Zero-Day Exploit, Data Scraping & Foster Youth Risks – 10/11/2025

October 10, 2025
Zero-Day Exploit, Data Scraping & Foster Youth Risks – 10/11/2025

Today’s privacy digest highlights the exploitation of a zero-day vulnerability in Gladinet file sharing software, posing a significant risk to system files. We also examine the privacy implications of data scraping for AI, the risks of identity theft for foster youth, and ongoing scams targeting consumers. Stay informed to protect your data and privacy.

Top 5 Critical Privacy Alerts

  • Hackers exploiting zero-day in Gladinet file sharing software: Threat actors are exploiting a zero-day vulnerability (CVE-2025-11371) in Gladinet CentreStack and Triofox products. Read more
  • Article: The Great Scrape: The Clash Between Scraping and Privacy: AI systems depend on scraped data, often containing personal information, impacting tools like facial recognition. Read more
  • How to help protect foster youth from identity theft: Foster youth are at greater risk of identity theft due to frequent moves and increased access to their information. Read more
  • No, that’s not an FTC commissioner on the phone: Scammers impersonate FTC officials to steal money; the FTC will never ask you to move your money. Read more
  • Who’s eligible for a refund from Amazon?: Amazon is refunding consumers who were enrolled in Prime subscriptions without their consent and then made it difficult to cancel. Read more
  • When sharing your info online leads to unwanted and unlawful telemarketing calls: Sharing your information online can lead to unwanted telemarketing calls, which are illegal if you’re on the Do Not Call Registry. Read more

Regulatory Fines & Enforcement Actions

  • Who’s eligible for a refund from Amazon?: Amazon is refunding consumers who were enrolled in Prime subscriptions without their consent and then made it difficult to cancel. Read more

Uncategorized

  • How to prepare yourself to deal with an emergency and avoid disaster-related scams: Having a plan and knowing how to spot disaster-related scams can make a difference to anyone recovering from a disaster. Read more
  • How to help protect foster youth from identity theft: Foster youth are at greater risk of identity theft due to frequent moves and increased access to their information. Read more
  • No, that’s not an FTC commissioner on the phone: Scammers impersonate FTC officials to steal money; the FTC will never ask you to move your money. Read more
  • Get a credit freeze to stop identity thieves: Freezing your credit is a great way to protect yourself from identity theft. Read more
  • This Medicare Open Enrollment season, learn how to protect yourself from scams: Scammers are active during Medicare Open Enrollment, so learn to spot the scams to protect your money and information. Read more
  • Thinking about selling your timeshare? Key steps to avoid scams: Be cautious when selling your timeshare, as there are many scams to watch out for. Read more
  • Before you donate, find out where the money is going: Ensure that the fundraiser is legitimate and that your money will be spent as promised. Read more
  • How to spot a job scam: Learn how to identify phony business opportunities, work-at-home scams, and shady employment agencies. Read more
  • Tony Blair and Nick Clegg hosted dinner giving tech bosses access to UK minister: Tony Blair and Nick Clegg hosted a private dinner for tech leaders to meet with a UK minister. Read more
  • Using a swearword in your Google search can stop the AI answer. But should you?: Using a swear word in your Google search can stop the AI answer from popping up. Read more
  • Watch Now: Navigating Surveillance with EFF Members: EFF partnered with WISP to discuss online behavioral tracking and the data broker industry. Read more
  • EFF Austin: Organizing and Making a Difference in Central Texas: EFF-Austin advocates for digital rights and educates the public about emerging technologies. Read more
Distribute Intel
Chris Armour
Director of Software Engineering
Chris Armour
The Breaker & Builder.

Operating on the philosophy that 'you can't build a secure system if you don't know how to break it,' Chris leads our engineering division. A top 1% National Cyber League competitor, he hardens our digital infrastructure against the very exploits he has mastered.

Press & Media

Media Inquiries

For expert commentary, interview requests, or high-res assets regarding this announcement, initialize the terminal.

Initialize Terminal

Initiate
Deployment.

Whether you need a full adversarial facility audit or an executive resilience protocol for your leadership team.

Secure the Facility (Assessments)
Secure the Mind (Coaching/Speaking)