Archive for February 26, 2025

DISA Global Solutions Gets Pwned…. 3+ Million Affected

Posted in Commentary with tags on February 26, 2025 by itnerd

DISA Global Solutions, a provider of workplace compliance management and employee screening solutions, reported that it suffered a data breach that affects more than 3.3 million people. They have posted a data breach notification here as well.

Jim Routh, Chief Trust Officer at cybersecurity company Saviynt had this comment:

“Two dimensions of this cyber incident are notable. The first is that SSNs were exfiltrated for individuals and these are easily monetized by threat actors. Storing SSNs for any purpose should require a higher level of security and using SSN to identify digital consumers is an obsolete data management practice. 

“The second dimension is the root cause of the breach is not provided so it is not clear what steps DISA took to reduce the probability of this happening again. Cyber incidents occur in all enterprises so missing an opportunity to make adjustments to controls and processes based on the learnings applied from previous breaches is an indication of cyber resilience and a positive indicator. In this case, there is no indication of cyber resilience.” 

Javvad Malik, Lead Security Awareness Advocate at KnowBe4, adds this:

“This incident not only highlights the sophistication of cyber adversaries but also exposes the vulnerabilities in the cyber defenses of an establishment that prides itself on efficiency and compliance. It’s a sector that is inherently trusted with some of the most private aspects of individuals’ lives, from social security numbers to medical history. The fact that DISA, with its expansive list of high-profile clients including a significant portion of the Fortune 500 companies, fell victim to such an exploit illustrates a concerning underestimation of the capabilities of modern cyber threats.”

“Moreover, the delay in detecting and reporting the breach raises pressing questions about the ongoing monitoring and incident response strategies employed by DISA. Regulatory implications aside, the slow acknowledgment and mitigation could erode the very trust DISA seeks to build with its partners and the individuals it screens.”

“Providing identity theft protection services post-breach, while necessary, is merely a reactive measure. It is imperative for organizations, especially those like DISA that handle vast amounts of personal data, to adopt a more proactive stance on cybersecurity. This includes continuous monitoring, employing advanced threat detection technologies, and fostering a culture of security awareness throughout the organisation.”

“As the investigation unfolds, it will be crucial for DISA and its stakeholders to thoroughly understand how the attackers circumvented their defences and to implement robust measures to prevent future incidents.”

The hacks and leaking of personal information never seem to be ending. You have to wonder when companies will learn that they need to invest the time, effort and money to not be one of my stories about a company getting pwned.

Clicks brings its award-winning iPhone keyboard case to Google, Motorola and Samsung smartphones

Posted in Commentary with tags on February 26, 2025 by itnerd

Clicks Technology today announced the first three Clicks Keyboards for Android smartphones. Building on the popularity of Clicks for iPhone introduced last year, Clicks extends a premium typing experience, more screen real estate and keyboard shortcuts to owners of Google Pixel, Motorola Razr and Samsung Galaxy smartphones. Available for pre-order today, Clicks for Android smartphones will start shipping beginning in April.

Clicks supercharges the Samsung Galaxy with a premium typing experience engineered for speed and accuracy. Maximize every bit of the S25’s 6.2” display by moving the virtual keyboard off screen. Put Samsung AI at your fingertips with keyboard shortcuts. Compatible with Samsung Galaxy S25. Available in two colors: Pinot (red) and Onyx (black).

Expanding the audience for Clicks

With over 100,000 keyboards sold in more than 100 countries, Clicks is changing the way people use their smartphones.

Adding a Clicks Keyboard to a Pixel, Razr or Galaxy smartphone combines the benefits of buttons with the power of Android in a seamless experience.

  • Premium Typing Experience. Type with speed and confidence with ergonomically designed keys that provide satisfying tactile feedback.
  • 50% More Screen. By moving the keyboard off the display Clicks frees up screen space for apps and content.
  • Keyboard Shortcuts. Launch your favourite apps and navigate Android.
  • Gemini Key. Launch AI features at the push of a button.
  • Keyboard Backlight. Backlit keys make typing in low light a breeze.
  • Clicks App. Customize and personalize your typing experience.
  • Charge Your Phone as Normal. Clicks connects through USB-C so there’s no battery to charge or bluetooth connection to pair.
  • Easy on and off. Add a compact, lightweight keyboard when needed, or leave it on all the time.
  • Protection & personality. Clicks protects your phone and grabs attention wherever you go.

Launch Pricing and Availability

  • Google Pixel 9 and Pixel 9 Pro: Pre-orders begin February 25 at an introductory price of USD $99, available until March 21. After this date, the price increases to USD $139. Orders will begin shipping at the end of April.
  • Motorola Razr+ and Razr (2024): Reservations open February 25 for USD $49 to secure a special launch price of USD $99 until March 21. After March 21, pre-orders remain available for USD $49, but the final price increases to USD $139. Shipping starts in late May.
  • Samsung Galaxy S25: Reservations open starting February 25 for USD $49 to lock in a limited-time USD $99 launch price until March 21. After this period, pre-orders remain open for USD $49, with the final price increasing to USD $139. Shipping begins in June.

Order Clicks for Android exclusively at Clicks.tech

New KnowBe4 Report Reveals the Hidden Power of Information Sharing in Shaping an Organization’s Security Culture

Posted in Commentary with tags on February 26, 2025 by itnerd

KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today announced the release of research report “Cybersecurity Information Sharing as an Element of Sustainable Security Culture”, authored by Dr. Martin J. Kraemer, Security Awareness Advocate at KnowBe4, and Dr. William Seymour, Lecturer in Cybersecurity at King’s College London. The report examines how people consume and share cybersecurity information, revealing the role that workplace training plays in fostering information sharing among colleagues.

Many employees already engage with cyber-related information in their personal lives, and when they proactively share it, it reflects a mature security mindset. A well-established security culture encourages good habits, mutual support, and a clear awareness of risks. By examining how cybersecurity news spreads, organizations can gain valuable insights to strengthen defenses and minimize human risk.

The report found that, on average, 57% of people surveyed received cybersecurity-related training, with 73% in the UK, 60% in the U.S., 55% in Germany and only 38% in France. Workplace training influenced information sharing, as 24% of those trained went on to share insights with colleagues and were more likely to remember phishing-related content.

Other key findings: 

  • 95% of people have read or watched cybersecurity content at least once. 
  • 77% have had cybersecurity information shared with them and 25% have actively shared cybersecurity information with others. 
  • 22% of employees find cybersecurity information from websites and 21% find it from employers. 
  • Generally, employers were an important source of cybersecurity information across all age groups, whereas social media was an important channel for the 18-29 year age group. 

Ultimately, ‘the more you care, the more you (want to) share’. When employees are properly engaged with cyber risks, the more likely they are to openly communicate with others about this topic and create a stronger security culture in the workplace. Understanding how employees consume and share cybersecurity news is essential for building a stronger security culture.

The full report, “Cybersecurity Information Sharing as an Element of Sustainable Security Culture”, is available to download here.

Appdome Preempts DeepSeek Attacks on Mobile Devices

Posted in Commentary with tags on February 26, 2025 by itnerd

Appdome has announced that new dynamic defense plugins are available on its AI-Native Defense platform to detect and defend against DeepSeek AI attacks on Android & iOS devices. The new plugins allow enterprises to safeguard mobile enterprise apps, harden remote access and protect mobile work from DeepSeek spyware. 

The new plugins use behavioral analytics to detect unusual file access, data extraction, user monitoring, and unusual network traffic to external AI servers performed by DeepSeek. Like all Appdome defenses, the new dynamic defense plugins targeting DeepSeek attacks are available by choice using the Appdome platform without the need to integrate code, perform manual coding, implement SDKs, or deploy servers.

DeepSeek, a free, AI-powered chatbot mobile app, has grown in popularity quickly. It has also created a huge risk for enterprises and governments using mobile devices and apps in the workforce. For example, reports have surfaced that DeepSeek can be used as spyware to harvest and send user data to China without the user’s knowledge. Likewise, users can unknowingly or accidentally post sensitive information to DeepSeek, creating data leakage risks for corporate data and sensitive documents. 

Recognizing the severity of the threat posed by DeepSeek, some enterprises have banned the use of DeepSeek for work purposes. Likewise, several government agencies, including in the United States and South Korea have introduced legislation to ban the use of DeepSeek on mobile devices used for government purposes. However, these bans are without teeth because – without Appdome – there is no way to detect DeepSeek on a mobile device, particularly a BYOD mobile device in an enterprise setting. And there’s no way to detect if DeepSeek is being used as spyware or if users share sensitive data via DeepSeek.

Appdome’s new Detect DeepSeek Attack plugins are particularly powerful in enterprise use cases such as mobile apps for work, enterprise apps, and Bring Your Own Device (BYOD) mobile strategies. When deployed in an enterprise app, the defense will detect an active DeepSeek session on the device and offer enterprises and B2B mobile app makers multiple enforcement options to mitigate the DeepSeek risk. Appdome’s new DeepSeek detection can be deployed stand alone or in combination with other defenses to detect DeepSeek being used as spyware and when employees post content to DeepSeek.

In published cases, DeepSeek exposed users to unauthorized data collection, weak encryption practices, and potential surveillance by state-linked entities. Security analyses reveal that DeepSeek transmits user data without proper encryption, employs outdated cryptographic algorithms, and lacks robust anti-tampering protections, making it vulnerable to reverse engineering. Beyond these published risks, attackers can expedite the runtime analysis of potential victim apps by feeding DeepSeek with memory dumps, encrypted files, and server responses directly on the device. This could also enable runtime memory extraction, allowing attackers to scan active memory for cryptographic keys, authentication tokens, and decrypted session data, compromising financial transactions and authentication flows. 

Additionally, DeepSeek may facilitate dynamic code injection by identifying unprotected vectors, enabling attackers to bypass security controls like root detection and anti-debugging, manipulate app behavior, and intercept sensitive interactions without persistent malware. The creators of DeepSeek have set guardrails designed to prevent using the AI model for malicious purposes, however, during the analysis of this model multiple “jailbreaks” were found that allow circumventing security restrictions. 

Learn more about Appdome AI-Native defense for DeepSeek AI threats.