Panorays’ Blog

Breaches, Vulnerabilities & Incident Response

Learn about the latest research and happenings in TPCRM
Third Party Data Breaches

Yahoo Data Breaches

The Yahoo data breaches were not a single security incident but a series of massive cyberattacks that…
Third-Party Data Breaches

Facebook Data Breach

When people search for "Facebook data breach," they're usually trying to make sense of several different incidents. Over the years, Facebook's track record reads like a…
Third-party data breaches

LinkedIn Data Breach

LinkedIn's data breach history reflects two distinct security eras. First, there's the classic credential theft from 2012 (which turned out to be way bigger when it…
Anatomy of a Healthcare Data Breach

Twitter Data Breaches

Twitter – now X – is a massive, public-facing platform with hundreds…
Anatomy of a Healthcare Data Breach

Cam4 Data Breach

Cam4 is a high-traffic adult live-streaming platform with millions of performers and…
Cyber Threat Intelligence

The Future of Domain-Based Threats and AI-Driven Cyber…

Domain names have become one of the most common entry points for…
Third-Party Data Breaches

A Practical Guide to Data Breaches: How to…

Data breaches rarely start inside your perimeter. More often, they originate from…

OpenAI Alerts Users Following Third-Party Mixpanel Breach

If you received an unexpected email from OpenAI about a security incident…
Third-party data breaches

When a Vendor Delivers Vulnerability: Inside the DoorDash…

From pizza and sushi to hamburgers and tacos, ordering from food delivery…
Third Party Cyber Risk Assessment

Best Practices for Third-Party Incident Response

Recent high-profile third-party security breaches highlight a growing reality: supply chains are…
Attack Vector

Lessons from the Collins Aerospace Ransomware Attack: When…

By Matan Or-El, CEO & Co-Founder of Panorays When I first read…
Attack Vector

The Role of Automation in External Attack Surface…

The modern enterprise attack surface is bigger and harder to track than…
Remediation vs Mitigation

Top Third-Party Vulnerability Mitigation Strategies for 2025

Third-party vulnerabilities remain one of the most pressing cybersecurity concerns for organizations…
Third-Party Data Breaches

Ahold Delhaize and the Supply Chain Breach CISOs…

Ahold Delhaize breach exposes 2.2M via third party—here’s what CISOs must learn…
The ROI of Implementing Risk Assessment Tools

Trusted, Then Breached: The Hidden Risk of Security…

Organizations rely on trusted third parties, cloud providers, SaaS tools, and security…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely