Dior Starts To Send Data Breach Notifications To US Customers

Posted in Commentary with tags on July 21, 2025 by itnerd

A couple of months ago, I posted a story on fashion house Dior getting pwned in a cyberattack. Today Dior is sending data breach notifications to U.S. customers informing them that a May cybersecurity incident compromised their personal information:

Based on the findings of the investigation, the following information has been exposed:

  • Full names
  • Contact details
  • Physical address
  • Date of birth
  • Passport or government ID number (in some cases)
  • Social Security Number (in some cases)

The company clarifies that no payment details, such as bank account or payment card information, were contained in the compromised database, so this information remains safe.

Law enforcement was notified accordingly, while third-party cybersecurity experts were engaged to help contain the incident.

Erich Kron, Security Awareness Advocate at KnowBe4

“While we often focus on credit card details in situations like this, the elephant in the room is the fact that so much personal information about the clients was lost. It would be no shock to find out that many of these customers are those of high net worth, and probably value their privacy. This breach exposes phone numbers, addresses, possibly passport and tax ID information, as well as other things that the customers of the luxury brand would probably not like made public. In other words, this could be a bit of a mess for Dior. Cybercriminals can use the information that was leaked to target individuals in future attempts of thievery and deception.”

“Those impacted by this breach should be especially careful moving forward and may want to consider locking their credit or taking other similar steps to fight against potential identity theft. For organizations that handle sensitive information such as this, it’s absolutely critical that their employees are trained to spot and report attempted social engineering attacks and that data privacy controls are in place within the organization to secure this information. This means a robust Human Risk Management (HRM) program that is bolstered by other technical controls as well.”

Chris Hauk, Consumer Privacy Champion at Pixel Privacy:

“U.S. customers of House of Dior should immediately take advantage of the free 24-month credit monitoring and identity theft protection package offered by the company. They also need to stay alert for any phishing emails, texts, or phone scams using the purloined information in an attempt to get more info.”

“Meanwhile, customers of Louis Vuitton should be proactive in protecting their accounts and personal information, even though the company has not yet officially announced that they were affected by a similar data breach.”

About that Louis Vuitton thing… It appears that they got pwned as well. I’ll be looking into that and posting about that when I get more details.

Microsoft Pushed Out An Emergency Fix On Sunday For An Actively Exploited SharePoint Vulnerability

Posted in Commentary with tags on July 21, 2025 by itnerd

Microsoft on Sunday issued an emergency security update for a vulnerability in SharePoint Server that is actively being exploited to compromise vulnerable organizations. To be clear, this is applicable to those with SharePoint on premise. In an advisory, Microsoft said this:

We are working on security updates for supported versions of SharePoint 2019 and SharePoint 2016. Please check this blog for updates.

To mitigate potential attacks customers should:

  • Rotate SharePoint Server ASP.NET machine keys
  • Use supported versions of on-premises SharePoint Server
  • Apply the latest security updates, including the July 2025 Security Update
  • Ensure the Antimalware Scan Interface (AMSI) is turned on and configured correctly, with an appropriate antivirus solution such as Defender Antivirus
  • Deploy Microsoft Defender for Endpoint protection, or equivalent threat solutions

The Washington Post is reporting that the U.S. government and partners in Canada and Australia are investigating this situation.

Andrew Obadiaru, CISO, Cobalt, an offensive security company, had this to say:

     “Zero-day vulnerabilities in widely deployed platforms like SharePoint are a goldmine for attackers because they provide immediate, scalable access to high-value environments. The challenge isn’t just patching—it’s that attackers typically implant persistence mechanisms within hours, ensuring long-term footholds. Defense strategies need to assume breach and validate controls through proactive testing, including red teaming and continuous pentesting, to uncover weaknesses before adversaries do. In today’s threat landscape, reactive security alone is a losing game.”

If you’re a SharePoint on premise user, drop what you are doing and patch your SharePoint instance to make sure that you don’t get pwned or you have not already been pwned seeing as this is an actively exploited exploit. Because this is a today problem to say the least.

UPDATE: Adrian Culley, Senior Sales Engineer, SafeBreach had this to say:

“This CVE represents a critical security incident: it was exploited as a zero-day vulnerability in active attacks against production systems before any patches were available—the most severe type of threat organizations face. The absence of a single remediation patch further complicates the situation. Microsoft has taken the unusual step of advising organizations to assume compromise and conduct thorough investigations to verify their security posture—language that underscores the severity of this vulnerability.

SharePoint Server 2016 environments face particular challenges, as no immediate technical remediation is available. Organizations must rely on breach and attack simulation exercises alongside their existing security controls to assess exposure. Proactive defense requires targeted hardening measures and resilience improvements to prevent falling victim to this sophisticated attack vector.”

SellYourMac.com Founder Brian Burke to Speak on Breaking Through the Noise at ITAD Summit 2025

Posted in Commentary with tags on July 21, 2025 by itnerd

SellYourMac.com the leading reCommerce and IT Asset Transition Service provider dedicated exclusively to Apple products and an Other World Computing company, today announced SellYourMac.com Founder and CEO, Brian Burke, will join a panel discussion titled, “Standing out in the Noise – a Dive into Marketing Your Products and Services to the Masses” at the ITAD Summit 2025 (July 29 – 30, Bellagio Hotel & Casino, Las Vegas, NV). 

Joining Brian The Mac Man on the panel, set to take place on July 29, from 1:00 – 2:00 pm, will be Rachael Weir, Head of Marketing, Vyta, and Danae Gullicksen, Marketing Professional, URT. Together, they will dive into effective strategies for marketing ITAD products and services in a crowded marketplace, with insights on how to differentiate brands, build visibility, and engage target audiences at scale.

About Brian Burke, Founder/CEO, SellYourMac

Brian Burke is a seasoned tech entrepreneur and thought leader who founded SellYourMac.com and now serves as the Mac Man at Other World Computing, specializing in Apple product resale, IT asset disposition, artificial intelligence, and digital innovation.

Brian The Mac Man is passionate about empowering underprivileged students through gifting Apple technology. He believes gifting them a Mac can truly change their lives, their outlook on the world, and their future job prospects.

As a lifelong learner, Brian is a 2x TEDx Talk speaker, has become a Sommelier, an Apple Certified Mac Technician, a Notary Public, an Ordained Minister, a PADI Certified Scuba Diver, a professional speaker on LinkedIn optimization, having now grown his LinkedIn network to 210,000+, and a professional speaker on ChatGPT!

Over 3.5 Million Customer Records Exposed in Australian Fashion Brand Data Breach

Posted in Commentary with tags on July 21, 2025 by itnerd

VPNmentor just published cybersecurity researcher Jeremiah Fowler’s latest findings, revealing a non-password-protected database containing 3,587,960 records totaling 292 GB, tied to SABO, a well known global fashion brand based in Australia.

The exposed data includes invoices, packing slips, and other documents containing personally identifiable information (PII) such as customer names, physical and email addresses, phone numbers, and order details—impacting both retail and commercial buyers.

This breach raises significant concerns about privacy and data security in the retail industry. Given the scale and nature of the exposure, the risks include phishing, social engineering, and financial fraud.

You can find the full report here: https://www.vpnmentor.com/news/report-sabo-breach/

Guest Post – From beaches to breaches: Summer work habits put enterprise data at risk

Posted in Commentary with tags on July 21, 2025 by itnerd

As more companies embrace remote work and “workations” during the summer,  a cybersecurity expert warns that swapping the office for scenic views could put corporate data at serious risk

Businesses are adopting mixed work models, and summer is the perfect time to embrace greater workplace flexibility. However, when employees swap the office for a more relaxing setting, it can expose enterprises to additional cybersecurity risks — and, without proper measures, increase the likelihood of a data breach.

A survey by DayForce has found that 41% of employees feel they’re less productive in the summer, and 58% stated that their employer offers some type of flexibility during this time, including increased work-from-home or work-from-anywhere options. According to Andrius Buinovskis, a cybersecurity expert at NordLayer, a toggle-ready cybersecurity platform for business, while employees might appreciate the added benefits, enterprises mustn’t underestimate the risks behind such perks.

“Many companies offer mixed working models, such as remote or hybrid working. Work from anywhere or ‘workations’ allowing employees to work from abroad have also gained popularity,” says Buinovskis. “This additional flexibility is a great bonus for employees. However, businesses mustn’t offer it to employees without knowing the risks. Remote work opens the door for an array of security vulnerabilities, which, if exploited, can lead to devastating data breaches, resulting in reputational and financial loss.”

The main cybersecurity risks

Buinovskis explains that the most common threat from remote work comes from using unsecured public networks. Cybercriminals can intercept Wi-Fi to steal employee credentials, install malware, or hijack accounts.

“Employees that change their routines are more likely to reduce VPN usage due to distractions. Due to their unfamiliarity with the environment, they’re also an attractive target for scammers, and their lack of vigilance can make them more likely to fall for phishing scams in general,” says Buinovskis. “Additionally, employees may be asked to share more personal data in countries with fewer GDPR restrictions, increasing the risk of misuse. Another major concern is that if they use  personal devices, those devices lack centralized security, may run outdated software, and are more vulnerable to attacks.”

He emphasizes that personal devices offer less physical security than company-issued hardware since friends and family members can access them. While travelling, work devices are also at a greater risk, as they may be lost or stolen. If that happens, the information stored on these devices could be misused, and according to Buinovskis, just one compromised device or account is enough to trigger a significant data breach.

How to ensure cybersecurity while maintaining flexibility

Even though remote work models come with cybersecurity challenges, it doesn’t mean that businesses should abandon these perks altogether. According to Buinovskis, the main cybersecurity measures companies should implement to ensure that their data is protected include:

●       Strong network encryption. It secures data in transit, transforming it into an unreadable format and safeguarding it from potential attackers.

●       Password management policies. Hackers can easily target and compromise accounts protected by weak, reused, or easy-to-access passwords. Enforcing strict password management policies requiring unique, long, and complex passwords, and educating employees on how to store them securely minimizes the possibility of falling victim to cybercriminals.

●       Multi-factor authentication. Access controls, like multi-factor authentication, make it more difficult for cybercriminals to access accounts with stolen credentials, adding a layer of protection.

●       Zero trust architecture. The constant verification process of all devices and users trying to access the network significantly reduces the possibility of a hacker successfully infiltrating the business.

●       Network segmentation. If a bad actor does manage to infiltrate the network, ensuring it’s segmented helps to minimize the potential damage. Not granting all employees access to the whole network and limiting it to the parts essential for their work helps reduce the scope of the data an infiltrator can access.

“High observability into employee activity and centralized security are crucial for defending against remote work-related cyber threats, especially because personal devices and unauthorized applications greatly expand a company’s attack surface,” Buinovskis says. “Given the real risk of data breaches and the financial and reputational damage they could potentially cause, overlooking security gaps is a serious gamble that isn’t worth taking.”

Buinovskis also emphasizes that employees are often the weakest link in a company’s cybersecurity. Cybersecurity awareness training is essential to minimize the risk of data breaches — regardless of the work model. This training should cover how to recognize phishing scams, the risks of using public Wi-Fi, and effective password management practices.

ABOUT NORDLAYER

NordLayer offers reliable connection, protection, threat detection, and response for businesses needing strong network security. Built on NordVPN standards, NordLayer is a trusted cybersecurity platform that integrates easily with any network and technology stack, all with unmatched support. NordLayer is part of the cybersecurity powerhouse Nord Security. For more information: https://nordlayer.com/

The ASUS Security Situation Is Actually Way Worse Than I Thought

Posted in Commentary on July 21, 2025 by itnerd

A few months ago, I posted a story on ASUS having vulnerabilities in their router products that could lead to you not only getting pwned, but your ASUS router being part of a botnet. Related to that, I offered up some advice as to how to check if you’ve been pwned. But this was the second time this year that ASUS has found itself in a situation where their had serous security vulnerabilities. Because earlier this year ASUS had to fess up to the fact that their AI Cloud feature which allows for remote access to their routers was vulnerable to being pwned.

A couple of days ago, things got way worse for ASUS. YouTube channel Gamers Nexus, who had previously called out ASUS for their shady warranty practices did a video on a number of other vulnerabilities that have been discovered in a variety of ASUS products. If you want to watch the video, here it is:

For those of you who want to skip past watching the video, here’s the TL:DR.

Security researcher Paul “Mr. Bruh” discovered a zero-click remote code execution vulnerability in Asus DriverHub and hardcoded administrator credentials within MyAsus and the RMA portal—exposing user data including names, birthdates, addresses, and phone numbers. As it stands, ASUS claims to have fixed this.

Cisco Talos researcher Marson Icewall Noga also documented two kernel-level exploits in Armory Crate’s ASIO3 driver, enabling physical memory mapping and low-level hardware access. It gets worse because Armory Crate is built into to ASUS motherboards. Which means that even if you nuke Windows and reinstall it, Armory Crate will simply reinstall itself unless you dig into your BIOS and turn off the ability for it to install. For those of you who have Armory Crate installed, removing it is the recommended way to protect yourself. Another reason why you should get rid of Armory Crate is that I noted that when I was testing HYAS Protect At Home, I noted that Armory Crate which was on the ASUS PC that I owned at the time, sent and received a lot of data to and from the Internet for reasons that I couldn’t discern. But given that ASUS seems to have other security problems, that’s another reason why you should strongly consider removing their software ASAP.

And that’s on top of their router issues. And I have to admit, that was one of the motivating factors that made me dump this router from ASUS for this Unifi router. Currently the only ASUS product that I have left on my network is a pair of Zen WiFiXT8’s that I am using in access point mode. I am currently researching how to replace them with Unifi products that have as good or ideally better performance in a mesh setup. But given how bad ASUS security is, I am now making that a today problem Because clearly ASUS is really dropping the ball when it comes to security. And that is on top of their RMA issues and their technical support issues. Which the TL:DR on that is that ASUS tech support is horrifically bad.

The bottom line is that ASUS is really becoming a company to avoid. I don’t know how how else to put it. And honestly the sooner that ASUS products are gone from my network, the better off that I will be be. And if you own ASUS products, you might want to consider getting rid of them as well as you’ll likely be better off as well.

HP’s WXP Helps Canadian Companies Reimagine Hybrid Work

Posted in Commentary with tags on July 18, 2025 by itnerd

As hybrid work becomes the norm in Canada, a growing tech disconnect is fueling employee frustration and burnout. With an explosion of new devices and digital tools, two-thirds of employees report they regularly struggle with workplace tech yet only half feel adequately supported by their IT teams.

This gap is taking a toll on productivity and morale, not just for frontline staff but also for the IT professionals tasked with holding it all together. As Canadian businesses push to modernize, the message is clear: improving the digital employee experience is no longer optional.

HP’s Workforce Experience Platform (WXP) is more than just IT support, it’s a strategic solution that streamlines workflows, resolves issues before they surface, and helps teams thrive in a complex, always-on world.

Some key ways WXP helps IT and security teams reshape the modern workplace:

  • AI Sentiment Analysis: WXP now includes AI capabilities to assess and improve employee experience by analyzing sentiment data, allowing IT teams to identify and address issues before they impact productivity.
  • Smarter Insights, Less Guesswork: Integration with Vyopta allows businesses to monitor and optimize collaboration environments with integrated insights into video and telephone endpoints, enhancing user satisfaction and performance.
  • Fleet Explorer: A new AI-powered tool that uses natural language processing to help IT managers quickly access fleet data. Instead of sifting through reports, they can ask questions like “Which devices had the highest memory over-utilization in the past 30 days?” and get instant insights—enabling faster issue resolution before employee performance is affected.

To learn more about the HP Workforce Experience Platform, visit here.

Slack announces new AI and search capabilities

Posted in Commentary with tags on July 18, 2025 by itnerd

Slack has released new AI and search capabilities that deeply integrate AI across everything that makes up the Slack experience.

Built to harness institutional knowledge and conversational data that teams create daily, the new capabilities will also increase the user experience by cutting down the need to dig through threads, jump between apps, or rewrite content from scratch.

New features:

  • AI writing assistance in canvas built directly into Slack canvas that allows users to draft project briefs, generate action items, refine content, and more with natural language prompts. 
  • AI message explanations by hovering over any message to get instant, in-context explanations of unfamiliar concepts, terminology, or technical details. 
  • AI action items enable users to stay on top of highest-priority tasks. AI will identify what’s most important and only notify users when it provides a meaningful update or adds more value than current activity.
  • AI profile summaries give users quick context on another user’s role and recent contributions. This means teams can align faster and minimise unnecessary back-and-forth communication.

Slack is also announcing the general availability of:

  • Translations to let teammates read and contribute in their preferred language. When users come across a message in a different language, they’ll see a button they can use to translate that message into any language they’d like.
  • Enterprise search, which surfaces information across connected apps, data, and conversations from a single search bar. Teams can connect to systems like Salesforce, Microsoft Teams, Google Drive, Confluence, Box, and more, essentially making the Slack search bar the unified interface for all of the team’s structured and unstructured data.

More details can be found here: AI That Actually Works for You | Slack

Here’s A New One For Me…. A Phishing Email That Uses QR Codes

Posted in Commentary with tags on July 18, 2025 by itnerd

I get phishing emails all the time. Such as my email address is about to be “deactivated” if I don’t re-authenticate to my server. Or I need to authenticate to my server to “keep my same password”. Since I run my own email server, I find these phishing attempts to be downright hysterical because there’s zero chance that they will work on me. But today I got this phishing attempt which is a bit more “interesting”, I got this email this morning:

Sidebar: Seeing as I am a company of two. The two being my wife and I, it’s funny that the threat actors think that we have an HR department. But I guess that a threat actor has to start someplace to try and phish you.

Now I obscured the QR code as I don’t want anyone scanning it. But in lieu of an attachment with a payload that executes on a target’s computer, or a link that the target clicks on, I got a QR code. Likely because it can evade spam filters and other security software or devices.

If you scan the QR code, which should be clear you should not scan the QR code if you get an email like this, it will take you to a phishing page that you are meant to enter your email address and your email password. This fits some other reports of this type of phishing that I have heard about. Here’s a quick list that I’ve posted on this blog in the past:

Fortra Discovers Sophisticated QR Code Phishing Campaign That Targets Office 365 Users

Abnormal Security Announces Enhanced Capabilities to Detect QR Code Attacks

C-Suite Receives 42x More QR Code Attacks Than Average Employee: Abnormal Security

New Report to Reveal QR Code Phishing Scams: Quishing You a Happy Holiday Season

INKY Discusses How Threat Actors Are Using QR Codes To Harvest Credentials

So what this means is that attacks like this one are becoming increasingly pervasive. Thus this is another attack vector that you need to be aware of to keep you and your organization safe.

Researchers share popular US states used in passwords

Posted in Commentary with tags on July 18, 2025 by itnerd

The Cybernews’ research team examined billions of passwords from over 200 cybersecurity incidents, revealing that individuals frequently select US states as their passwords. Carolina, Dakota, and Texas are the most popular and appear in thousands, even millions, of analyzed passwords, making them not a reliable choice for account security.

Being proud of your state makes you more likely to get hacked 

Even though everything is bigger in Texas, it is not the biggest and best choice for a password. And even though Texas appeared in passwords around 1M times, it only came out third on the list. Surprisingly, even California, the most populated state in the US, only ranked 11th on the wordlist (p. 18), with 556.9K uses. 

Carolina (1.9M) and Dakota (1.2M) are the two most popular US states that will not keep hackers away. At least one of these states will appear once around every 6K passwords. Interestingly, the number of times Alaska is mentioned in passwords is almost the same as that of its residents. 

The ten most popular states used in passwords

You can find the ten most popular states and how often they were named in passwords here: 

  1. Carolina — 1,921,229 
  2. Dakota — 1,171,849 
  3. Texas — 1,067,634 
  4. NewYork — 968,905 
  5. Florida — 879,400 
  6. Montana — 795,246
  7. Maine — 783,380
  8. Georgia — 710,455
  9. Alaska — 674,948
  10. Hawaii — 589,977

Network Assured released a report listing the 10 U.S. states with the most data breaches, both historically and in 2022. The data shows that Texas was the third-worst state for data breaches, with 581 reported incidents, despite having the highest state cybersecurity budget at $800 million. Not only does Texas rank third overall in the report, but it also ranked high in Cybernews research, being the third most mentioned state in passwords. These statistics suggest that investing heavily in cybersecurity alone may not solve issues caused by poor human practices unless resources are used effectively. 

However, some states appeared in passwords the least number of times. States and combinations like “NorthDakota,” “SouthDakota,” “NewHampshire,” “SouthCarolina,” “WestVirginia,” “Massachusetts,” “RhodeIsland,” “Pennsylvania,” “NorthCarolina,” and “NewMexico” were mentioned only about 3K times each.

The combinations mentioned above, especially those containing two words, are safer than the most popular states, but aren’t the safest option. Even though they are longer than eight characters and include both lower-case and upper-case letters, passwords should also incorporate numbers and special characters to reduce the risk of being leaked. Tools like the Password leak checker are available to check if a password has been compromised. 

To read the complete research, please click here