Vimeo Pwned By ShinyHunters

Posted in Commentary with tags on April 29, 2026 by itnerd

Vimeo has confirmed a security incident involving unauthorized access to user and customer data following a breach at third-party analytics provider Anodot. The incident involved attackers stealing authentication tokens and using them to access connected cloud environments, including Vimeo systems.

According to Vimeo, the accessed data includes technical information, video titles, metadata, and in some cases customer email addresses. The company stated that video content, login credentials, and payment card information were not accessed, and there was no disruption to its services. 

Vimeo said it disabled Anodot credentials, removed the integration, engaged external security experts, and notified law enforcement, while the investigation into the incident remains ongoing.

The breach has been linked to the ShinyHunters extortion group, which has claimed responsibility and threatened to release stolen data. 

Denis Calderone, CTO, Suzu Labs:

   “This has become such a prevalent pattern. A third-party SaaS provider gets compromised, its authentication tokens get stolen, and suddenly attackers are inside customer cloud environments pulling data from Snowflake, BigQuery, Salesforce, or whatever else that integration was allowed to reach. Vimeo is just the latest to fall victim to this new trend in supply chain risk.

   “Vimeo can say its core systems were not disrupted and that video content, passwords, and payment cards were not accessed, and that may all be true. But was that ever the real target? If your goal is data theft and extortion, you do not necessarily need production systems. All data has some amount of inherent value, and the downstream data stores where customer metadata, operational data, reporting exports, and business intelligence live may be just as valuable as what Vimeo is emphasizing was not affected.

   “ShinyHunters has been very good at turning “limited” data exposure into leverage. SoundCloud said the exposed data was mostly email addresses and public profile information, and the group still used it for extortion and harassment. Panera described its incident as customer contact information, and that still became 5.1 million exposed accounts. AT&T’s Snowflake incident did not expose call content or Social Security numbers, but call and text metadata alone reportedly led to a six-figure payment.

   “My guess is Vimeo lands in that same lane. Not a catastrophic platform compromise if Vimeo’s statement holds, but enough context to create pressure. Video titles, metadata, technical data, and email addresses could help attackers embarrass enterprise customers, threaten Vimeo’s reputation, and craft follow-on phishing that references real projects or business relationships.

   “For organizations using third-party SaaS integrations, the takeaway is to inventory every integration that can read from your cloud data platforms, identify what tokens exist, who owns them, when they were last rotated, and what data they can actually reach. Monitor for abnormal query volume, unusual exports, access from new infrastructure, and dormant integrations suddenly becoming active. If a vendor in that trust chain reports an incident, don’t wait for a perfect impact statement. Act fast and proactively revoke and rotate first, then investigate. Also, make sure your threat modeling is taking this attack pattern into account, because this is becoming the norm these days.”

Damon Small, Board of Directors, Xcape, Inc.:

   “The Vimeo breach via Anodot is a high-fidelity case study in the vulnerability of the modern “integrated” enterprise. By compromising the third-party analytics provider Anodot and stealing its authentication tokens, the ShinyHunters extortion group bypassed Vimeo’s own identity perimeter to directly query its Snowflake and BigQuery data warehouses. While Vimeo’s confirmation that raw video content and passwords remain secure is a necessary PR distinction, it underplays the reality of the breach: the exfiltration of customer email addresses and video metadata from a centralized cloud environment creates a persistent, high-value asset for downstream phishing and social engineering.

   “For security practitioners and executives, this incident exposes the “read-only” fallacy. Many organizations grant third-party SaaS tools programmatic access to their data lakes under the assumption that the integration is limited in scope; however, in a cloud-native environment, a stolen token is often functionally equivalent to a root credential for bulk data export. The April 30 “pay or leak” deadline set by ShinyHunters highlights the urgent need for a shift toward identity-based, time-bound access.

   “Organizations must immediately audit their service-to-service integrations and implement rigid “least privilege” controls – specifically monitoring for unauthorized COPY INTO or UNLOAD commands within cloud warehouses that signify bulk exfiltration. If your vendor security assessment ended with a SOC 2 report instead of a review of their token management lifecycle, you are essentially outsourcing your data integrity to the weakest link in your supply chain.

   “Read-only” permissions are the security industry’s favorite fairy tale – until someone uses them to export your entire database.”

Vishal Agarwal, CTO, Averlon:

   “Third-party breaches become much more consequential when the compromised asset is trust itself. Stolen authentication tokens carry delegated access into connected environments, and those tokens work silently until someone explicitly revokes them. When a third-party provider is compromised, every token it holds can become a potential entry point into the environments those tokens connect to.

   “The real risk isn’t just what was exposed at the vendor. It’s how much inherited access those tokens may have provided downstream. Organizations should treat third-party token grants like privileged credentials: audit them regularly, scope them tightly, and revoke anything that isn’t actively needed.”

Third party hacks, supply chain attacks, whatever you want to call them are the new hotness. Thus you need to treat third parties as untrustworthy until proven otherwise. Otherwise you will be added to the growing list of organizations that have been pwned by ShinyHunters.

Scammers leak details of 345K credit cards by vibecoding a server used to verify stolen credit cards 

Posted in Commentary with tags on April 29, 2026 by itnerd

On April 16th, the Cybernews research team discovered an exposed server owned by a threat actor. The exposed information is controlled by a carding market called Jerry’s Store.

Here are the key findings:

  • Jerry’s Store is a tool that provides credit card validity percentages. In other words, threat actors used this tool to check if stolen payment cards are still operational.
  • Jerry’s Store operators used Cursor, an AI-assisted development environment, to set up the leaking server and administrator-facing dashboards.
  • Researchers believe that relying on an AI assistant to set up the server was the main reason why it ended up exposed, and that the threat actor received flawed instructions for building the dashboards.
  • “While in this case it helped identify credit card fraud-related abuse, it’s also a lesson for developers using Cursor for legitimate uses, showing how it can lead to accidental data leaks,” researchers said. 

Researchers identified nearly 200K credit card details that the service deemed “invalid,” and over 145K counts of valid payment card information, including:

  • Credit card numbers;
  • Expiration dates;
  • Security codes;
  • Cardholder names;
  • Cardholder addresses.

For more information, here’s the full report: https://cybernews.com/security/jerrys-store-vibecode-exposes-stolen-credit-cards

Lookout Introduces Mobile AI Visibility and Governance to Expose Shadow AI Risk

Posted in Commentary with tags on April 29, 2026 by itnerd

Lookout today with the launch of Lookout AI Visibility & Governance, a mobile-native solution designed to provide organizations with the visibility needed to discover, govern, and secure AI adoption across their mobile ecosystem.

By extending AI agent discovery and policy control into the mobile environment, Lookout provides a missing layer of visibility, enabling organizations to identify “Shadow AI” activity on mobile devices, detect unauthorized agent behavior, and enforce policy where traditional controls have no reach.

The new offering delivers a real-time view of an organization’s AI footprint by identifying both sanctioned and unsanctioned AI use on mobile devices, exposing activity that traditional endpoint and cloud-centric discovery tools cannot detect. It provides actionable, evidence-based visibility to enforce policy, reduce risk, and maintain control over AI usage across the mobile domain. As a strategic extension of Lookout’s mobile security platform, it goes beyond device protection to directly govern AI activity, preventing unintended data exposure from both autonomous agents and “Shadow AI,” and securing the interactions users rely on every day.

Bridging the Mobile AI Governance Gap

A recent survey of CISOs and senior security leaders commissioned by Lookout highlights the magnitude of the challenge. Key findings from the survey include:

● Visibility gaps: Nearly 60% of surveyed organizations cannot monitor AI activity on mobile devices, leaving the majority of mobile AI activity operating in the shadows

● Agentic blind spots: 68% of surveyed organizations lack visibility into the workflows and permissions of autonomous AI agents on users’ devices.

● Hidden risks: 72% of surveyed organizations cannot identify AI Software Development Kits (SDKs) embedded in the apps their employees use.

Lookout AI Visibility & Governance acts as a strategic force multiplier across Lookout’s mobile security platform, extending protection from the device to the AI activity occurring on it. It strengthens a layered defense that secures not only devices and users but also the AI-driven interactions that operate on their behalf.

Key features and benefits include:

● Comprehensive AI App Discovery & Shadow AI Visibility: Obtain real-time inventory of all AI apps—sanctioned and unsanctioned—across corporate and BYOD devices, exposing hidden “Shadow AI” and turning mobile risks into governed assets.

● Agentic Behavior Monitoring: Continuously analyze AI-driven behavior and map permissions to ensure autonomous agents do not execute unauthorized workflows or access sensitive enterprise data.

● Intelligent Data Guardrails & Policy Enforcement: Prevent sensitive data from reaching unsanctioned AI services with real-time controls that stop unauthorized access and exfiltration.

● Automated Compliance Alignment: Generate audit-ready evidence aligned to the European Union’s Artificial Intelligence Act (EU AI Act), the U.S. National Institute of Standards and Technology’s AI Risk Management Framework (NIST AI RMF), and the international standard ISO/IEC 42001, delivering the traceability required for effective AI risk management and regulatory compliance.

To learn more about how Lookout AI Visibility & Governance is transforming mobile security:

Black Ore Launches Tax Autopilot for Broad Availability

Posted in Commentary with tags on April 29, 2026 by itnerd

Black Ore today announced the broad availability of Tax Autopilot, automating tax preparation for CPA firms.  Since launching its early access program two years ago, Black Ore selectively onboarded 75 firms from a waitlist of close to 4,000 — including 40% of the Top 20 CPA firms in the country.  

The announcement comes two weeks after the April 15 filing deadline – the most grueling day for tax professionals. More than 300,000 accountants have left the profession in the last two years and CPA exam candidates are at a 17-year low, creating an estimated 125 million-hour annual shortfall, the equivalent to more than $25 billion in unmet demand. Tax Autopilot gives firms the ability to accelerate revenue growth without burning out their staff or being forced to rely on offshore outsourcing to fill the gaps.

Built for the Realities of Tax Practice

Rather than layering AI onto existing workflows, Tax Autopilot executes the full lifecycle of a complex tax return autonomously – with no human intervention from the Black Ore team:

  • Document ingestion: Accepts various document types – W-2s, 1099s, K-1s, brokerage statements, bank records, and more – in any format
  • Intelligent extraction: Classifies documents and extracts data accurately, resolving discrepancies automatically
  • Return preparation: Applies federal and state tax code logic to prepare the complete return
  • Workpaper generation: Produces detailed supporting workpapers for efficient professional review
  • Tax software integration: Connects with major tax software platforms, delivering review-ready returns directly into existing firm workflows

Every return arrives fully prepared and ready for final professional review by the customer, with complete auditability. The platform shows its work, links each data point back to source documents, and flags items requiring attention. Firm professionals remain the final authority for sign-off. Black Ore’s Tax Autopilot is SOC 2 Type II certified, operates in encrypted environments, and has cleared rigorous AI, privacy and security reviews.

Proven Results from Live Production  

Participating firms in Black Ore’s early access program saw Tax Autopilot deliver:

  • >99% accuracy across tens of thousands of returns
  • >98% autonomy rate
  • Up to 98% time savings per preparation
  • Up to 80% lower costs per return

To see Tax Autopilot in action and request a personalized demo, visit www.blackore.ai.

Targeting the Defense Industrial Base: What Network Telemetry Reveals About Nation-State Pre-Positioning 

Posted in Commentary with tags on April 29, 2026 by itnerd

Team Cymru has published a new research blow from Senior Threat Intelligence Advisor Stephen Campbell which explores how nation-state actors are targeting the Defense Industrial Base (DIB) through long-term reconnaissance and pre-positioning designed to shape future operations.

Using examples like Volt Typhoon, Salt Typhoon, Lazarus, and UNC1549, Stephen breaks down how adversaries exploit smaller contractors, edge infrastructure, and supply chain gaps to quietly establish access long before an attack is visible.

The piece argues that traditional endpoint-focused defenses miss much of this activity and that network telemetry, infrastructure intelligence, and collective defense are now essential for identifying adversaries before they can operationalize that access.

The full blog is here: https://www.team-cymru.com/post/defense-industrial-base-nation-state-network-telemetry

Sage announces integrated advancements in AI, platform unification, and partner empowerment 

Posted in Commentary with tags on April 29, 2026 by itnerd

There’s some news coming out from Sage this week via its annual Sage Future event in San Francisco, including:  

Sage acquires Doyen AI to help SMBs migrate and go live faster with AISage acquired Doyen AI, a company focused on using AI to make customer onboarding and implementation faster, simpler, and more accurate for finance teams.  

  • This acquisition removes a major barrier to adoption: Implementation and migration complexity are among the biggest causes of delays in finance system rollouts, often slowing or stalling transformation efforts. 
  • Improves outcomes for customers and partners: Faster, more accurate migrations reduce effort for customers and Sage’s partners alike, helping them go live faster and realize value sooner.  
  • Shows applied AI in action: The acquisition demonstrates how AI can be used in practical, mission‑critical implementation workflows, including data migration, mapping, and configuration, to reduce effort while maintaining accuracy, auditability, and control. 

Integration of core finance and industry workflows in Sage Intacct: Sage Intacct enhancements integrate planning, spend management, cash flow, and industry-specific workflows into a single platform, aiming to reduce fragmentation, improve visibility, and enable faster, more confident decision-making. 

  • Key updates include Enhanced Sage Intacct Planning (eSIP) and stronger Sage Expense Management with AI. 
  • Integration with Sage HCM provides labor spend insights, alongside new receivables capabilities for predictable cash flow. 
  • Deepened industry-specific solutions are offered for sectors such as insurance, lending, and construction. 

AI agent expansion across finance, HR and operations: Sage is embedding intelligent AI agents directly into its core finance, HR, and operations systems (Sage Intacct, HCM, X3) to automate workflows, moving businesses from analysis to direct, confident action with transparent and auditable AI. 

  • AI agents facilitate faster responses and enhanced operational confidence by automating tasks within existing systems. 
  • The Sage Intacct Finance Intelligence Agent uses natural language for task preparation, offering clear explanations and audit trails while ensuring user control. 
  • Sage is opening its AI platform, allowing partners to develop specialized, governed AI solutions for high-trust financial environments. 

New AI tools and commercial models for developer platformSage has unveiled new tools and flexible commercial models to simplify the development and scaling of AI-powered solutions for partners across its Sage Intacct, X3, and Active platforms. 

  • A unified developer experience streamlines building and integration. 
  • New AI tools, including Sage Agent Builder and AI Gateway, enable partners to create integrated AI experiences. 
  • Flexible commercial models, such as usage-based pricing, are introduced to foster partner growth and innovation. 

Sage brings core finance and industry workflows together in Sage Intacct. Sage’s latest updates are designed to bring together the core elements of modern finance in a more connected Sage Intacct experience, including:  

  • Enhanced Sage Intacct Planning (eSIP), available later this year, provides a more responsive and connected approach to planning. 
  • Sage Expense Management, now available in the US, strengthens spend control with AI-powered recognition, simplified capture and modern policy handling. 

Sage is also continuing to deepen industry-specific capability across Sage Intacct, including: 

  • Insurance: PolicyConnect connects policy and financial data to help insurance finance teams improve forecasting, risk management and reporting alignment. 
  • Lending: Lending Management connects lending and finance workflows to reduce errors, simplify audits and improve visibility into performance and risk. 
  • Product-centric industries: Operations for Sage Intacct helps distributors and manufacturers gain better visibility across inventory, sales and operations. 
  • Construction and real estate: Sage continues to expand connected workflows that help teams reduce manual work and manage project performance more effectively.  

These integrated advancements in AI, platform unification, and partner empowerment solidify Sage’s vision to drive efficiency, insight, and confidence within the financial suite. 

Defense Unicorns Partners with NASCAR/SPIRE for FIRST Cup Race at Naval Base Coronado

Posted in Commentary with tags on April 29, 2026 by itnerd

Defense Unicorns will join forces with Spire Motorsports and Michael McDowell for the NASCAR Cup Series inaugural visit to the streets of Naval Base Coronado in San Diego, Calif. To commemorate its maiden voyage in NASCAR’s premier division and celebrate the 250th anniversary of the founding of the United States of America, McDowell’s No. 71 Chevrolet Camaro ZL1 will sport a vibrant livery featuring “Doug” The Defense Unicorn.

Founded in 2021, the San Antonio-headquartered organization took the preliminary steps for its cornerstone Unicorn Delivery Service (UDS), delivering essential software in mission-critical environments from submarines and forward operating bases to aircraft carriers and space systems.  

Defense Unicorn’s UDS is a secure, portable platform, purpose-built for delivering software to military systems. UDS includes the essential tools to package, deploy, monitor, and sustain mission applications.

Built for versatility and efficiency, the “package once; deploy anywhere” philosophy is paramount for the success of military mission environments, supporting multiple cloud providers and systems. Defense Unicorn’s credibility has translated into landmark contract wins, including a $300 million GSA contract, a $1 billion Space RCO contract, and a role in the approximately $140 billion Golden Dome initiative.

The company’s single largest customer engagement is a $100M task order under the GSA contract with the U.S. Navy, underscoring the depth of trust warfighters are placing in the platform.

In January, Defense Unicorns achieved a milestone $1 billion+ valuation, officially becoming a true “unicorn” company, guided by the support of Bain Capital and its $136 million Series B investment.

Leading into race weekend, the company will host Warhacker, a first-of-its-kind Hackathon in San Diego, with the mission to bring together government, industry, academia, and non-profit companies to build, package, and deploy software solutions to warfighter problems. Applications are open now, and the event will be held June 16-19.

The NASCAR Cup Series inaugural race from Naval Base Coronado will be televised live on Amazon Prime and HBO Max on Sunday, June 21 beginning at 4 p.m. Eastern Daylight Time. The 17th of 36 points-paying races on the 2026 NASCAR Cup Series schedule will also be broadcast live on the Motor Racing Network and SiriusXM NASCAR Radio, Channel 90.

Career growth in Canada is concentrating in a few sectors: LinkedIn

Posted in Commentary with tags on April 29, 2026 by itnerd

Canada’s job market may be slowing, but career growth isn’t disappearing, it’s becoming more concentrated. New data from LinkedIn’s Top Companies 2026 shows that opportunities to build skills, get promoted and move internally are increasingly clustered within financial institutions and enterprise tech firms. 

This year’s ranking is dominated by banks and global technology companies, pointing to a shift in where long-term career mobility is still holding up as AI and digital transformation reshape hiring. 

This year’s Top 10 Companies in Canada are: 

  1. TD 
  2. Desjardins 
  3. Scotiabank 
  4. CIBC 
  5. Amazon 
  6. RBC 
  7. ServiceNow 
  8. SAP 
  9. BMO 
  10. Okta 

The data also highlights the growing importance of AI, digital and transformation-focused skills across roles, not just in tech, but across the broader economy.  

Read more here: https://www.linkedin.com/pulse/linkedin-top-companies-2026-25-best-employers-grow-your-n6p9f/

Recast Expands Right Click Tool

Posted in Commentary with tags on April 29, 2026 by itnerd

Recast today announced Right Click Tools includes new enhancements to simplify complex hybrid and Intune-only environments. The shift from ConfigMgr to Intune is the defining operational challenge facing enterprise IT today, and most organizations are running both. Recast helps IT teams see what they have, keep it current and secure, and operate it across ConfigMgr, Intune, and everything in between.

Right Click Tools is the gold standard for helping IT teams get more value out of their Microsoft ecosystem. Moving to Intune and Entra presents organizations with a new set of challenges, and Right Click Tools continues to add capabilities that pinpoint these needs. With modules for PatchingInsights, and Privileged Access, the Right Click Tools product line addresses all aspects of endpoint management for IT organizations regardless of size.

Recast has a long history of using direct customer feedback to inform its product roadmap, building incremental improvements into the product line each month to get enhancements into users’ hands faster. Many of the capabilities already delivered this year were developed based on input from customers and the Recast Community of users.

Operating across ConfigMgr and Intune without navigating between consoles 

Recast has bolstered Right Click Tools with new options for managing devices in Intune, Entra ID, and Autopilot. These updates empower users to: 

  • Launch Intune Remote Help directly from the browser, without leaving the admin workflow 
  • Register devices in Autopilot without manual scripting, CSV uploads, or console hopping 
  • Retrieve LAPS passwords across hybrid-identity environments from a single interface 
  • Open Right Click Tools menus from six additional Intune pages, bringing the total to more than 20 pages 

Closing the third-party patching gap across 6,000+ applications

Running the latest versions of hundreds or thousands of applications is a key challenge for IT organizations as they strive to balance user productivity and infrastructure security. Drawing from a catalog of more than 6,000 applications, Right Click Tools Patching now enables users to: 

  • Configure settings for individual applications, so admins no longer have to create a separate deployment process if an app requires a custom setting 
  • Set up ConfigMgr or Intune deployment processes to allow the installation of 32-bit applications on 64-bit machines 
  • Restart all paused deployment processes with one click 
  • Display all deployment process events on a single page, for easier deployment process event scheduling 

Gaining visibility across extensive device fleets 

The Warranty Dashboard in Right Click Tools Insights helps IT leaders understand hardware coverage at a glance so they can anticipate refresh needs, minimize surprise costs, and extend the value of their device investments. Users can now: 

  • Determine device age and remaining coverage 
  • Filter remaining coverage by status  
  • Drill into device by status and warranty expiration timeline  

Healthcare ransomware: Q1 2026 stats on attacks, ransoms, and data breaches 

Posted in Commentary with tags on April 29, 2026 by itnerd

Comparitech researchers have released a study looking at all the healthcare ransomware attacks in the first quarter of 2026. According to the findings, Q1 2026 saw 120 a recorded 120 ransomware attacks on hospitals, clinics, and other healthcare providers. Additionally, business operating within the healthcare sector (such as pharmaceutical/medical manufacturers, medical billing providers, or healthcare tech companies), saw a recorded 81 ransomware attacks. 

Interestingly, attacks on providers dipped 15% from the previous quarter, but attacks on healthcare businesses jumped 35%. 

Commenting on these findings is Rebecca Moody, Comparitech’s Head of Data Research: 

“Our latest quarterly healthcare report highlights how this sector remains one of the most dominant targets for hackers. For the last two quarters, attacks have been consistently high with hackers focusing on healthcare providers and businesses operating within the healthcare industry. This means healthcare providers not only have to safeguard their own systems from attacks but also need to ensure the third parties they’re using are reaching the same standards.

As the most dominant strain for many months now, Qilin’s attack figures far exceed those of other groups. But this isn’t the case when it comes to healthcare businesses. It claimed just three attacks in three months here, despite claiming 550 victims in total across Q1 of 2026. In contrast, it claimed 23 attacks on healthcare companies. 

LockBit and The Gentlemen are other key threats to healthcare providers, while INC appears to focus more on healthcare businesses (claiming eight attacks here compared to five on healthcare providers).

The focus on certain sectors by certain groups could be due to the success of certain campaigns within a particular industry, or an attempt to infiltrate a sector that isn’t as saturated/high profile when it comes to ransomware. For example, over the last year or so, we have noted a shift toward healthcare businesses. This could be due to how heavily targeted healthcare providers were in previous years. So, while some groups are still “enjoying” success in this sector, others have found a lucrative opening within companies that still deal with critical healthcare systems/services and/or store key healthcare data but don’t necessarily deal directly with patients.”

You can read the study here: https://www.comparitech.com/news/healthcare-ransomware-roundup-q1-2026-stats-on-attacks-ransoms-and-data-breaches/