KnowBe4 Earns 5-Star Rating in the 2025 CRN Partner Program Guide

Posted in Commentary with tags on March 24, 2025 by itnerd

KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, has been honored by CRN®, a brand of The Channel Company, with a 5-Star Award in the 2025 CRN Partner Program Guide. This annual guide is an essential resource for solution providers seeking vendor partner programs that match their business goals and deliver high partner value.  

The extensive support and resources technology vendors offer through their partner programs are a critical consideration for solution providers assessing which IT vendors, service providers, and distributors to team with in building world-class technology solutions. Program elements such as financial incentives, sales and marketing assistance, training and certification, technical support and more can set vendors apart and play a key role in boosting their partners’ long-term growth and profitability.

The 5-Star Award is an elite recognition given to companies that have built their partner programs on the key elements needed to nurture lasting, profitable, and successful channel partnerships.

For the 2025 Partner Program Guide, the CRN research team evaluated vendors based on program requirements and offerings such as partner training and education, pre- and post-sales support, marketing programs and resources, technical support, and communication.

The 2025 Partner Program Guide will be featured in the April 2025 issue of CRN and published online at www.CRN.com/PPG beginning March 24, 2025.

If You Used 23andMe, You May Want To Start Being Concerned

Posted in Commentary with tags on March 24, 2025 by itnerd

News is just filtering in that DNA testing service 23andMe has filed for bankruptcy protection.

Keep in mind that this company has been in trouble for a while. They got pwned in October of 2023. Then when the scope of the hack became clear, they tried to shift the blame to users via changing their terms of service. Then when even more came out about the hack, the company said it was the fault o f their users that they got pwned. Too bad there was evidence that the company was asleep at the switch for months. The company then tried to pay their way out of this. But it became clear that they were living on borrowed time. That left this question. What happens to customer data? That’s now a today problem for anyone who has used the service. But….

23andMe said in a press release that it plans to continue operating throughout the sale process and that there “are no changes to the way the company stores, manages, or protects customer data.”

On Friday, the Attorney General in 23andMe’s home state of California issued a consumer alert advising customers to delete their data from the site given the company’s “reported financial distress.”

IF you can do that, great. But one suspects that is going to be difficult, if not impossible in this case. I say that because the DNA of their customers is going to be insanely valuable as part of any sale. Thus I don’t see a scenario where users will be able to delete their data as a means to protect themselves.

Watch this space as this just got real for 23andMe users.

Oh Boy…. 6 Million Records For Sale Have Been Exfiltrated From Oracle Cloud Impacting Over 140 Thousand Tenants 

Posted in Commentary with tags on March 22, 2025 by itnerd

Researchers have uncovered a major breach targeting Oracle Cloud, with 6 million records exfiltrated via a suspected undisclosed vulnerability. Over 140,000 tenants are impacted, as the attacker demands ransom and markets sensitive data online.

More info here: https://www.cloudsek.com/blog/the-biggest-supply-chain-hack-of-2025-6m-records-for-sale-exfiltrated-from-oracle-cloud-affecting-over-140k-tenants

Ensar Seker, CISO at SOCRadar, provided the following comments:

“This incident is not just a breach, it’s a watershed moment for cloud security and third-party risk awareness.

The Oracle Cloud breach, allegedly carried out by a hacker known as “rose87168,” is a high-impact supply chain compromise with a potentially global ripple effect. With 6 million records stolen, affecting over 140,000 tenants, and sensitive data like encrypted passwords, configuration files, and access credentials now exposed, this isn’t just a strike against Oracle, it’s a wake-up call for every business relying on third-party cloud platforms.

From the initial findings, the hacker exploited what appears to be a zero-day vulnerability in Oracle WebLogic, which is often used to power login systems for Oracle Cloud. Once inside, they were able to exfiltrate sensitive data at scale, and now they’re demanding payments for deletion, essentially holding businesses hostage with their own data. That’s ransomware behavior without the encryption step, targeting confidentiality and reputation instead of just availability.

So, what makes this breach especially dangerous? First, it targets the supply chain layer, an area where many companies mistakenly assume security is outsourced to the cloud provider. The reality is, shared responsibility doesn’t mean equal responsibility, and this case proves that even the largest, most reputable cloud vendors are not immune to zero-days or sophisticated adversaries. Second, the hacker’s move to crowdsource the decryption of stolen password hashes by offering rewards is a chilling tactic. It opens the door to mass credential stuffing, lateral movement attacks, and future ransomware campaigns, potentially affecting not just Oracle’s clients, but also their partners, vendors, and customers.

This incident could become 2025’s SolarWinds moment, especially if we confirm that multiple enterprises were breached via their Oracle Cloud instances. We’re looking at a case that undermines trust in critical cloud infrastructure, and once again underscores how a single vulnerability in a widely used platform can cascade across thousands of organizations. This also raises a pressing question: How soon did Oracle know? How was this vulnerability triaged, and were any proactive mitigations communicated before this data was already on the dark web?

One of the important questions is what affected companies can do?

  1. Incident Response at the Tenant Level: Every affected company must immediately rotate all credentials, access keys, and tokens related to Oracle services. Assume compromise and move quickly. 
  2. Monitor for Reuse and Exposure: Expect these stolen credentials to surface in stealer logs, dark web marketplaces, and brute-force tools. Deploy threat intelligence platforms to track brand mentions and leaked credentials.
  3. Demand Vendor Transparency: Customers should pressure Oracle to release a full technical breakdown, including a timeline, affected services, and patching instructions. Transparency now will be critical for restoring trust.
  4. Rethink Cloud Security Assumptions: CISOs must treat third-party platforms with the same scrutiny as internal systems. That means continuous monitoring, vulnerability scanning, and more aggressive red teaming of cloud-based assets.”

This is possibly going to be huge. Thus you should keep an eye on this as my “Spidey Sense” says that this is going to be something that we are going hear more about.

Fraud Prevention Month: A Cross-Border Look at Consumer Trust From FICO

Posted in Commentary with tags on March 22, 2025 by itnerd

I wanted to share insights from FICO’s recent Canadian and U.S Scams Impact Survey provide year-over-year data into how Canadians’ trust in banks’ scam protection and real-time payments measures up against U.S. consumers.  

While Canadians confidence in their banks is encouraging. This gap in trust raises questions about whether Canadians’ higher confidence in their banks could leave them less prepared to anticipate evolving scam tactics and take proactive steps to protect themselves.  

Some key insights include:  

  • 82% of Canadians are satisfied with their bank’s fraud resolution process, compared to just 67% of US consumers 
  • Only 12% of Canadians would switch banks over a poorly handled fraud case, compared to 19% of US consumers.  
  • On average 67% of consumers in both countries (66% US & 67% Canada) believe banks should reimburse scam victims all or most of the time.  

Here’s an slideshow that graphically illustrates these and more insights:

Microsoft To Windows 10 Users…. Buy A New PC With Windows 11

Posted in Commentary with tags on March 22, 2025 by itnerd

Later this year, Windows 10 is going to go into end of support status in a few months. But the problem is that there’s a lot of Windows 10 PCs out there. No problem says Microsoft. Because you can just trade in your PC to get a brand new Windows 11 one:

Windows Latest spotted a new email from the Redmond giant related to Windows 10 in our ProtonMail account. We use this email for the Microsoft account of the test PC running Windows 10, which is sadly not capable of running the latest and greatest OS from Microsoft.

The email begins with a bold “End of support for Windows 10 is approaching” heading, followed by direct links to check the upgrade eligibility or purchase a new computer.

Next up is a FAQ section that tries to answer all the important questions related to Windows 10’s retirement. The first question clarifies the things that’ll happen after October 14, 2025, which includes the end of all kinds of support from Microsoft. It clarifies that all the free support will halt from that day onwards but doesn’t offer any paid alternatives.

After that, there is a brief answer about trading or recycling your old PC if you want to upgrade, followed by an assurance that your PC will work but won’t get updates. However, with time it’ll support fewer apps and will become a hunting ground for malicious actors.

Here’s the problem with this approach. People aren’t going to get much when trading in a laptop or a desktop that’s too old to run Windows 11. The market for those machines is already falling fast. On top of that with inflation, tariffs and the like squeezing the bank accounts of people, I really don’t think that this is a winning approach as you have to have the disposable income to buy a new PC. But I guess that their thought process is YOLO.

Apple Gets Sued Over The Apple Intelligence Debacle

Posted in Commentary with tags on March 21, 2025 by itnerd

Seeing as Apple was hyping Apple Intelligence to sell iPhones and Macs, and then had to back away from that when they delayed the new Siri, you knew that a lawsuit was going to be inbound. And sure enough, here’s the lawsuit:

The suit, filed Wednesday in U.S. District Court in San Jose, seeks class action status and unspecified financial damages on behalf of those who purchased Apple Intelligence-capable iPhones and other devices.

And:

“Apple’s advertisements saturated the internet, television, and other airwaves to cultivate a clear and reasonable consumer expectation that these transformative features would be available upon the iPhone’s release,” the suit reads.

  • “This drove unprecedented excitement in the market, even for Apple, as the company knew it would, and as part of Apple’s ongoing effort to convince consumers to upgrade at a premium price and to distinguish itself from competitors deemed to be winning the AI-arms race.”
  • “Contrary to Defendant’s claims of advanced AI capabilities, the Products offered a significantly limited or entirely absent version of Apple Intelligence, misleading consumers about its actual utility and performance. Worse yet, Defendant promoted its Products based on these overstated AI capabilities, leading consumers to believe they were purchasing a device with features that did not exist or were materially misrepresented.”

Now I am not a lawyer, but I think that this has merit. Apple did hype Apple Intelligence massively and they did tie it into product launches. So I can see how someone might be a bit ticked off if they bought a new iPhone and some of the key features of Apple Intelligence were not there or didn’t work the way one would have been led to believe. Thus I think Apple might have a problem here that their team of lawyers might have difficulty swatting away. The usual this hasn’t been tested in court applies here. But I suspect Apple is going to focus their efforts in terms of settling this out of court as fast as they possibly can.

218 Repos Exposed in GitHub Action Supply Chain Attack

Posted in Commentary with tags on March 21, 2025 by itnerd

Endor Labs has a story on a GitHub based supply chain attack that’s worth reading. Though only 218 repositories out of the 23,000 exposed secrets in the supply chain attack on the GitHub Action tj-actions/changed-files, the impact is still significant as some repositories are very popular and could be used in new supply chain attacks. Details below:

https://www.endorlabs.com/learn/blast-radius-of-the-tj-actions-changed-files-supply-chain-attack

Jim Routh, Chief Trust Officer at Saviynt, commented:

“This information represents excellent work by the writer, Henrik Plate from Endor Labs to demonstrate how threat actors use compromised credentials to access the software supply chain. Although the scope and impact, in this case, are not widespread, the threat actor tactics are useful to understand, due to the exploitation of non-human and human account credentials. This represents another reminder for enterprises to invest in more robust privilege access management capabilities (including continuous validation) applied to those with access to the software supply chain for the enterprise.” 

Any organization that uses GitHub should read this report by Endor Labs as it provides a whole lot of insight of how threat actors can execute an attack like this. Thus giving you more insight in terms of how to stop them.

Samsung Galaxy S25 Ultra ranked #1 by Consumer Reports and gets rave reviews elsewhere

Posted in Commentary with tags on March 21, 2025 by itnerd

Samsung’s newest Galaxy S25 Ultra is the #1 smartphone of 2025 with recognition across global markets including the US, EU, Denmark and the UK. With its powerful AI features, exceptional camera system, and flagship performance, the S25 Ultra stands out as the smartphone to beat in 2025.  

More specifically, Samsung’s Galaxy S25 Ultra earned the highest score of 5 in most of Consumer Reports’ 10 evaluation categories, including performance, rear camera image quality, display, durability, and ease of use.   

What’s driving this global recognition? The Samsung Galaxy S25 Ultra earned praise for its best-in-class camera system and Galaxy AI capabilities with One UI 7Apart from the Galaxy S25 Ultra’s recognition on the US Consumer Reports ranking, it has also been highlighted as the top smartphone in evaluations across five European countries (Italy, Spain, Belgium, Portugal, and Sweden), and by consumer magazines the UK’s Which? and Denmark’s Taenk. 

You can read the details here.

Ransomware Gang Cloak Claims To Have Pwned VA Attorney General

Posted in Commentary with tags on March 20, 2025 by itnerd

Ransomware gang Cloak today claimed responsibility for a February 2025 cyber attack on the Attorney General of Virginia that prompted officials to shut down computer systems including email, VPN, internet access, and the AG’s website.

In a blog post reporting this news, Paul Bischoff, Consumer Privacy Advocate at Comparitech, wrote: 

“Cloak is a ransomware group that first started claiming its cyberattacks in August 2023. Its malware both steals data and locks down computer systems, forcing victims to pay a ransom or face extended downtime, data loss, and putting data subjects at increased risk of fraud.”

“Since it began, Cloak has claimed 13 confirmed ransomware attacks and 54 unconfirmed attacks that weren’t acknowledged by the targeted organizations. This attack on the Virginia attorney general is Cloak’s first confirmed attack in 2025. Ransomware attacks on US government agencies and departments can both steal data and lock down computer systems. The attacker then demands a ransom to delete the stolen data and in exchange for a key to recover infected systems. If the target doesn’t pay, it could take weeks or even months to restore systems, and people whose data was stolen are put at greater risk of fraud. Ransomware can disrupt everything from communications to billing, payroll, access to data and applications, and online services.”

“Comparitech researchers have logged 10 confirmed ransomware attacks on US government agencies in 2025 so far. Earlier this week, we confirmed Qilin’s attack on the Cleveland Municipal Court, which is still facing service disruptions three weeks later.”

Additionally, Comparitech recently released two studies looking into the impacts of ransomware attacks against US and worldwide government organizations.  Those are worth a read.

New KnowBe4 Report Reveals Spike in Ransomware Payloads and AI-Powered Polymorphic Phishing Campaigns

Posted in Commentary with tags on March 20, 2025 by itnerd

Today, KnowBe4 published its Phishing Threat Trend Report, Vol 5 which details threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025.

The report highlights the growing threat of ransomware and explores how cybercriminals are using sophisticated tactics to bypass native security and secure email gateways (SEGs).

It also examines how AI is being leveraged to create polymorphic phishing campaigns, how attackers are infiltrating the hiring process to access systems and data, and the increasing success of attacks evading traditional defenses.

Key Findings From the Report:

  • Between September 15, 2024 and February 14, 2025 there was a 17.3% increase in phishing emails compared to the previous six months.
  • 82.6% of all phishing emails analyzed exhibited some use of AI.
  • The report observes a 22.6% increase in ransomware payloads.
  • The phishing hyperlink, malware, and social engineering payloads getting through traditional detection have surged, with phishing hyperlinks increasing by 36.8%, malware by 20%, and social engineering tactics by 14.2% compared to the previous six months.
  • Additionally, there has been a 57.9% increase in attacks being sent from compromised accounts getting through traditional detection.
  • The top five legitimate platforms used to send phishing emails include DocuSign, Paypal, Microsoft, Google Drive, and Salesforce.
  • Currently the most impersonated brands include Microsoft, Docusign, Adobe, Paypal, and LinkedIn. 

For full details, see below release. The Phishing Threat Trends Report, Vol 5 is available for download here