26 million CVs were exposed when a recruiting software firm left a misconfigured Azure container open – cybersecurity experts warn it's an easy mistake that's becoming far too common
TalentHook left a misconfigured Azure Blob storage container open, researchers said, leaving jobseekers open to phishing attempts


Security researchers have uncovered a misconfigured recruitment database leaking almost 26 million files, and security experts have warned it's a trend that's becoming far too common.
According to analysis from Cybernews, TalentHook, an online applicant tracking platform connecting HR departments with people looking for work, had left a misconfigured Azure Blob storage container open.
As a result, the resumes of millions of US citizens, including their full names, email addresses, phone numbers, education details, professional details, and employment history were exposed.
30% off Keeper Security's Business Starter and Business plans
Keeper Security is trusted and valued by thousands of businesses and millions of employees. Why not join them and protect your most important assets while taking advantage of this special offer?
“The detailed personal information in the exposed resumes enables attackers to conduct highly targeted phishing campaigns," the Cybernews team said.
"Email addresses and phone numbers can be used in phishing emails, SMS scams, or fraudulent job offers, tricking individuals into revealing sensitive information such as ID scans or banking details."
The data could be a boon for cybercriminals looking to snare unsuspecting jobseekers, researchers have warned. In recent months, groups such as the North Korean state-sponsored Lazarus group have been specifically targeting jobseekers.
Research earlier this year showed the group has targeted victims using LinkedIn, for example, or by posing as recruiters and approaching targets via email and WhatsApp.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Sharpen up on storage configurations
Tim Mackey, head of software supply chain risk at Black Duck, said the incident shows the huge risks posed by easily overlooked misconfigurations and urged enterprises to sharpen up processes.
"Misconfigured systems, VMs, containers, micro-services, and data stores are nothing new,” he said.
"For example, the sample of the exposed data for this breach masks key identifiable information, such as email addresses and cell phone numbers, indicating that encryption of those elements wasn’t a priority or that an unsecured API was also part of the breach."
Dray Agha, senior manager of security operations at Huntress, echoed Mackey’s comments, noting that incidents like these are becoming increasingly common.
"Misconfigured cloud storage (like the unsecured Azure container in this case) remains an alarmingly common yet preventable issue, especially in sectors handling highly personal information," said Agha.
"Organizations must implement rigorous configuration audits, enforce least-privilege access controls, and conduct continuous monitoring to prevent such massive exposures of stored personal data."
The Cybernews researchers said they have contacted TalentHook, and advised the company to change the access controls to restrict public access and secure the container, and to update permissions to ensure that only authorized users or services have the necessary access.
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
MORE FROM ITPRO
- Employee phishing training is working – but don’t get complacent
- Phishing tactics: The top attack trends
- Hackers are using PDFs to impersonate big brands in a new threat campaign
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Rackspace just launched a new private cloud service – and it’s open source
News Rackspace OpenStack Business expands on the company's existing private cloud offerings, with a particular focus on cost efficiency and security.
-
Effective Data and Cleo expand partnership to drive supply chain integration capabilities
News The agreement will deepen collaboration between the Cleo Integration Cloud (CIC) and Effective Data’s data integration expertise