<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>personal and sensitive or private data &#8211; Bitfinance</title>
	<atom:link href="https://bitfinance.news/en/etiqueta/personal-and-sensitive-or-private-data/feed/" rel="self" type="application/rss+xml" />
	<link>https://bitfinance.news</link>
	<description>Fintech &#38; new economy info</description>
	<lastBuildDate>Mon, 26 Jan 2026 12:57:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://bitfinance.news/wp-content/uploads/2025/01/favicon-64.png</url>
	<title>personal and sensitive or private data &#8211; Bitfinance</title>
	<link>https://bitfinance.news</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Let&#8217;s reduce risks: How cybercriminals use stolen information</title>
		<link>https://bitfinance.news/en/lets-reduce-risks-how-cybercriminals-use-stolen-information/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 12:30:08 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[corporate and institutional data]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[personal and sensitive or private data]]></category>
		<category><![CDATA[protect yourself]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[reduce risk]]></category>
		<category><![CDATA[Safeguard]]></category>
		<category><![CDATA[suggestions]]></category>
		<category><![CDATA[theft]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=118842</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="985" height="553" src="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET analiza e informa sobre la utilización maliciosa de los datos sensibles y/o confidenciales robados, uno de los botines predilectos del cibercrimen, algo que debemos prevenir y frente a lo cual resguardarnos" decoding="async" fetchpriority="high" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg 985w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-300x168.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-768x431.jpg 768w" sizes="(max-width: 985px) 100vw, 985px" /></div><p>For cybercriminals, information represents money, an access point, and also a tool for committing new crimes. This is why personal and sensitive or private data, such as full names, contact information, credit card numbers and banking credentials, health data, social media and service login credentials, among others, have become one of the most coveted targets [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/lets-reduce-risks-how-cybercriminals-use-stolen-information/">Let&#8217;s reduce risks: How cybercriminals use stolen information</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="985" height="553" src="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET analiza e informa sobre la utilización maliciosa de los datos sensibles y/o confidenciales robados, uno de los botines predilectos del cibercrimen, algo que debemos prevenir y frente a lo cual resguardarnos" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg 985w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-300x168.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-768x431.jpg 768w" sizes="(max-width: 985px) 100vw, 985px" /></div><p style="text-align: justify;">For <strong>cybercriminals,</strong> information represents money, an access point, and also a tool for committing new crimes. This is why <strong>personal and sensitive or private data,</strong> such as full names, contact information, credit card numbers and banking credentials, health data, social media and service login credentials, among others, have become one of the most coveted targets for malicious actors. <strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a></strong>, a leading international company in proactive threat detection, analyzes <strong>what cybercriminals do once they obtain stolen information.</strong></p>
<h2 style="text-align: left;">Most common actions</h2>
<p style="text-align: justify;"><strong>Selling it on underground forums:</strong> One of the main benefits cybercriminals derive from stolen information is simply money. Personal data has significant value for the criminal ecosystem. They primarily sell it on<strong> underground forums and Dark Web marketplaces,</strong> where personal data, login credentials, banking and financial information, corporate passwords, and any other sensitive information are sought after by other cybercriminals for use in various illegal activities.</p>
<h3 style="text-align: left;">Other crimes</h3>
<ul style="text-align: justify;">
<li><strong><a href="https://www.welivesecurity.com/la-es/2022/05/11/que-es-robo-suplantacion-de-identidad/" target="_blank" rel="noopener">Identity theft</a>:</strong> The more information cybercriminals obtain about a person, the more tools they have to create a fake digital profile and thus scam their contacts or commit cybercrimes in their name. • Financial fraud: Certain personal data facilitates access to financial resources, allowing cybercriminals to obtain illicit gains. This can range from making purchases to applying for credit cards.</li>
<li><strong>Personalized <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/que-es-phishing-guia-completa-2025/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=cibercrimen&amp;utm_term=es" target="_blank" rel="noopener">phishing</a> attacks:</strong> Stolen information allows cybercriminals to create much more credible and targeted phishing emails. Data such as the victim&#8217;s work email address or the company where they work can lend a false sense of authenticity to an email with malicious intent.</li>
<li><strong>Extortion of victims:</strong> Information is a very powerful tool that, in the wrong hands, can be used for extortion and blackmail. Cybercriminals often use it to pressure their victims, from a concrete threat to making confidential data public, selling it to competitors, or simply causing reputational damage. In most of these cases, their goal is to obtain money.</li>
<li><strong>Espionage and sabotage:</strong> In the business or government sector, a simple stolen password can be the gateway to internal networks, critical infrastructure, and even confidential information belonging to clients, suppliers, allies, or business partners—and that&#8217;s just the beginning.</li>
</ul>
<p style="text-align: justify;">In contrast to the points mentioned above, in these cases the objective is not monetary, but rather <strong><a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/octubre-rojo-malware-robo-documentos-secretos/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=cibercrimen&amp;utm_term=es" target="_blank" rel="noopener">to spy undetected</a>, accessing networks, emails, and internal communications, <a href="https://www.welivesecurity.com/la-es/2017/06/20/sistemas-industriales-en-la-mira/" target="_blank" rel="noopener">altering production or logistics processes</a>, and even deleting, modifying, or corrupting key information.</strong></p>
<p style="text-align: justify;">In this context, <strong>it becomes essential to take concrete actions to protect sensitive and confidential data, whether personal, corporate, or institutional.</strong></p>
<h4 style="text-align: left;">ESET Latin America shares recommendations to significantly reduce the risk of data being exposed or falling into the wrong hands</h4>
<ul>
<li>Protect your information: avoid sharing <a href="https://www.welivesecurity.com/la-es/2022/12/29/datos-personales-internet-como-limpiar-presencia-online/" target="_blank" rel="noopener">personal data online</a>.</li>
<li>Use <a href="https://www.welivesecurity.com/es/contrasenas/contrasenas-que-tan-seguras-son/" target="_blank" rel="noopener">strong passwords</a>: they should be robust and unique for each account.</li>
<li>Activate <a href="https://www.welivesecurity.com/la-es/2022/12/22/doble-factor-autenticacion-que-es-porque-lo-necesito/" target="_blank" rel="noopener">two-factor authentication</a> on every account that allows it.</li>
<li>Keep both <a href="https://www.welivesecurity.com/la-es/2023/03/15/razones-mantener-software-dispositivos-actualizados/" target="_blank" rel="noopener">devices and software up to date</a>.</li>
<li>Have a robust and reliable <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/como-elegir-antivirus-5-puntos-clave/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=cibercrimen&amp;utm_term=es" target="_blank" rel="noopener">security solution</a>.</li>
<li>Stay up-to-date on the <a href="https://www.welivesecurity.com/es/contrasenas/contrasenas-que-tan-seguras-son/" target="_blank" rel="noopener">latest cybersecurity news</a>.</li>
</ul>
<p style="text-align: justify;">For other useful data and preventative information, visit <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>and follow them on social media @eset_ve. Also on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.instagram.com/esetla/&amp;source=gmail&amp;ust=1769512253651000&amp;usg=AOvVaw3XM_vgVucFHwwlgxBtIibu">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p><em>Information and image provided by ESET and Comstat Rowland       </em></p>
<p><strong>Follow our news on Google!</strong> For current, interesting, and accurate information, <a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong>click here</strong></a> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/lets-reduce-risks-how-cybercriminals-use-stolen-information/">Let&#8217;s reduce risks: How cybercriminals use stolen information</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
