Get the latest tech news
Researcher downloaded the data of all 270,000 Intel employees from an internal business card website — massive data breach dubbed 'Intel Outside' didn't qualify for bug bounty
Eaton Z made sure Intel had closed up all the unearthed security gaps before divulging this research.
It was possible to download sensitive information about 270,000 Intel employees until the end of February, according to Eaton Z, a security researcher, reverse engineer, and application developer. From the introduction to his lengthy blog post, it is hinted that Eaton thought testing the locks on Intel websites would be worth a shot, given the firm’s history of processor hardware vulnerabilities. Removing the URL filter from the API being probed eventually yielded “a nearly 1GB JSON file.” Inside this download, Eaton noted that there were details of every Intel employee (there are fewer now).
Or read this on r/technology