Intel’s Employee Data Woes: When Business Cards Become Security Cards
In the wild world of cybersecurity, researcher Eaton Zveare discovered vulnerabilities on Intel websites that could’ve exposed data of 270,000 employees. Thankfully, no breach occurred. Intel swiftly patched the holes, proving once again that even tech giants sometimes need a little digital duct tape.

Hot Take:
Who knew ordering business cards could be so risky? In a plot twist that could rival the most intricate spy thriller, a security researcher managed to access sensitive Intel employee information via a seemingly innocuous business card ordering site. It’s a reminder that sometimes the biggest vulnerabilities lurk in the most mundane places. Intel’s business card process might need a few more layers of encryption—and maybe a dash of drama control.
Key Points:
– Security researcher Eaton Zveare found vulnerabilities in Intel’s internal websites in late 2024.
– Intel patched these vulnerabilities after Zveare reported them, preventing potential data leaks.
– The initial vulnerability was found on an Intel India site for business card orders, exposing global employee data.
– Additional vulnerabilities with hardcoded credentials were discovered on other internal sites.
– Intel has since expanded its bug bounty program to include cloud services and SaaS platforms.