Price Drop Alert: Galaxy S25 Ultra Now Available at a Reduced Price

Posted in Commentary with tags on April 11, 2025 by itnerd

Samsung has just announced a limited-time price drop on its flagship Galaxy S25 Ultra, known for its 200MP industry-leading camera system, all-day battery life, and sleek design. For a limited time, the device will be available for 35% offmaking it more accessible than ever for users looking to upgrade. 

With consumer interest in affordable premium devices on the rise, this move is part of Samsung’s broader push to make cutting-edge technology more accessible. 

The Galaxy S25 Ultra also pairs nicely with the Galaxy Tab S10 FE and Galaxy Book5 Pro in case someone wants to be “matchy matchy.”

Lee University notifies 137K people of data breach compromising SSNs 

Posted in Commentary with tags on April 11, 2025 by itnerd

Lee University in TN this week confirmed it notified 136,928 people of a March 2024 data breach that compromised the following personal info: names, Social Security numbers, government-issued ID numbers (e.g. driver’s license, passport), financial info including credit and debit card numbers, and medical info. 

Ransomware gang Medusa in April 2024 claimed responsibility for the breach, saying it stole nearly 388 GB of data from the school. Medusa demanded $1 million in ransom.

In a blog post reporting this news, Paul Bischoff, Consumer Privacy Advocate at Comparitech, wrote: 

“Medusa is a ransomware gang that first surfaced in September 2019. It debuted its leak site in February 2023, where it publishes stolen data of victims who don’t pay ransoms. Medusa often uses a double-extortion approach in which victims are forced to pay both to decrypt their systems and for not selling or publishing stolen data.”

“In 2024, Medusa claimed responsibility for 66 confirmed ransomware attacks affecting 2.4 million records. Its average ransom demand is $590,000. This attack on Lee University is Medusa’s second largest to date by number of records compromised, following the 1.8 million records impacted in the group’s attack on Summit Pathology.”

“Ransomware attacks are a growing threat to schools and colleges worldwide. They take down key systems, shut schools for days on end, and prevent teachers from accessing lesson plans and student data. Schools must either pay a ransom or face extended downtime, data loss, and putting students and staff at increased risk of fraud.”

Schools along with hospitals are easy targets for ransomware gangs. What needs to happen is that these sectors need to get the funding that will allow them to better defend themselves. The problem is that this funding isn’t coming. So you’ll be seeing me write stories about organizations in these sectors getting pwned until that changes.

US lab testing provider exposed health data of 1.6 million people

Posted in Commentary with tags on April 11, 2025 by itnerd

A US lab testing provider, Laboratory Services Cooperative, yesterday confirmed the exposure of 1.6 million people from its systems in an October 2024 attack. Data exposed in this breach includes names, SSNs, license numbers, diagnoses, lab results, treatments, insurance details, billing details and more. 

Oops.

Ensar Seker, CISO at SOCRadar had this to say:

“The data breach at Laboratory Services Cooperative (LSC), affecting 1.6 million individuals, is one of the most significant healthcare sector incidents we’ve seen this year. Not just in terms of scale, but in terms of sensitivity and impact. LSC’s role as a centralized lab service provider to organizations like Planned Parenthood and others across more than 35 states makes this not just a health data incident, but a targeted attack on reproductive healthcare infrastructure.”

“What makes this breach especially damaging is the breadth of data exposed. We’re talking about a full-spectrum compromise. Personally identifiable information (PII), medical diagnoses and treatments, lab results, financial data, and even government-issued IDs like passports and Social Security numbers. This creates a perfect storm for identity theft, medical fraud, and social engineering attacks.”

“Unfortunately, the healthcare sector continues to be a prime target for threat actors because the data is both extremely valuable on the black market and difficult to change. You can cancel a credit card but you can’t cancel your diagnosis, your birth date, or your lab history.”

“From a threat intelligence perspective, we’re already seeing evidence that threat actors are prioritizing healthcare organizations not just for financial gain, but to cause disruption, especially in politically sensitive areas like reproductive health. This makes it even more urgent for medical organizations and their partners to move beyond basic compliance and adopt a threat-informed, zero-trust security model.”

“This breach is a painful reminder that cybersecurity is patient safety, especially in sectors handling deeply personal and politically sensitive information.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech adds this: 

“Cyber attacks against healthcare providers like this are very common and very costly. They are usually ransomware attacks. Hospitals and other providers can’t afford downtime, which makes them more likely to pay a ransom to quickly restore operations. Downtime is often more costly than paying a ransom, and ransomware gangs know this.”

“If an organization refuses to pay the ransom, it could face extended downtime, data loss, and putting data subjects at increased risk of fraud. From 2018 to 2024, we tracked 654 confirmed ransomware attacks on US healthcare organizations. The resulting downtime costs an estimated $1.9 million per day per organization on average, with an average downtime of 17 days.”

Chris Hauk, Consumer Privacy Champion at Pixel Privacy follows with this:

“Customers who may have had their data exposed in the LSC breach will need to stay alert for phishing attempts, new accounts being opened under their name, calls claiming to be bill collectors, and more. Affected parties should take advantage of any credit monitoring services that may be offered by LSC.”

This is normally the part where I would say that this situation is unacceptable and that they need to be hauled in front the relevant authorities to face the music. But unfortunately, given what is going on in the US at the moment, the latter half of that is likely not going to happen no matter how unacceptable this is. Which is going to be a huge problem as companies won’t be “incentivized” to do better to avoid any sort of meaningful punishment.

UPDATE: Erich Kron, security awareness advocate at KnowBe4, commented:

“While the focus on breaches such as this are often around the personal information that was stolen and could be used to steal an identity, the other data often included can be used to create social engineering attacks that could be very damaging.

If an attacker knows a specific time and place where an individual was, or has information about a specific procedure that was performed, it can be easy for them to pretend that they are associated with the hospital, insurance company, or other organization related to the procedure and demand payment for services. For example, a bad actor could contact a victim, referencing the procedure, and saying that part of that procedure was not covered, and that the person needed to pay them now or be turned over to collections. The complex and expensive process of modern healthcare procedures can make an approach such as this very believable.

It is critical that people impacted by a breach, such as this, are quickly informed of the data loss and are aware of the threats they now face. Victims of the breach should be very cautious of any organization that contacts them and references information that could have been included in this breach.”

Storm-2372: Russian APT Using Device Code Phishing in Advanced Attacks

Posted in Commentary with tags on April 11, 2025 by itnerd

SOCRadar this week released research diving a new cyber campaign by Storm-2372, a Russian state-backed group which has recently been exploiting device code phishing to bypass MFA and infiltrate high value targets such as government, defense, healthcare, and financial institutions across the US, UK, and more. 

In this blog, the researchers outline what device code phishing is, how it works, who is being targeted, key indicators of compromise, as well as mitigation strategies. 

For full details, the research can be read here: https://socradar.io/storm-2372-russian-apt-using-device-code-phishing-in-advanced-attacks/

The Biggest Corporate Scams of the Last 25 Years

Posted in Commentary with tags on April 10, 2025 by itnerd

The research team at vpnMentor, explored the most notorious corporate scams of the last 25 years, which includes names like Lehman Brothers, FTX, Boeing, PayPal, Google AdSense, and examine who fell, who endured, and who managed to profit despite their wrongdoing.

Key findings at a glance:

  • Over a quarter (29.3%) of the companies involved in big corporate scandals belong to the Finance and Banking sector.
  • The majority of the analyzed companies (70.7%) faced some reputational and financial damage but continued operations after the scandal.
  • 85% of the publicly traded companies that continued operations had their lowest stock price as a direct result of the scandal coming to light.
  • PayPal, Google, and JPMorgan Chase seemingly faced no significant repercussions for their unethical actions, continuing to make large profits when the scandals broke out.

Ultimately, these scandals serve as reminders of the importance of transparency, accountability, and ethical leadership in business. They underscore that while some may profit in the short term, the long-term costs of dishonesty often outweigh any gains.

You can access this report here: https://www.vpnmentor.com/blog/biggest-company-scams-research/

The New Galaxy Tab S10 FE Is Here Starting at $699.99

Posted in Commentary with tags on April 10, 2025 by itnerd

Galaxy Tab S10 FE Series tablets are officially available in stores across Canada as of today! 

Built for creativity, multitasking, and on-the-go productivity, the Galaxy Tab S10 FE and S10 FE+ bring Galaxy AI tools like Circle to Search and Handwriting Assist, large immersive displays, and fan-favourite apps like Goodnotes and LumaFusion — all in a sleek, powerful package. 

You can find them at Samsung Experience Stores and major retailers like Best Buy, Walmart, Costco, Staples, and Amazon. The 5G version is also available at Rogers and Best Buy. 

Qilin says it hacked a Nebraska natural resources authority

Posted in Commentary with tags on April 10, 2025 by itnerd

Ransomware gang Qilin today claimed responsibility for a November 2024 cyber-attack against North Platte Natural Resources District in Nebraska. Although it didn’t disclose what data was compromised, it does recommend victims take precautions to protect their identities and SSNs from abuse. 

In a blog post reporting this news, Paul Bischoff, Consumer Privacy Advocate at Comparitech, wrote: 

“Qilin is a ransomware group that began claiming responsibility for attacks in late 2022. Also known as Agenda, Qilin is a Russia-based hacking group that mainly targets victims through phishing emails to spread its ransomware. It launched in August 2022 and runs a ransomware-as-a-service business in which affiliates pay to use Qilin’s malware to launch attacks and collect ransoms.”

“Qilin has claimed responsibility for 58 confirmed ransomware attacks since it began, 12 of which were against government entities. They include attacks on the city of West Haven, CT; the Palau Ministry of Health and Human Services; the Cleveland, OH Municipal Court; and the town of Bedford, MA.”

“In 2025 so far, Qilin has claimed 12 confirmed ransomware attacks, plus another 128 unconfirmed claims that haven’t been acknowledged by the targeted organizations. Comparitech logged 92 confirmed ransomware attacks against US government entities in 2024, and 14 in 2025.”

“Ransomware attacks on US government agencies and departments can both steal data and lock down computer systems. The attacker then demands a ransom to delete the stolen data and in exchange for a key to recover infected systems. If the target doesn’t pay, it could take weeks or even months to restore systems, and people whose data was stolen are put at greater risk of fraud. Ransomware can disrupt everything from communications to billing, payroll, and online services.”

Additionally, the researchers at Comparitech today released a report looking at all the confirmed and unconfirmed ransomware attacks of Q1 2025. I covered that in this story.

The Number Of Lawsuits That Apple Is Dealing With Over The Apple Intelligence Debacle Is Now Up To Three

Posted in Commentary with tags on April 10, 2025 by itnerd

Apple’s problems related to their shambolic Apple Intelligence rollout seems to be increasing. First there was this lawsuit in the US. Which was followed by this one in Canada. And now a new lawsuit filed in California that says this:

This action arises from Apple’s materially false and misleading statements relating to Apple’s artificial intelligence (“AI”) suite of features, branded as “Apple Intelligence”—in particular, promised AI enhancements to Siri, Apple’s software-based virtual assistant. The Siri AI makeover was the centerpiece of the promised Apple Intelligence platform and was touted by the Company in advertisements and other public statements in an effort to increase sales of the iPhone 16 and spur iPhone upgrades. Those promises were false and nearly a year after they were made, Siri’s touted “In-App” and “On-Screen” AI functions still do not exist.

This really smells like BatteryGate where Apple’s problems went from bad to worse until Apple was not only forced to make substantial changes to their software, but also they had to pay a lot of money to settle the multitude of lawsuits that were filed around the planet. My sense is this situation is heading in that same direction. Eventually. There’s been no comment from Apple as of yet. But you get the feeling that they will have to address this at some point.

Yikes! Critical FortiSwitch flaw lets hackers change admin passwords remotely

Posted in Commentary with tags on April 10, 2025 by itnerd

Fortinet FortiSwitch owners should be patching their gear ASAP as the company has released security patches for a critical vulnerability in FortiSwitch devices that can be exploited to change administrator passwords remotely.

You can find out more details here: PSIRT | FortiGuard Labs

Martin Jartelius, CISO at Outpost24 had this to say:

“There are a few rules of thumb. DO NOT expose administrative interfaces against the internet if you can avoid this. While this flaw allows a password change, for those who expose their devices against untrusted networks, the quality of passwords is also important, because already today there is the risk of attacks against weak password.”

“We help companies fight both those issues, password quality is the most user-centric, and EASM allows organizations to find those devices and fix the exposure – because exposure it risk, and vulnerability or not – if the attackers cannot reach the device you have substantially less of a stressful morning fixing this issue. Also praise to Fortinet who found, fixed, and disclosed the issue openly.”

This is one of these situations where you should drop what you are doing and patch everything ASAP. I say that because there are a lot of these devices online. Which means every single one is a target for threat actors.

Arcitecta Wins 2025 NAB Show Product of the Year Award

Posted in Commentary with tags on April 10, 2025 by itnerd

Arcitecta, a creative and innovative data management software company, today announced that its Mediaflux® Real-Time is an Asset Management and Playout winner in the 2025 NAB Show Product of the Year Awards. This official awards program recognizes some of the most significant and promising new products and technologies showcased by exhibitors at the NAB Show.

Ideal for live sports, broadcast, hybrid production environments and more, Arcitecta’s Mediaflux Real-Time provides unparalleled production workflow speed, flexibility and efficiency gains. It supports real-time editing, removes workflow bottlenecks and enhances remote collaboration, enabling faster content delivery and seamless media management.

By eliminating bottlenecks and delays, Mediaflux Real-Time empowers teams to work faster and smarter, delivering powerful capabilities:

  • Edit anywhere: No longer tethered to event locations, editors can access growing files from any site, enabling real-time collaboration across multiple locations.
  • Fast turnaround: Remote editors can create highlight reels or edit live footage almost instantly, dramatically cutting post-production time.
  • Smoother workflows: Content can be played back in real-time across sites and be reviewed as it is rendered, ensuring faster workflows and higher productivity.

NAB Show Product of the Year Award Winners were selected by a panel of industry experts in 16 categories and announced in a live awards ceremony at NAB Show on April 8.

Click here for more information about the 2025 NAB Show Product of the Year Awards.