping locations and linked payment methods. Attackers sometimes add their own address quietly and wait before making a move.

Advertisement

10) Businesses should review third-party logistics access

If you run a business that relies on shipping or logistics platforms, incidents like this are a reminder to review vendor access controls. Limit administrative permissions, rotate API keys regularly, and confirm vendors have a clear vulnerability disclosure process. Supply chain security depends on more than just your own systems.

Hackers increasingly target logistics technology, manipulating systems to redirect shipments without physical theft.  (Thomas Trutschel/Photothek via Getty Images)

Kurt’s key takeaway

Shipping platforms sit at the intersection of physical goods and digital systems, making them attractive targets for cybercriminals. When basic protections like authentication and password encryption are missing, the consequences can spill into the real world, from stolen cargo to supply chain disruption. The incident also highlights how many companies still lack clear, public ways for researchers to report vulnerabilities responsibly.

Do you think companies that quietly power global supply chains are doing enough to protect themselves from cyber threats?  Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Why Microsoft’s war on Windows’ Control Panel is taking so long

Published

on

Why Microsoft’s war on Windows’ Control Panel is taking so long

Microsoft first started trying to get rid of the Control Panel in 2012, with the launch of Windows 8. More than a decade later, it’s still working on migrating all the old Control Panel items into the modern Settings app in Windows 11. While there have been hints that the Control Panel might finally go away, the reality is a lot more complicated for Microsoft.

“We’re doing it carefully because there are a lot of different network and printer devices & drivers we need to make sure we don’t break in the process,” explains March Rogers, partner director of design at Microsoft. I could be wrong, but I think this is the first full explanation we’ve had from Microsoft about why it’s taken so long to get rid of the Control Panel.

It looked like Microsoft was about to finally cut the Control Panel in 2024, after years of Microsoft pushing aside the Control Panel in its latest Windows 11 updates. But a support note hinting at the imminent removal of the Control Panel was quickly updated to confirm Microsoft was still in the process of migrating the Control Panel to the Settings app.

Last year Microsoft also migrated clock settings, keyboard character repeat delay, mouse cursor blink rate, and formatting for time, number, and currency into the Settings app. There are also plenty of other mouse settings in the main Settings app that let you avoid the Control Panel these days.

I can’t remember the last time I used the Control Panel thanks to Microsoft’s recent mouse and keyboard improvements to the main Settings app, but a lot of Windows users used to prefer the legacy interface simply because you don’t have to dig into multiple levels to find different controls.

Advertisement

Microsoft is “focusing on design craft in Windows at the moment,” according to Rogers. The Settings interface is being “redesigned for clarity” this month, alongside other improvements to Windows 11 that are part of a broader effort to fix the OS.

Continue Reading

Technology

Home robot cooks, cleans and organizes your life

Published

on

Home robot cooks, cleans and organizes your life

NEWYou can now listen to Fox News articles!

Ready for a home robot that wakes you up, makes breakfast and even cleans the house afterward?  It may sound far-fetched. However, the Chinese robotics company UniX AI says it is closer than most people think.

The company’s new Panther series robot is designed to handle full daily routines rather than just one task at a time. It can move through a home, interact with objects and complete multistep actions without constant input.

UniX AI is already testing the system in real homes and service environments. That shift from the lab to everyday use is what makes this worth paying attention to.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Advertisement

AI ROBOT NOW HELPS TRAVELERS AT SAN JOSÉ AIRPORT

A new home robot from UniX AI is being tested on chores like laundry, kitchen work and picking up household items. The company says the goal is a machine that can finish full routines with limited input. (CFOTO/Future Publishing via Getty Images)

The tech behind this AI home robot

The robot stands about 5 feet 3 inches to 5 feet, 9 inches tall and weighs roughly 170 pounds based on reported specs. Instead of walking like a humanoid, it moves on wheels. That choice improves stability and helps it run longer on a single charge.  This robot can run roughly 6 to 12 hours, depending on use.

A six-microphone array lets it hear and respond to voice commands. That gives it a more natural way to interact with people. Its robotic arms are another key piece. They have multiple joints and can lift up to about 26 pounds. That allows for precise movements like picking up items or placing them exactly where they belong.

Under the hood, the robot is packed with sensors and hardware that help it understand and move through your home. It uses cameras and depth sensors to see objects and spaces. It can also rely on LiDAR to map its surroundings and avoid obstacles.

Advertisement

What this AI home robot can actually do

This robot is designed to follow through on tasks from start to finish. Instead of stopping after one action, it can continue working through a routine without needing constant input.

In recent demonstrations, UniX AI shows the robot preparing food, organizing items and interacting with home appliances inside real residential settings.

That matters because real homes are messy and unpredictable. The robot has to recognize objects, adjust to different layouts and handle tasks in sequence.

Here are a few examples of what it is being tested to do:

  • Prepare simple meals and handle kitchen tasks
  • Assist with basic routines like morning prep
  • Clean rooms and surfaces
  • Pick up and organize everyday items
  • Move objects from one place to another
  • Handle laundry tasks like moving clothes and hanging them to dry

Some of these tasks may sound simple, but they are difficult for machines. Handling objects, moving through tight spaces and working around everyday clutter are still major challenges in robotics.

This is what makes the system stand out. It is not just completing one action. It is working through a series of steps in real environments.

Advertisement

US TARGETS CHINESE ROBOTS OVER SECURITY FEARS

UniX AI says its new Panther robot can handle daily household routines, from meal prep to cleaning, in real homes. The company is positioning it as a general-purpose home assistant, not a single-task machine. (REUTERS/Steve Marcus)

Why this AI home robot is different

Most home robots you see today are built for one job. Think robot vacuums or lawn mowers. This system brings those functions into one platform. It works more like a general-purpose helper.

The difference comes down to how it handles tasks. It can plan and complete a sequence instead of waiting for step-by-step instructions. That is where embodied AI comes in.

It connects software intelligence with physical movement in the real world. Instead of only answering questions, the robot can take action.

Advertisement

What is holding AI home robots back

Even with all this progress, there are real hurdles. Homes are unpredictable. Lighting changes throughout the day. Objects come in all shapes and textures. Spaces get cluttered fast. Tasks that seem simple to humans can be difficult for machines. Folding clothes, handling soft materials or moving through tight spaces are still major challenges. Cost and safety matter too. Most people will not bring a robot into their home unless it can handle all of that and work reliably every single day.

What this means to you

You are not replacing your morning routine with a robot tomorrow. But this shows where things are heading. The idea of a home assistant that handles chores is moving closer to reality. That could mean less time spent cleaning and more time for everything else.

At the same time, it raises questions about trust, privacy and cost. A robot that sees your home and hears your voice needs strong safeguards.

For now, think of this as an early glimpse. It is not about buying one today. It is about understanding what could become normal sooner than expected.

Take my quiz: How safe is your online security?

Advertisement

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

HUMANOID ROBOT SHOWS SPEED AND REAL SKILL

UniX AI’s robot is designed to cook, clean, organize and assist with daily routines in residential settings. The early tests offer a glimpse at how embodied AI could reshape life at home. (REUTERS/Tingshu Wang)

Kurt’s key takeaways

The idea of a robot that cooks, cleans and organizes your life has been around for decades. What feels different now is how close the pieces are coming together. This robot shows real progress in combining movement, perception and decision-making. It is still early, but it is already being tested in real homes. The next few years will show whether it becomes something more of us rely on every day.

If a robot could handle your daily chores, would you trust it inside your home? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

Nothing’s noise-canceling CMF Buds 2A are down to just $19.99 just for today

Published

on

Nothing’s noise-canceling CMF Buds 2A are down to just .99 just for today

It’s not every day you find a decent pair of wireless earbuds with active noise cancellation, a transparency mode, and app support for less than $20, which is why the current lighting deal on the CMF Buds 2A stands out. Now through 11:15PM ET today, April 7th, Nothing’s budget earbuds are available on Amazon in all three colors for just $19.99 ($29 off), which matches their lowest price to date.

For the price, the Buds 2A cover the basics and then some. They deliver decent (albeit a little tinny) sound and 42 decibels of noise cancellation, along with an IP54 rating and a useful transparency mode for staying aware of your surroundings. They also provide a commendable eight hours of battery life per charge with ANC disabled — or up to 35.5 with the included charging case — and feature four onboard mics that leverage Nothing’s noise reduction tech, which helps boost voice call quality. I wouldn’t say voice clarity is their strong suit, though, again, they’re a $20 pair of earbuds.

Like the rest of Nothing’s entry-level earbuds, the 2A also work with the Nothing X app, adding a level of flexibility that’s hard to find at this price. With the app, you can tweak EQ settings, adjust the bass response, switch between ANC modes, or quickly enable multi-device pairing. There’s even a “find my earbuds” feature if you lose them, and you can assign a gesture to trigger your phone’s virtual assistant on the fly, whether that’s Siri or Google Assistant. On top of that, if you’re using a Nothing or CMF phone, you can use your voice to access ChatGPT directly through the earbuds.

Continue Reading

Trending