Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

EventBuilder misconfiguration put 100K users’ data at risk

The popular webinar tool, which integrates with Microsoft Teams, has now closed an exposure containing over a million files with user email addresses and phone numbers

data-breach-freepik-cyber69247.jpg
September 21, 2021

Over one million CSV/JSON files with personal information of event registrants using Microsoft Teams, including phone numbers and email addresses, have been exposed to potential cybercriminals worldwide.


Security company Clario Tech, in partnership with cybersecurity researcher Bob Diachenko, discovered the exposure within EventBuilder, a virtual events integration tool for Microsoft products.


The data was stored on Microsoft Azure Blob Storage — Microsoft’s object storage solution for the cloud. The storage was partially public to host recorded sessions for link-only access. However, the webinars’ organizers inadvertently included registrants’ information in the blob, compromising the personal information of webinar attendees and potentially putting them in danger from cybercriminals across the globe.


“Eventbuilder is widely used by Microsoft and integrated with Teams,” says Diachenko. “So this data exposure is an interesting case study in how even the most advanced technology companies can expose themselves to data vulnerabilities.”


Over one million large-sized CSV/JSON files with Microsoft events registrants details and summaries, including:

  • Full names
  • Email addresses
  • Company names and position in a company
  • Phone numbers
  • Questionnaires answered


It is estimated that this exposure of personal information has impacted at least 100,000 people. Researchers say that anyone registered with EventBuilder should take the proper steps to protect their personal information, including installing credible cybersecurity software featuring identity protection and dark web monitoring.


Michael Isbitski, Technical Evangelist at Salt Security, a Palo Alto, Calif.-based provider of API security, says, “This incident is another case of general-purpose cloud storage not being secured appropriately by an application team. The security problem is the same as numerous other cloud data storage exposures. Engineering teams at EventBuilder did not properly secure sensitive information and protect it from public viewing. EventBuilder intended to make recorded webinar sessions available for public view; however, full registrant details, including many forms of PII, were also stored in public Azure Blob Storage instances and inadvertently exposed. The exact number of impacted users wasn’t given in the disclosure; however, the estimate is that hundreds of thousands of webinar attendees on the EventBuilder platform had their PII exposed.”


Isbitski explains, “The cloud providers equip organizations with functionality to report on and lock down their cloud data stores. Unfortunately, development and engineering teams don’t always consider cloud data storage’s misuse or abuse cases in application designs. This reality is sometimes a side effect of increasing pressure to deliver fast on new application functionality, and appropriate security controls are overlooked.”


Clario informed EventBuilder of the exposure earlier this summer, and EventBuilder has now fixed it. 


“This is an archetypal example of a SaaS provider not paying attention to permissions associated with cloud storage used to store customer information,” says Oliver Tavakoli, CTO at Vectra, a San Jose, Calif.-based AI cybersecurity company. “It is generally a bad idea to co-mingle data which is intended to be publicly available with data which should only be accessible to authenticated or privileged users as it requires discipline around maintaining fine-grained access control – which clearly did not happen in this case.”

KEYWORDS: cyber security data breach information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Consumers Put $100K Price Tag on Digital Lives

    See More
  • wifi-freepik

    Wi-Fi vulnerability may put millions of devices at risk

    See More
  • New Report Reveals How Accidental Insider Threats Put Organizations at Real Risk

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing