Archive for December 22, 2025

Surfacing Threats Before They Scale: Why Primary Source Collection Changes Intelligenc

Posted in Commentary with tags on December 22, 2025 by itnerd

 Flashpoint has published a new blog post on how Primary Source Collection (PSC) enables intelligence teams to surface emerging fraud and threat activity before it reaches scale. The article explores:

  • How Threats Actually Evolve
  • Why Static Collection Falls Short
  • A Different Model: Primary Source Collection
  • Making Intelligence Taskable
  • How Taskable Collection Works in Practice

Why does this matter? Threat and fraud operations are moving faster than ever. Barriers to entry are lower. Tooling is more accessible. Collaboration rivals legitimate software development cycles. Defenders cannot afford to move slower than the adversaries they are trying to stop.

Primary Source Collection is how intelligence teams keep pace. It aligns collection with mission needs, enables real-time tasking, and delivers insight early enough to change outcomes instead of just documenting them. The signals have always been there – what has changed is the ability to surface them while they still matter.

Scam alert: Docusign phishing meets holiday loan scam

Posted in Commentary with tags on December 22, 2025 by itnerd

Forcepoint has a report that is literally hot off the press that covers something that I have personally experienced today.

With holiday financial stress peaking, Forcepoint has uncovered a sophisticated two-pronged scam campaign. Scammers are now pairing Docusign-themed phishing to hijack corporate credentials with convincing loan offer spam designed for identity theft.

The first threat uses spoofed ‘wine order’ documents to lure employees into entering logins on fake pages. Simultaneously, ‘Christmas Cheer Cash’ lures use professional marketing layouts to walk victims through a ‘loan application’ that harvests SSNs and bank details. I have received phishing emails matching the description of the first threat. These attacks are effective because they mimic standard end-of-year workflows.

You can get more details here: https://www.forcepoint.com/blog/x-labs/docusign-phishing-holiday-loan-spam

Liquibase Opens 2026 Database Change Survey

Posted in Commentary with tags on December 22, 2025 by itnerd

Liquibase today announced that it’s opened the Liquibase 2026 Database Change Survey for IT community participation. The survey is designed for practitioners, leaders, and contributors across the applications/database ecosystem, from database administrators and developers to platform, security, and compliance teams.

This survey offers thee survey gives the readership community a voice and weigh-in opportunity on how database change governance is evolving and where the sector should focus next. The survey contains a total of 20 questions and will take about 5 minutes to complete. Respondents can provide their email for a chance to win AirPods Pro 3.

To participate, visit: https://www.liquibase.com/liquibase-2026-database-change-survey

Why This Matters to Readers: Last year’s report gathered insights from professionals across 25 countries and revealed a striking reality: fewer than 8% of organizations had achieved full DevOps maturity, while 29% remained in the early stages. The growing complexity of data environments continued to hold many teams back, and the rise of AI and ML has only intensified the challenge – 25% of immature organizations identified it as their top concern.

This year’s survey will reveal what’s changed in 2025 and help the global IT community identify emerging issues, understand their relevance to the reader’s particular organization, and assess the best practices needed to meet AI and ML challenges head-on.

University of Phoenix Pwned…. 3.5 Million Individuals Impacted

Posted in Commentary with tags on December 22, 2025 by itnerd

The University of Phoenix has today begun notifying over 3.4 million individuals that their data was stolen in a hack by the notorious ransomware gang known as Cl0p. Yeah. That Cl0p. Clearly they’ve been busy this year by being naughty and not nice.

Rebecca Moody, Head of Data Research at Comparitech had this to say:

“According to our data, this is the fourth-largest ransomware attack in the world this year (based on records affected). It highlights the ongoing threat that companies face via ransomware — and not just via attacks on their own systems. Attacks on third parties like Oracle often give hackers access to a multitude of companies (and their data) via one central source. And as Clop is now rumored to be exploiting a new vulnerability through another software company (Gladinet CentreStack), its devastating data breaches look set to continue well into 2026.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech follows with this:

“Clop has been on a rampage this year, targeting zero-day vulnerabilities in software used by large enterprises. Specifically, it targets Oracle’s E-Business Suite and the Cleo file transfer software. This attack on the University of Phoenix is most likely related to the former.

According to our research, Clop has claimed the third-most data breaches of any ransomware gang in 2025.”

See: https://www.comparitech.com/news/ransomware-roundup-november-2025/

Chris Hauk, Consumer Privacy Champion at Pixel Privacy adds this:

“This is just the latest data breach of US universities, with Harvard University, the University of Pennsylvania, and Princeton University having been compromised by hackers, who stole the personal information of donors, students, alumni, staff, and faculty. We will surely see this trend continue, as bad actors around the world look to increase the size of their data cache from US educational institutions.

I would urge any individuals affected by this breach to take advantage of the university’s offer of free identity protection services, fraud reimbursement policy, one year of credit monitoring, identity theft recovery, and dark web monitoring. This will give them a leg up in detecting if bad actors are attempting to use the data gathered from the breach for nefarious purposes, as the information stolen includes dates of birth, social security numbers, and bank account and routing numbers.”

Finally, Ensar Seker, CISO of SOCRadar had this to say: 

“This breach underscores a troubling pattern we’ve seen throughout 2025: threat actors like Clop continuing to weaponize zero-day vulnerabilities and mass data exfiltration campaigns against large, centralized educational platforms with insufficient segmentation between student, staff, and supplier data.

Universities remain attractive targets due to sprawling digital ecosystems and a mix of legacy and cloud infrastructure. Attackers exploit these complexities often entering through third-party vendors or outdated portals—and move laterally across systems before exfiltrating millions of records. The fact that Clop accessed data tied to nearly 3.5 million individuals suggests minimal micro-segmentation or inadequate identity and access management (IAM) protocols.

Clop’s playbook is not new. They’ve repeatedly exploited MOVEit and other file transfer software to compromise vast amounts of sensitive data. Their ransomware operations are increasingly interwoven with pure data theft and extortion, leveraging leak sites and public shaming campaigns to pressure victims. In this case, the potential inclusion of personal data from students and faculty introduces FERPA, HIPAA, and contractual risk dimensions for University of Phoenix.

Given the scale and societal impact of this attack, it’s time for educational institutions to be held to the same cybersecurity standards as critical infrastructure. That includes mandatory vendor security assessments, data minimization strategies, and endpoint telemetry across hybrid environments. Breaches like this are not just IT issues,they’re national resilience risks when millions of PII records are involved.

Transparent forensic reporting, mass notification procedures, and proactive credit monitoring must be prioritized. From a policy standpoint, it’s time for federal regulators to reevaluate breach notification thresholds and introduce industry-wide frameworks tailored for academia.”

While Cl0p isn’t the only ransomware gang out there, they’ve clearly been busy. Which doesn’t bode well for any of us in 2026.

AGs Unite to Keep Gift Cards Safe

Posted in Commentary with tags on December 22, 2025 by itnerd

The Gift Card Fraud Prevention Alliance (GCFPA) today announced 14 state attorneys general (AGs) from across the United States have come together to launch a nationwide public service announcement (PSA) aimed at educating consumers about the threat of gift card fraud. This collaborative effort comes as millions of Americans prepare to redeem gift cards received during the holiday season—a prime opportunity for scammers to target unsuspecting individuals.

You can watch the PSA below:

The PSAs will run December 26, 2025, through January 31, 2026, and feature a unified message from state AGs that gift cards are safe while urging consumers to remain vigilant against gift card scams. The campaign highlights common fraud tactics, offers tips for safe gift card usage, and encourages the public to immediately report any incidents of gift card fraud to their respective state attorney general offices.

The GCFPA and participating AGs urge consumers to reject unsolicited demands for gift card payments, refrain from sharing gift card numbers or PINs with untrusted sources, check gift card balances only through retailers’ official websites and inspect packaging for signs of tampering. Consumers whose gift cards are drained or have been scammed should report the incident to their state attorney general’s office.

Participating AGs include:

Arkansas: Tim GriffinKentucky: Russell Coleman
Delaware: Kathy JenningsMichigan: Dana Nessel
District of Columbia: Brian L. SchwalbNevada: Aaron Ford
Georgia: Chris CarrOregon: Dan Rayfield
Illinois: Kwame RaoulPennsylvania: Dave Sunday
Iowa: Brenna BirdSouth Dakota: Marty Jackley
Kansas: Kris KobachWashington: Nick Brown

For more information about the PSA campaign and resources on preventing gift card fraud, please visit the Gift Card Fraud Prevention Alliance website or your state attorney general’s official page.

NordProtect adds new monitoring features to alert users on fraudulent activities

Posted in Commentary with tags on December 22, 2025 by itnerd

NordProtect is substantially improving its monitoring functionality to better inform and protect its users from financial losses by adding three‑bureau credit monitoring, as well as short‑term loan and financial account monitoring. Additionally, users will be able to lock and unlock their TransUnion credit file instantly.

NordProtect’s credit monitoring service now includes all three major credit bureaus. The service monitors a user’s credit file and alerts in case of suspicious activity – such as new accounts opened in the user’s name, changes to the credit score, or hard inquiries by a lender or company.

Additionally, NordProtect increases the scope of its monitoring service by adding two new features – short‑term loan monitoring and financial account monitoring.

Shortterm loan monitoring keeps track of payday loans, cash advances, and other short‑term borrowing that are often used fraudulently in identity theft schemes. By receiving an alert about an unauthorized request for a payday or short‑term loan, users can contact the lender immediately and report fraudulent activity.

Financial account monitoring tracks where user’s personal information (such as contact information, addresses, or beneficiaries) has been used to apply for new bank accounts or to make account holder changes to various financial accounts such as checking, savings, certificate of deposit, business, and IRA accounts. Reviewing flagged transactions or account changes enables users to notify their bank or card issuer promptly to help prevent financial losses.

Additionally, NordProtect users will now be able to use TransUnion’s credit lock feature, which allows users to lock and unlock their TransUnion credit file instantly and prevent new accounts from being opened in their name without authorization.

Currently, NordProtect is available only for users in the United States. For customers in the United Kingdom, Netherlands, France, Sweden, Germany, and Italy, NordVPN offers cyber insurance benefits as part of its service bundles. These benefits include scam‑loss recovery and online‑shopping fraud recovery.