New TELUS Rewards program launches nationwide

Posted in Commentary with tags on May 15, 2025 by itnerd

TELUS is launching a new national rewards program, offering its customers more value than ever before with TELUS Rewards – the first and only Canadian telecom loyalty program of its kind. The new TELUS Rewards program features a tiers-based system, rewarding customers for their loyalty and providing elevated status which can unlock exclusive benefits and perks such as:   

  • TELUS Perks: Enjoy TELUS benefits such as international roaming passes, complimentary services such as a Mobile Klinik screen protector and TELUS Health MyPet virtual consultations, contest entries, and more.
  • Partner Perks: Coming soon, TELUS will welcome WestJet as its inaugural premium partner, introducing exciting travel perks for members and account linking, where members can earn and redeem across TELUS Rewards and WestJet Rewards. This is the first of our strategic partnerships bringing exclusive partner perks to our TELUS Rewards members.
  • Rewards Catalogue: Redeem points for bill credits, gift cards, contest entries and more, plus enjoy access to discounts from everyday brands. 

The new TELUS Rewards revolutionizes the already successful and award-winning program in British Columbia and Alberta, welcoming all TELUS customers across Canada and our TELUS Privilèges members from Quebec. As a unified national program, members only need one qualifying TELUS service to join, and can progress through Silver, Gold, Platinum, and Diamond tiers as they add more qualifying TELUS services—whether it’s Mobility, Internet, Optik TV or SmartHome Security. 

In addition to a wide range of perks and catalogue options, TELUS Rewards members also have the opportunity to donate their points to the TELUS Future Friendly Foundation. These TELUS Rewards points will go towards supporting Canadian youth-serving charities that focus on health and education, awarding post-secondary bursaries to socially-minded students who are experiencing financial hardship, and providing humanitarian relief in response to natural disasters and tragedies when they arise in our communities. 

To learn more about TELUS Rewards, visit telus.com/my-rewards.

An iOS book app exposes 42,000 users’ personal data to hackers

Posted in Commentary with tags on May 15, 2025 by itnerd

The Cybernews research team has uncovered a severe data leak. The iOS app “My Book List – Library Manager” has been spilling sensitive user data of 42,000 users via a misconfigured Firebase database.

The leaked data included users’ book lists, names, email addresses, IP addresses, purchase history, device metadata, and more.

You might think a few book titles here and there are harmless. But in reality, the leaked data from “My Book List” is a treasure trove for malicious actors – opening doors to targeted phishing scams using device and location data, and real-time data scraping by cybercriminals.

Here’s why this matters:

  • It’s a systemic problem. The current leak was uncovered as part of an investigation by Cybernews, where researchers analyzed 156,000 iOS apps. We found that 71% leak at least one sensitive secret.
  • The app also leaks API keys, client IDs, and tokens – hardcoded directly into the app. This dangerous practice could give attackers backend access, putting users and infrastructure at further risk.
  • Access to the leaked data allows attackers to craft highly targeted phishing scams that increase the chances of tricking victims. 
  • A leaked IP address can reveal your approximate location, allowing scammers to create localized messages that appear more convincing. 
  • Exposed device metadata can help malicious actors tailor attacks to clients usage patterns, making the scams feel even more personal and difficult to detect.

To read the full research, please click here.

Hedra raises $32M to build the leading generative media platform for digital characters

Posted in Commentary with tags on May 15, 2025 by itnerd

In the fight for audience attention, video wins – but producing it remains out of reach for most companies. Hedra, the AI video generation platform behind over 10 million lifelike videos, has raised $32 million to bring AI-powered video creation to enterprise marketers. 

The series A funding round was led by Andreessen Horowitz’s Infrastructure fund (a16z Infra), with participation from existing investors, including a16z speedrun, Abstract, and Index Ventures. This round brings the company’s total funding to $44 million since its last announced fundraise in 2024. 

Video production is mired in lengthy timelines and production costs that can spike up to thousands of dollars per minute. While over 2.5 million users have already generated millions of videos with Hedra,  the company is now bringing this creative superpower to enterprise marketers (and beyond) who need to produce character-driven video content at scale. Whether it’s a seasonal campaign or a response to a real-time cultural moment, Hedra allows teams to create high-quality content fast featuring lifelike digital characters – so they can meet their audience where they are, when it matters most.

Hedra’s origin is deeply personal for founder and CEO Michael Lingelbach. Before pursuing a PhD at Stanford, he spent years on stage as a theatre actor. That experience shaped his belief that characters are the heart of every story, and that believable digital characters would unlock the next era of storytelling. “We’re building the next generation of storytelling technology to empower content creators and enterprise marketers to tell narratives at scale on their own. Getting over the uncanny valley of compelling performance is the hardest frontier in video, and with our Character-3 foundation model, we’re devoted to crossing it,” said Michael Lingelbach, Founder and CEO of Hedra.

At the heart of Hedra’s magic is Character-3, the first omnimodal foundation model that seamlessly blends text, image, and audio to create character performance videos. Whether you need a professional spokesperson explaining your product, an animated brand mascot, or even an animal-style character, the model works across any style and framing — from cinematic full-body shots to intimate close-ups. This breakthrough technology powers Hedra Studio, where users can transform simple ideas into compelling visual stories with just a few clicks.

Since launching in 2024, Hedra has seen explosive growth, attracting a wide range of users, from social media creators to enterprise teams looking to streamline video production – including Jon LaJoie and Reid Hoffman. As marketing teams face pressure to do more with less, and as consumers grow increasingly discerning in a tighter economic climate, the ability to produce content quickly — and with emotional impact — has become a competitive necessity. With Hedra, brands can speak to the moment, respond to cultural conversations in real time, and cut through the noise with high-quality videos that resonate.

As AI-powered storytelling continues to evolve, Hedra is investing heavily in pushing the next frontier of quality and controllable model quality — ensuring that its technology not only performs at the cutting edge, but solves real-world creative challenges. The team has grown to 20 employees, with plans to triple headcount by year’s end.

Looking ahead, Hedra is poised to become the creative canvas for the next generation of media creators – from individuals to global brands. By combining cutting-edge AI models with intuitive creation tools, the company is democratizing video production and enabling a future where compelling visual narratives are limited only by imagination, not by budget or technical expertise. As the line between human and AI-generated content continues to blur, Hedra is ensuring that the art of storytelling remains vibrant, accessible, and deeply human at its core.

Surfshark expands Dedicated IP with new locations

Posted in Commentary with tags on May 15, 2025 by itnerd

Surfshark announced today that it has expanded its Dedicated IP service to seven new locations, now offering unique, static IP (Internet Protocol) addresses in 20 locations worldwide. This expansion provides users with reliable access to IP-sensitive services. It also minimizes frustrating human verification requests by ensuring a consistent IP address each time they connect through a designated VPN server.

Benefits of Dedicated IP

The Dedicated IP feature is available on Android, Windows, iOS, and macOS and supports all major protocols, including WireGuard®, for maximum speed. This allows users to benefit from a static IP address without sacrificing connection performance.

One key advantage is a noticeable reduction in human verification requests — common with standard VPNs, where multiple users share the same IP address, often triggering verification prompts. Dedicated IP minimizes this issue by assigning a unique address, making traffic appear more consistent to websites. It also enhances network performance, as only one user generates traffic through the IP, leading to faster and more stable connections. Additionally, Dedicated IP simplifies access to remote networks, eliminating the unpredictability of changing addresses associated with shared VPN servers.

7 new locations

Surfshark already offered 13 Dedicated IP locations: the US (San Jose, Los Angeles, Dallas), Canada (Toronto), the UK (London), the Netherlands (Amsterdam), Germany (Frankfurt), France (Paris), Italy (Milan), Japan (Tokyo), Hong Kong (Hong Kong), Australia (Sydney), and South Africa (Johannesburg). Now, the company has expanded Dedicated IP to seven new locations: the US (Denver, New York, Las Vegas), Brazil (São Paulo), Poland (Warsaw), Singapore (Singapore), and Turkey (Istanbul).

Guest Post: Are You Making These Common Password Mistakes? Here’s What You Need to Know 

Posted in Commentary with tags on May 15, 2025 by itnerd

By Egidijus Navardauskas –  Head of Security at Hostinger

Weak passwords remain one of the biggest drivers of data breaches, with over 80% of incidents linked to compromised credentials. To better understand why so many passwords fail to offer real protection, Hostinger’s experts analyzed thousands of real-world entries across multiple leaked datasets. Using a combination of machine learning and behavioural analysis, we identified the most common password mistakes and why users keep making them.

Here are the top mistakes identified:

1. Using Short Passwords

Insight: 21.7% of the passwords we analyzed were under 8 characters – all of them were cracked instantly.

Why it Happens: Short passwords are quicker to type and easier to remember. But they’re also the first to fall to brute-force attacks.What You Can Do Now: Make sure your password is at least 12 characters long, ideally using a phrase or sentence you’ll remember.

2. Using “Unique” Passwords

Insight: Passwords that look unique (like “minebluecar67”) are often made from low-entropy patterns that are easy to break.Why it Happens: People choose familiar word-number combinations, thinking they’re safer than generic passwords. But these formats are highly predictable.

What You Can Do Now: Mix uppercase, lowercase, numbers, and special characters, and avoid common words or patterns.

3. “Very Weak” Doesn’t Always Mean “Short

Insight: Even though some of these passwords were over 20 characters long, they had a 13% crack rate, making them nearly as easy to break as much shorter passwords.Why it Happens: People assume longer passwords are automatically stronger, but repetition lowers security (like “aaaaaaa” or “123123123”).

What You Can Do Now: Avoid repetition. Variety in structure is just as important as overall length.

4. Not Knowing Breached Passwords

Insight: A large portion of passwords used today still appear in the top 10 million most leaked passwords. In our study, 475 passwords matched high-frequency entries from global breach lists.

Why it Happens: People aren’t aware their credentials have been compromised, or they reuse old passwords out of habit.What You Can Do Now: Use sites like “Have I Been Pwned” to regularly check your credentials and avoid reusing any password that appears on a known breach list.

“A lot of people assume that once they’ve set up their privacy settings or chosen a strong password, they’re fully protected. But the truth is, security and privacy are ongoing processes. New threats and vulnerabilities appear constantly, and the platforms we use are always evolving. Staying safe means staying alert — regularly reviewing your privacy settings, keeping your passwords strong and unique, and making sure two-factor authentication (2FA) is active are just as important as the initial setup. Security-related settings should be maintained over time to ensure they still reflect your needs and provide the right level of protection.” 

Rogers Xfinity TV now delivers the most content in Canada

Posted in Commentary with tags on May 15, 2025 by itnerd

Rogers Xfinity TV offers the most content of any television provider in Canada with the addition of more than 150 international channels in over 20 languages. Now Rogers customers can access more than 480 channels and experience more of the world from home, only on Rogers Xfinity TV.

According to a recent survey of Canadians who speak multiple languages, in-language content is important to 84% to stay connected to their culture and heritage.

Rogers newly expanded international TV channel offering is available with Rogers Xfinity TV packages in Free Preview through June 17 for customers to explore the world from the comfort of their home. When the preview is over, customers can customize their entertainment experience by subscribing to these international TV channels and theme packs.

Rogers Xfinity TV brings the most TV content – live sports, entertainment and news from Canada and around the world – with on-demand and streaming apps together on one platform to deliver the best entertainment experience.

To learn more, visit rogers.com/Xfinityy.

How long does it take for organizations to report a data breach?

Posted in Commentary with tags on May 15, 2025 by itnerd

Comparitech researchers have published a new study looking the average time it takes for organizations to report data breaches. With data from 2,600 attacks in the US since 2018, the researchers will analyze not only the average time it takes, but break it down across industries — education, healthcare, law, etc. — as well as by year. 

Some key findings include: 

  • The average time to report a data breach following a ransomware attack is 4.1 months
  • Ransomware attacks in 2023 saw the highest average data breach reporting time (5.1 months)
  • Education had the highest average with over 4.8 months
  • Healthcare had the lowest average with just under 3.7 months
  • Businesses took an average of 4.2 months with those in the legal sector taking the longest (6.4 months)
  • The longest known reporting period is 38 months
  • States with specific timeframes for reporting a data breach had a slightly lower average reporting period than those without (3.9 months compared to 4.2 months)

The report can be read here: https://www.comparitech.com/news/average-data-breach-report-time-ransomware-attack/

32 Million Records Allegedly Belonging to The Epoch Times Listed Online

Posted in Commentary with tags on May 15, 2025 by itnerd

Recently, the Safety Detectives Team stumbled upon a forum post where a threat actor has listed a database containing 32 Million records allegedly belonging to The Epoch Times.

According to the author’s claims, the data consists of 32 million records, containing The Epoch Times subscribers’ usernames, full names, phone numbers, credit card numbers, card expiration dates, billing addresses, invoices, emails, devices, and locations.

This data is sensitive because it could be used by malicious actors to prepare and execute various types of attacks on the affected customers.

Their full report can be accessed here: https://www.safetydetectives.com/news/epoch-leak-report/

Flashpoint publishes blog on position re: European Vulnerability Database (EUVD) and its role in vuln intelligence

Posted in Commentary with tags on May 14, 2025 by itnerd

I wanted to highlight a blog that Flashpoint published today about the European Vulnerability Database (EUVD).

The blog offers commentary about the following:

  • Can the EUVD replace the DVE ecosystem?
  • Was the release of EUVD fueled by MITRE funding uncertainty?

The blog is located here.

Stealer Logs: How stolen credentials fuel ransomware

Posted in Commentary with tags on May 14, 2025 by itnerd

This week, the experts at SOCRadar published an in-depth analysis into one of the most quietly dangerous threats in cyber today: stealer logs. 

Infostealer malware like RedLine, Lumma, and Vidar are being used to silently steal credentials, browser session cookies, and crypto wallets from infected machines, and then package that data into searchable logs sold across Telegram, dark web markets, and hacker forums.

The analysis takes a look at: 

  1. What stealer logs are and what data is collected through them.
  2. The top 10 attacks involving stealer logs, including the MGM and Caesars breaches via Okta in 2023. 
  3. Real-world use cases of stealer log exploitation. 
  4. How stealer logs are traded on the dark web. 
  5. And a breakdown of which regions are most impacted.

For full details, please visit the analysis here: https://socradar.io/stealer-logs-everything-you-need-to-know/