Inc Ransomware Gang Claims Responsibility For Texas State Bar Data Breach

Posted in Commentary with tags on April 3, 2025 by itnerd

The State Bar of Texas this week confirmed it notified 2,700 Texans about a January 2025 data breach that compromised names, SSNs, financial account info including account numbers, credit and debit card numbers, driver’s licenses or other government-issued ID, medical info, and health insurance info. 

The Ransomware gang Inc claimed responsibility for the attack but the State Bar of Texas has not verified Inc’s claim.

In a blog post reporting this news, Paul Bischoff, Consumer Privacy Advocate at Comparitech, wrote: 

“Inc is a ransomware gang that emerged in July 2023 and targets a wide range of victims in healthcare, education, and government. Its methods involve spear phishing and exploiting known vulnerabilities in software.”

“Inc has claimed responsibility for 86 confirmed ransomware attacks, plus another 280 unconfirmed claims that haven’t been acknowledged by the targeted organizations. In 2025, Inc claimed seven confirmed attacks and 61 unconfirmed.”

“Ransomware attacks on US government agencies and departments can lock down computer and steal data. Those organizations are then forced to either pay a ransom or face extended downtime, data loss, and putting data subjects at increased risk of fraud. Comparitech resea

Honestly, this is a problem that is simply getting worse and not better. That’s not a good place as the focus should be to put gangs like Inc out of business which makes the world a whole lot safer.

UPDATE: Roger Grimes, data-driven defense evangelist at KnowBe4, commented:

“If I was impacted by the breach and I’m still with the organization, I would want to know how it happened and that they are taking steps to make sure it doesn’t happen, at least the same way, again. Most ransomware attacks occur because of social engineering, and after that, unpatched software or firmware. Was that how it happened? Do they know? Because if you don’t know how it happened, you can’t assure me you’ve taken steps to make sure it can’t happen again.”

DuploCloud Wins Two Silver Globee Awards for Cybersecurity Excellence

Posted in Commentary with tags on April 3, 2025 by itnerd

DuploCloud has been named a Silver Winner in two categories at the 21st Annual 2025 Globee® Awards for Cybersecurity: Hot Cybersecurity Company of the Year and SaaS Security Solutions.

The Globee® Awards for Cybersecurity honor organizations that demonstrate excellence in risk management, threat detection, cloud security, and regulatory compliance. Winners are selected through a data-driven review process by more than 2,000 experts and industry leaders worldwide. DuploCloud stood out among a competitive pool of global nominees for its platform’s ability to radically simplify secure infrastructure deployment while accelerating time-to-market for cloud applications.

Hot Cybersecurity Company of the Year (Silver Winner)

DuploCloud was recognized for its record-breaking 62% year-over-year growth, significant new product innovations, and momentum across key industries including fintech, healthcare, and SaaS. The company’s unique approach – putting DevOps and security on autopilot – has resonated with startups and enterprises alike, helping engineering teams reduce operational complexity without compromising on security or compliance.

SaaS Security Solutions (Silver Winner)

DuploCloud also earned recognition for its Advanced Observability Suite, a powerful solution that provides developers with deep insights into cloud infrastructure, security posture, and compliance status in real-time. This integrated capability empowers teams to identify misconfigurations, monitor for policy violations, and maintain continuous compliance with frameworks like SOC 2, PCI-DSS, HIPAA, and ISO standards – without the need for extensive DevSecOps resources.

DuploCloud’s low-code platform automatically translates high-level application specifications into production-grade cloud configurations with embedded security controls. Its support for multi-cloud environments and Kubernetes orchestration makes it a go-to choice for organizations scaling rapidly in regulated industries.

Learn more about DuploCloud’s suite of DevOps solutions at https://duplocloud.com/platform/.

BforeAI Has New Threat Research About Threat Actors Targeting Bybit Users Following Breach

Posted in Commentary with tags on April 3, 2025 by itnerd

BforeAI has published its latest malicious infrastructure attack report on Bybit opportunists. In the three weeks following the Bybit breach announcement, the threat research team at BforeAI collected 596 suspicious domains originating from at least 13 countries. 

The domains reveal a range of methods employed to siphon cryptocurrency assets by targeting Bybit users. Of the almost 600 suspicious domains, 119 (20%) were confirmed by BforeAI as malicious actions. 

The threat research team documented various websites designed to resemble Bybit funds recovery. The websites highlighted the term “unauthorized activities”, creating a sense of urgency around the recent incident and the fear of financial loss to psychologically trigger a victim to take immediate action without considering the source. 

The research team also noted an automated strategy for rapid domain deployment. Ordered “-a,” “-b,” “-c,” “-d,” “-e,” and “-f” suffixes indicate variations of the main domain likely made for phishing attacks while maintaining a naming convention for legitimacy. 

While most Bybit-related domains were successfully detected and mitigated, researchers observed a new evasion tactic: truncated domains using ‘bb, ‘ which allowed phishing campaigns to remain undetected and active.

You can read the report here.

SafeBreach Labs discovers bypass for Google’s Quick Share vulnerability fix

Posted in Commentary with tags on April 2, 2025 by itnerd

As a follow-up to their DEF CON 32 presentation QuickSell: Sharing Is Caring about an RCE Attack Chain on Quick Share the SafeBreach Labs team has discovered a critical bypass to Google’s fix for one of the vulnerabilities they previously identified in the Quick Share data transfer utility for Windows.

After Google addressed the original vulnerabilities discovered by researchers Or Yair and Shmuel Cohen, the team set out to verify the effectiveness of these fixes. They discovered that the solution implemented for CVE-2024-38272 – a critical vulnerability that allowed attackers to send files directly to users’ devices without approval – could be bypassed. Researchers could still deposit unauthorized files onto target devices despite Google’s initial patch by manipulating payload IDs during file transfers.

Even though Google has been responsive to these additional findings and has issued a new CVE along with an updated fix to address the bypass, this research shows the complexity involved in securing data transfer applications and the value of thorough verification testing after security patches are applied.

You can read the research here.

Saviynt Hires Cybersecurity Executive Nitin Varma as SVP and Managing Director for India and SAARC

Posted in Commentary with tags on April 2, 2025 by itnerd

Saviynt today announced that Nitin Varma has joined the company as Senior Vice President and Managing Director for India and SAARC. Saviynt has a significant existing presence in the region, with nearly 600 employees in India serving all corporate functions. Varma’s appointment will strengthen Saviynt’s go-to-market efforts and is emblematic of the company’s overall commitment to the region. Varma will be leading Saviynt’s new customer acquisition efforts, building and enhancing technical and consulting partnerships, and elevating the company’s overall position as a trusted provider of identity security solutions in India and SAARC.

Varma has over two decades of leadership experience in cybersecurity and technology, including with organizations like CrowdStrike, Palo Alto Networks, and Cisco. In his last assignment as Managing Director at CrowdStrike he was responsible for building, scaling, and creating a strong market presence across India and SAARC.

To learn more about Saviynt’s Identity Cloud, please visit the website.

Outpost24 Puts Up A Blog Post On The CrushFTP Authentication Bypass Vulnerability… And The Events That Led To Mass Attacks

Posted in Commentary with tags on April 2, 2025 by itnerd

Outpost24 analysts recently discovered a critical authentication bypass vulnerability in CrushFTP, identified as CVE-2025-31161. 

Today, the team posted a blog detailing the process of their reporting, including how other parties circulating this news under a different CVE caused media confusion. 

The vulnerability is now being exploited by remote attackers, who are using it to gain unauthenticated access to devices running unpatched versions of CrushFTP v10 or v11. There have been over 1,500 vulnerable instances exposed online. The threat is particularly concerning as file transfer products like CrushFTP are often targeted by ransomware gangs. 

The blog runs through how the vulnerability works, how Outpost24 found it, and the timeline of events around the botched disclosure of this issue.  

For full details, you can read the blog in full here: https://outpost24.com/blog/crushftp-auth-bypass-vulnerability/

Here’s Some Additional Commentary From Comparitech And KnowBe4 Regarding The 200 Million Twitter/X User Records That Were Leaked

Posted in Commentary with tags , on April 2, 2025 by itnerd

Following the news that 200 million Twitter/X user records have reportedly been leaked, I have sourced commentary from cybersecurity experts at Comparitech and KnowBe4:

Anna Collard, SVP of Content Strategy and Evangelist at KnowBe4:

“When reading the news that 200 million X user records are now being freely shared online, my brain was instantly brought back the story and allegations made by Alan Rosa, X’s former Head of InfoSec. Rosa was fired after pushing back against Elon Musk’s demand to slash their security budget by 50%, including cutting core protections like vulnerability management and penetration testing. This breach feels like exactly the kind of consequence he warned about. (Even before the takeover, Twitter already did not have a great reputation in taking privacy and user security seriously. Think about the allegations made by Peiter ‘Mudge’ Zatko in 2022). This is just another reminder that companies can’t cut corners on cybersecurity without it catching up to them. For us, the users, we need to remember to be extra vigilant, ensure we have MFA enabled, change passwords (these were not included apparently in the breach but with X’s track record they may be somewhere else up for grabs) and to leave this platform for good if possible.”

Chris Hauk, Consumer Privacy Champion at Pixel Privacy:

“Social networks like X will always be an attractive target for hackers and criminals, thanks to being a gold mine of information that can be sold on the dark web. While we currently don’t know the extent of what was exposed, users need to stay vigilant for any phishing attacks that may be made possible by the information. I strongly recommend that users make use of disposable email addresses and phone numbers to sign up for social networks. This will ensure that bad actors won’t gain access to additional data, even if your favorite social network is hacked.”

Brian Higgins, Security Specialist at Comparitech:

“Any global platform with the profile of X and its owner will constantly be a target for pretty much every type of cybercriminal. It’s a modern occupational hazard faced by all providers. On this occasion it doesn’t look like any major private data has been exfiltrated at this stage, but the attacker could have plenty of historic content that users may wish had been deleted.” 

“Any entrepreneurial and innovative individual or group wouldn’t have much problem monetizing the information that’s made it into the wild. This attack is at the difficult stage where we only really know what the bad guys claim they have. Hopefully more information will be forthcoming but all those affected can do right now is be vigilant about their online presence and look at ways to raise their security game.”

This should be a wake up call for Twitter/X to up their game when it comes to security. And it should be a wake up call for users of Twitter/X that their personal information may not be as secure as they think. Thus they might consider this yet another reason to leave the platform.

Other World Computing (OWC) Launches OWC Archive Pro Ethernet Network-based LTO Backup and Archiving Solution

Posted in Commentary with tags on April 2, 2025 by itnerd

Other World Computing today announced the launch of the OWC Archive Pro Ethernet, a fast and reliable network-based LTO backup and archiving solution engineered for media and entertainment (M&E) pros, government agencies, and any sized business that needs to protect large volumes of critical data. The new and powerful OWC Archive Pro Ethernet can be seen for the first time – live – at NAB 2025, taking place April 5-9, 2025, in Las Vegas, at the Las Vegas Convention Center (LVCC), in OWC Booth SUL2 and ATTO Booth South Hall Lower — SL5616.

With the OWC Archive Pro Ethernet tapes are accessed like a normal drive, files appear in folders, and moving/retrieving files is drag-and-drop easy. Thanks to built-in ATTO XstreamCORE 8100T technology, the OWC Archive Pro Ethernet can be placed in a separate room or different building for enhanced security, less noise, better host compatibility, and improved user collaboration. With up to 76% cost savings versus HDD-based archiving plus a tape shelf life of 30 years vs. seven years for unpowered HDDs, the OWC Archive Pro Ethernet offers the best ROI of any storage format.

OWC Archive Pro Ethernet Key Features/Functionality:

  • Optimized (High-Speed) Data Transfers at Scale – Support for network-based shareable storage access via iSCSI
  • Powered by ATTO XstreamCORE® 8100T Technology – an industry-leading bridging platform that shares up to four SAS tape drives over a 10Gb iSCSI Ethernet network
  • ATTO Xtend SAN™ iSCSI Initiator for macOS® – enables macOS users to have a reliable, secure, highly interoperable connection to iSCSI storage
  • Instant ROI – Offers a 501% ROI with up to 76% lower cost vs HDD storage
  • Stores More – Up to 18TB native, up to 45TB compressed storage capacity per tape cartridge
  • Fast Tape Creation – Up to 400MB/s native, up to 1000MB/s compressed transfer rates
  • Two 10GbE Ports – Effortless integration into existing infrastructure, ensuring shared connectivity for demanding media and backup workflows
  • Flexible – Built-in IBM LTO-7, LTO-8, or LTO-9 made in Japan premium drive options
  • Intuitive – Simple GUI for managing and configuring network settings
  • Easy – Drag, drop, and retrieve files with the included Hedge Canister archiving app – a $399 value
  • LTFS Compatible – Archive files/folders with drag and drop ease and no proprietary software/hardware concerns
  • Secure: TAA compliant; supports AES 256-bit encryption for sensitive data
  • Compliance Ready – Supports non-LTFS compatible WORM cartridges required by legal and regulatory record-keeping
  • Complete – Includes LTO-data tape and cleaning tape
  • Certified: Meets Intel Thunderbolt and OWC operating certifications for assured performance and reliability on MacOS and Windows

With general availability (GA) shipment planned for April 2025, the OWC Archive Pro Ethernet will be offered in LTO-7, LTO-8, and LTO-9 configurations, with each solution including a tape cartridge, cleaning cartridge, Ethernet cable, and Hedge Canister software, with a starting price of $7,799. To learn more and purchase, please visit owc.com.

50K users exposed in “Gay Daddy” iOS app security lapse – Cybernews

Posted in Commentary with tags on April 2, 2025 by itnerd

Last week, I posted findings from Cybernews on the security weaknesses in popular iOS dating apps such as BDSM People and PINK. Today, I’m bringing your attention to another shocking discovery: a serious security flaw in the app Gay Daddy: 40+ Date & Chat that directly threatens the privacy and safety of its users.

Cybernews researchers uncovered that the app is leaking over 50,000 user profiles and 124,000 private messages, exposing sensitive data such as names, ages, relationship status, HIV status, location data, and even private photos – everything from awkward selfies to, well, let’s just say, less-than-innocent “self-expressions.”

Why? Hardcoded credentials and misconfigured Firebase security left the app’s backend wide open to anyone with basic technical knowledge. While the app markets itself as a “private and anonymous community,” the reality was anything but secure.

The app’s API keys and cloud storage credentials were also leaked, which makes exploitation even easier.

The app has an estimated 20,000+ downloads and a 3.7-star rating on the App Store in the US.

Due to this flaw, users could be targeted by scammers, blackmailers, or even face physical harm, especially in regions where LGBTQ+ individuals face discrimination.

Read the full report here

OWC to Showcase Cutting-Edge Thunderbolt 5 Storage and More @ NAB 2025

Posted in Commentary with tags on April 2, 2025 by itnerd

Other World Computing today announced its lineup for NAB 2025, taking place April 5-9, 2025. Attendees visiting the Las Vegas Convention Center (LVCC), OWC Booth SUL2 can explore its latest innovations, including the OWC ThunderBlade X12 – the ultimate Thunderbolt 5 Shuttle RAID for media production professionals. In addition, OWC will showcase its OWC Atlas Memory Cards and Readers, external drives, shared storage, and connectivity solutions, built for professionals in the broadcast, media, and entertainment industries who need reliable, high-performance storage that just works – even in the most sophisticated and demanding shooting scenarios. And OWC will be featured in must-see events, including a Post Production World Presentation and the highly anticipated Vimeo Staff Picks 2025 Screening Series, celebrating outstanding creative work in filmmaking.

Headlining OWC’s NAB showcase will be a game-changing professional-grade RAID solution – the next step in OWC’s Thunderbolt 5 solutions:

●     OWC ThunderBlade X12 – The ultimate production shuttle RAID up to 96TB, delivering high-capacity storage and blazingly fast sustained speeds in a compact, portable design. Optimized for RAID 0/5/10, it streamlines on-set ingestion and backup while doubling as a premium editing drive for video editors and VFX artists handling 4K to 12K RAW video, multi-cam sequences, and stereoscopic 360 VR workflows. General availability (GA) is planned for late April 2025.

In addition, OWC Booth SUL2 will feature:

●     OWC Atlas Memory Cards & Readers – High-performance, premium-quality memory cards and memory card readers designed for the most advanced use cases of professional photographers and videographers.

Direct Attached Storage:

●     OWC Envoy Ultra – The first and fastest Thunderbolt 5 Portable SSD – built like a tank for go-anywhere ruggedness. Bus-powered with a built-in cable for ultra convenience. Revolutionary real-world speed of over 6000MB/s, Envoy Ultra gives you the best of everything in the palm of your hand with reliability you can count on from the proven global leader of Thunderbolt innovations.

●     OWC Express 1M2 – Ultra-fast, compatible, and reliable portable USB4 NVMe SSD – build your own or choose ready-to-run solutions.

●     OWC ThunderBay 8 – The Thunderbolt 40Gb/s 8-bay desktop external storage RAID solution up to 192TB is designed for the speed, capacity, and flexibility to adapt to your evolving needs. Whether you’re changing cameras from a Sony FX9 to a Canon C300 or RED KOMODO, ThunderBay 8 has you covered.

●     OWC ThunderBay Flex 8 – With increased capacity to 200TB and speeds of 1700MB/s, the world’s first 3-in-1 productivity platform with unprecedented speed, space, versatility, and convenience delivers Thunderbolt storage, docking, and PCIe expansion for digital imaging, VFX, and video editing.

Network Attached Storage (NAS):

●     OWC Jellyfish – The OWC Jellyfish is a high-performance, easy-to-use shared storage solution form Terrabytes to Petabytes of capacity designed specifically for video teams, enabling seamless collaboration on 4K, 6K, up to 12K projects without dropped frames. With intuitive management software, built-in security features, and scalable storage options, the OWC Jellyfish empowers creative professionals to streamline their post-production workflow efficiently.

LTO:

●     OWC Archive Pro Ethernet – Just launched, it is a fast and reliable network-based LTO backup and archiving solution engineered for media and entertainment (M&E) pros, government agencies, and any sized business that needs to protect large volumes of critical data.

Connectivity:

●     OWC Thunderbolt 5 Hub – Explore a new world filled with workflow possibilities and state-of-the-art performance with the OWC Thunderbolt 5 Hub. It’s the perfect compact connectivity solution to solve the big problem of not having enough Thunderbolt 5 ports. Now you can turn a single cable connection from your machine into three Thunderbolt 5 ports and one USB-A port. With up to 80Gb/s of bi-directional data speed – up to 2x faster than Thunderbolt 4 and USB4 – and up to 120Gb/s for higher display bandwidth needs, you will redefine your productivity.

In addition, don’t miss these must-see events taking place during NAB 2025:

Post Production World Presentation: “Rewriting the Rules: A New Era of Race Storytelling”

Presenter: Shannon Vandivier and Blake Campbell, Cold Collaborative

Introductions: Larry O’Connor, Other World Computing (OWC)

Moderator: Jon Hoeg, Other World Computing (OWC)

About: Cold Collaborative shares how OWC solutions powered their fast-turnaround, cinematic cycling series—redefining race storytelling through innovation, risk-taking, and game-changing filmmaking.

Date/Time: Monday, April 7, 2:30 pm – 3:30 pm

Where: South Hall, Room S226

TitleVimeo Staff Picks 2025 Screening Series

About: The Vimeo Staff Picks Screening Series is a series of free, in-person events featuring recent Staff Pick favorites. These screenings are accompanied by live commentary from featured local filmmakers, followed by receptions with snacks, swag, and drinks. RSVPs are required.

Date/Time: Monday, April 7, 8:00 pm

Where: Beverly Theater

OWC solutions will also be on display in its strategic partner booths at NAB as follows:

●     Atlas Lens, Booth N1725 – OWC Atlas Memory Cards & Readers, Envoy Pro Elektrons and ThunderBlade X12

●     AJA Systems, Booth SL3310 – OWC ThunderBlade

●     Amove, Booth SL9832K – OWC ThunderBlade

●     Archiware, Booth SL3705 – OWC Jellyfish Nomad

●     Atto, Booth SL5616 – OWC Archive Ethernet Pro

●     Hedge, Booth SL12707 – OWC Archive Pro

For further information on NAB 2025, taking place April 5-9 (exhibits April 6-9), please visit: https://www.nabshow.com/.