Over 110,000 iOS apps expose user data research finds

Posted in Commentary with tags on March 12, 2025 by itnerd

Apple’s App Store is considered the gold standard for security, but Cybernews researchers analyzed 156,080 randomly selected iOS apps – around 8% of the apps present on the App Store – and uncovered a massive oversight: 71% of them expose sensitive data, including API keys, cloud storage credentials, and financial information.

The security of iOS apps remains under-researched, and this is the first research of this kind at scale. 

Key findings of this research:

  • Over 816,000 secrets were found, with an average of 5.23 exposed secrets per app.
  • Out of 94,240 storage bucket instances found hardcoded in iOS applications (with some apps containing multiple storage bucket endpoints), 836 of these endpoints (0.89%) were accessible without authentication, exposing 406TB of user files, personal data, and documents.
    • If you were to stream HD video, 406TB would allow you to watch for approximately 17 years of non-stop HD content.
  • 2,218 Firebase instances (4.34%) had misconfigured authentication, leaking 19.8 million records (33GB of data), including user session tokens and backend analytics, almost all of these instances hosted in the US.
    • This is the equivalent of 16 million photos from an iPhone.
  • More than 51,000 apps misuse Google’s Firebase database, making user data vulnerable to easy theft.
    • That’s more than the number of Starbucks locations worldwide – each one representing an app where sensitive data is at risk.

Potential consequences: 

  • Mass-scale exploitation: attackers can rapidly scan millions of apps, compromising multiple companies – including major multinationals with billions of users – in a short time.
  • User tracking and service manipulation – thousands of leaked security keys could allow hackers to track users, alter app functionality, or disrupt services.
  • Financial and data theft: some leaks are severe enough to let attackers make unauthorized payments, issue refunds, or access private messages.

Methodology

The researchers analyzed iOS app versions available from October 2-16, 2024 using OSINT and Reverse Engineering techniques. Without de-obfuscating or decompiling, researchers found a massive number of plaintext secrets stored in IPA archives. They also examined cloud bucket and Firebase endpoints for authentication gaps. The research was conducted between July 2024 – January 2025.

What are hardcoded secrets? 

They are sensitive pieces of information – like passwords, API keys, or encryption keys – that are embedded directly into an app’s code instead of being stored securely. This makes them easy for hackers to find and exploit, potentially leading to data breaches, unauthorized access, and financial fraud.

Why this matters:

  • Consumer impact – this affects everyday iPhone users who trust Apple to keep their data safe.
  • Corporate accountability – Apple’s reputation is built on security – how did this massive oversight happen?
  • National security risks – with a lot of the exposed data hosted in the US, the implications go beyond individual users to businesses and even government entities.

Please find the full Cybernews research article here

Lazarus Strikes npm Again With New Wave of Malicious Packages

Posted in Commentary with tags on March 12, 2025 by itnerd

Researchers have discovered North Korea’s Lazarus Group once again infiltrating the npm ecosystem. This time Lazarus is deploying six new malicious packages, which have been downloaded 330 times. The packages are designed to compromise developer environments, steal credentials, extract cryptocurrency data, and deploy a backdoor.

You can go into the weeds by reading this: https://socket.dev/blog/lazarus-strikes-npm-again-with-a-new-wave-of-malicious-packages

Ensar Seker, CSO at cybersecurity company SOCRadar had this comment:

“This attack follows their well-documented pattern of targeting developers and software supply chains to infiltrate organizations. Lazarus has previously compromised trading platforms, financial institutions, and software repositories to distribute backdoors and credential stealers. Malicious npm packages are a particularly effective attack vector because developers often trust open-source repositories without thorough scrutiny. Attackers are embedding malicious code in dependencies, ensuring the malware spreads every time an unsuspecting developer installs or updates the package.

The fact that these packages are designed to steal cryptocurrency-related data aligns with North Korea’s state-backed cybercrime objectives, which involve financial theft to fund regime activities. Lazarus has a long history of targeting crypto wallets, exchanges, and fintech companies. Once installed, these backdoored packages could give Lazarus access to developer credentials, SSH keys, and cloud access tokens, allowing lateral movement across entire organizations, not just individual victims.

Attackers will shift further upstream, embedding malware in popular CI/CD tools, container images, and code repositories, making it harder to detect. They use AI to automate malicious package creation, obfuscate payloads, and dynamically evade detection in package repositories.

They may also poison internal package registries or execute dependency confusion attacks, where private company packages are mimicked in public repositories. Security teams will be forced to adopt stricter SBOM (Software Bill of Materials) practices, conduct routine package audits, and limit dependencies to trusted sources.”

Security teams need to work with developers to cut off this method of entry for groups like Lazarus. Otherwise, you’ll start to see that it will be difficult if not impossible to stop threat actors from going wild so to speak.

UPDATE: Jim Routh, Chief Trust Officer at cybersecurity company Saviynt, commented:

“Sophisticated threat actors are pivoting from 0-day vulnerability exploitation to the harvest of log-in credentials monetized in various ways through various criminal organizations as a method for increasing persistence.

The discovery of the six malicious packages uncovered by the Socket Research team confirms this shift in tactics. The discovery of similar evidence found on GitHub and PyPi reinforces the business case for enterprises to increase their commitment to:

  1. Improve authentication, moving away from OTP and toward passwordless options readily available today
  2. Recognize that Identity Security is a great deal more today than provisioning and deprovisioning. It is an opportunity to use account activity data to both establish risk profiles for all users (internal and external) and to enable triggers from pattern deviation applied directly to automated workflow representing risk management and remediation without depending on humans
  3. Increase investment in privilege user management (PAM) adding behavioral data to continuously verify privilege users by their patterns and revoking privilege based on pattern deviation that meets a threshold
  4. Revoke all user entitlements not used within 90 days to shrink the attack surface and lower operating costs
  5. Harvest identity security intelligence to recognize bad actor behaviors (internal and external) and initiate automated risk management workflow
  6. Give your cloud service providers your enterprise requirements for authentication rather than accepting what they determine to be the norm”

ServiceNow Yokohama release empowers businesses to navigate complexity withenhanced automation, stronger governance, and seamless workflow intelligence

Posted in Commentary with tags on March 12, 2025 by itnerd

ServiceNow today unveiled the Yokohama platform release, advancing automation, governance, and workflow intelligence to help businesses navigate operational complexity.

With this release, organizations can accelerate application development, improve workflow performance, and enhance customer experiences—all while maintaining the highest standards of governance and security. From ServiceNow Studio, which provides a unified workspace for rapid application development and governance, to enhanced self service portals which enable customers to conveniently configure and place orders, these innovations simplify complexity and drive efficiency. Service Observability also ensures business resilience through AI-driven insights so organizations can meet the growing demand for enterprise-wide visibility—all within a single, secure platform.

The 2024 Gartner® Digital Worker Survey found that over 60% of digital workers are streamlining work with basic automation and using analytics to build customized dashboards to support business decisions. With the Yokohama release, ServiceNow is reducing complexity and inefficiencies so businesses can strengthen decision making, improve experiences, and accelerate productivity.

From no-code to AI agents, ServiceNow Studio simplifies enterprise automation

Speed and scale define modern business—but fragmented tools slow innovation, and siloed solutions lead to governance issues and workflow inconsistencies. The opportunity comes from building AI-powered, enterprise-grade solutions that connect teams, automate workflows, and
ensure security by design.

ServiceNow Studio is a unified, AI-powered environment that revolutionizes development on the ServiceNow Platform for no-code, low-code, and pro-code developers. With built-in support from Now Assist, ServiceNow Studio accelerates application development with intuitive, easy-to use tools that enhance collaboration and streamline automation. Developers can work seamlessly across projects by managing all metadata in one place with cross-scope editing and confidently deploy changes with developer-friendly update set management.

Expanding on ServiceNow’s AI Agent innovations, it integrates with AI Agent Studio, enabling developers to design both apps and AI agents in one experience. Together, these capabilities automate reviews, approvals, and application changes all enabled by the seamless data integration of ServiceNow Workflow Data Fabric for fully governed, enterprise-wide data connectivity. By centralizing tools, best practices, and AI-driven workflows, ServiceNow Studio empowers businesses to scale automation, collaborate more effectively, and turn innovation into real
impact.

Additionally, new GenAI-powered skills further help developers automate work to accelerate testing, optimization, and deployment. RPA bot generation allows companies to use natural language to create bots, democratizing development; app summarization adds AI-generated summaries to app descriptions to check for duplicate apps and evaluate for deployment; and Automated Test Framework (ATF) generation simplifies application testing with automated testing scenarios that improve quality, reliability, and performance. By continuing to release new skills that deeply embed AI directly into the development process, ServiceNow enables teams to build, test, and optimize applications with speed and intelligence.

Make sales cycles seamless with smarter ordering solutions

Traditional CRM systems have failed to deliver the flexibility and efficiency businesses need to drive real-time, seamless end-to-end experiences that meet modern customer expectations. Sales and support teams spend excessive time manually processing orders, responding to repetitive inquiries, and tracking customer issues—often leading to delays and dissatisfied customers.

ServiceNow Sales and Order Management (SOM) is addressing this challenge. Built on ServiceNow’s AI Platform, SOM unifies the ability to configure, price, and quote with order management and fulfillment to accelerate sales cycles, streamline operations, and deliver seamless, proactive service.

Self service commerce portals make it even easier for companies to drive revenue by allowing customers to configure products, place orders, and track status instantly and at any time— without the need to engage sales or support teams at every step. By reducing friction in the purchasing process, businesses can decrease order abandonment, increase transaction volume, and capture revenue faster. With sales, fulfillment, and support functionality on a single platform, businesses can deliver exceptional, connected experiences while freeing up teams to focus on customer relationships.

Enhancing service operations with intelligent observability

Service Observability, part of ServiceNow IT Operation Management (ITOM), gives organizations a single solution to manage and act on insights across their entire observability ecosystem. Many enterprises rely on dozens of monitoring and observability tools, creating complexity and blind spots. Service Observability brings together information from any source, using AI-driven insights to pinpoint root causes faster, quantify business impact, and resolve issues before they escalate.

With Service Observability, IT teams get a unified, AI-powered hub that integrates seamlessly with their existing solutions. AI-driven automated workflows allow organizations to reduce downtime, eliminate guesswork, and align service operations with business outcomes. Service Observability delivers real-time intelligence that helps organizations move from reactive troubleshooting to proactive problem-solving.

A platform that redefines work

With the Yokohama release, ServiceNow reinforces its leadership as the AI platform for business transformation—delivering scalable and intelligent automation and workflows that drive real business impact. By equipping businesses with tools to accelerate development, enhance observability, and streamline sales and order management, ServiceNow continues to lead in helping enterprises boost productivity and drive operational efficiency.

These innovations—along with ServiceNow’s additional advancements in agentic AI announced today as part of the Yokohama release—help organizations achieve greater resilience in an increasingly dynamic world.

All features announced today are generally available and can be found in the
ServiceNow Store.

ServiceNow’s latest platform release adds to thousands of AI agents across CRM, HR, IT, and more for faster, smarter workflows and maximum business impact

Posted in Commentary with tags on March 12, 2025 by itnerd

ServiceNow today announced the Yokohama platform release, unleashing new AI agents across CRM, HR, IT, and more, for faster, smarter workflows and maximum, end-to-end business impact. These latest innovations include teams of preconfigured AI agents that deliver productivity and predictable outcomes from day one, on a single platform, as well as capabilities to build, onboard, and manage the entire AI agent lifecycle. Because data fuels AI, the company also announced expansion of its Knowledge Graph with advancements to its Common Service Data Model (CSDM) to break down barriers among data sources for more connected AI agents.

According to Gartner®, “By 2028, 40% of CIOs will demand “Guardian Agents” be available to autonomously track, oversee, or contain the results of AI agent actions,” underscoring the growing need for a coordinated, enterprise-wide approach to AI deployment and management. As businesses race to unlock the full potential of agentic AI, ServiceNow serves as the AI agent control tower for enterprises, with solutions that eliminate common roadblocks like data fragmentation, governance gaps, and real-time performance challenges. Unlike other AI providers that operate in silos or require complex integrations, ServiceNow AI Agents are built on a single, enterprise-wide platform, helping ensure seamless data connectivity with Workflow Data Fabric. By providing a single view of all workflows, AI, and automation needs, ServiceNow enables companies to seamlessly coordinate thousands of AI agents across CRM, IT, HR, finance, and more, enabling total enterprise-wide visibility and control.

ServiceNow AI Agents are now available to radically accelerate productivity at scale

Enterprise leaders are moving beyond experimentation, demanding AI solutions that drive real outcomes. ServiceNow’s AI capabilities generate insights that power AI agent reasoning, planning, learning, and orchestration, equipping businesses to more rapidly achieve impactful goals.

New ServiceNow AI Agents are available today and ready to help businesses accelerate productivity, streamline operations, and drive real outcomes for enterprise-wide use cases. For example:

  • Security Operations (SecOps) expert AI agents transform security operations by streamlining the entire incident lifecycle, eliminating repetitive tasks and empowering SecOps teams to focus on quickly stopping real threats.
  • Autonomous change management AI agents act like a seasoned change manager, instantly generating custom implementation, test, and backout plans by analyzing impact, historical data, and similar changes—ensuring seamless execution with minimal risk.
  • Proactive network test & repair AI agents operate as AI-powered troubleshooters that automatically detect, diagnose, and resolve network issues before they impact performance.

Simplify AI agent management for a more streamlined lifecycle

ServiceNow AI Agent Orchestrator and AI Agent Studio are also now generally available with expanded capabilities to govern the complete AI agent lifecycle—from building AI agents, to onboarding and monitoring their performance, to ensuring enterprises realize the value they need. This includes:

  • Enhanced onboarding capabilities through AI Agent Studio to streamline the setup process with guided instructions, making it easier than ever to design and configure new AI agents using natural language descriptions.
  • Expanded performance management capabilities within ServiceNow’s overall agentic AI framework include an analytics dashboard for visualizing AI agent usage, quality, and value. Agentic AI workflows are seamlessly tied to business KPIs so administrators can more easily track AI agent performance and ROI.

Connect, understand, and take action with data solution advancements

At the foundation of the ServiceNow Platform is Workflow Data Fabric, enabling AI-powered workflows that integrate seamlessly with an organization’s data, regardless of the system or source. Workflow Data Fabric enables businesses to gain deeper insights through AI-driven contextualization and decision intelligence while automating manual work and creating process efficiencies.

New in the Yokohama release, ServiceNow continues to expand its Knowledge Graph data capabilities with enhancements to its Common Service Data Model (CSDM). CSDM provides a standardized framework for managing IT and business services that accelerates quick, safe, and compliant technology deployments. By unifying hundreds of technology categories, systems, and processes under one clear model, CSDM empowers organizations to implement and scale technology with confidence. With this latest update, customers gain a unique advantage: the ability to orchestrate seamless hand-offs between both AI and live agents, ensuring work flows effortlessly across teams. Built-in governance and audit-ready data provide transparency and trust, so businesses can continue at the pace of innovation while maintaining compliance.

All features announced today are generally available and can be found in the ServiceNow Store.

Apple Drops Software Updates Today… And Forcibly Turns On Apple Intelligence AGAIN…. WTF?

Posted in Commentary with tags on March 11, 2025 by itnerd

When iOS 18.3 dropped, users who had turned off Apple Intelligence found out very quickly that the software update turned it back on without their permission. At the time I said this:

This is the single dumbest thing that Apple has done in a very long time. I say that because you should be able to opt into things rather than be forced to opt out. And with something like Apple Intelligence which is AI by another name, users shouldn’t be forced into running it if they are not comfortable with the implications of running AI on their devices.

Well, Apple has now done it twice because the company has dropped software updates that fix a security issue that is in the wild, which is good. But at the same time they have once again turned on Apple Intelligence on devices that didn’t have it on.

Like WTF Apple? Can you not respect users and the choices that they make? I guess not because you’ve now done this twice. Are you so desperate to get any sort of adoption of your half baked AI that you’re willing to emulate Microsoft to achieve that goal? How about putting out an AI that people find value in and maybe then people will turn it on. Until you do that, stop trying to turn it on every time you push a software update and prove that you’re better than the behaviour that you’re displaying right now.

KnowBe4 Research Reveals a Confidence Gap in Cybersecurity, Leaving Organizations at Risk

Posted in Commentary with tags on March 11, 2025 by itnerd

KnowBe4 today released new research indicating that while 86% of employees believe they can confidently identify phishing emails, nearly half have fallen for scams. The study, which surveyed professionals across the UK, USA, Germany, France, Netherlands, and South Africa, reveals a growing gap between confidence and competence in identifying cyber threats.

Notably, South Africa leads with both the highest confidence levels and the highest scam victimization rate, suggesting that misplaced confidence can create a false sense of security, leaving employees more susceptible to advanced cyber threats. Beyond training, the report highlights the importance of fostering a transparent security culture. While 56% of employees feel “very comfortable” reporting security concerns, 1 in 10 still hesitate due to fear or uncertainty.

Key findings from the survey include:

●      86% of employees believe they can confidently identify phishing emails.

●      24% have fallen for phishing attacks.

●      12% have been tricked by deepfake scams.

●      68% of South African employees reported falling for scams—the highest victimization rate.

The survey findings emphasize the critical need for personalized, relevant, and adaptive training that caters to employees’ individual needs while considering regional influences and evolving cyber tactics. Organizations that prioritize this approach will not only reduce risk but also cultivate a genuine security-first culture. In the battle against digital deception, the most dangerous mistake employees can make is assuming they are immune.

The survey findings, “Security Approaches Around the Globe: The Confidence Gap,” is available for download here.

Thousands of Health Tech Company Records Exposed Online

Posted in Commentary with tags on March 11, 2025 by itnerd

A significant data exposure involving ESHYFT, a New Jersey-based health tech company, was recently uncovered by cybersecurity researcher Jeremiah Fowler and reported to Website Planet.

What happened:
non-password-protected database containing over 86,000 records totaling 108.8 GB in size was exposed. The records include personally identifiable information (PII) such as scans of identification documents like driver’s licenses and social security cards, salary details, work history and more.

Why it matters:
This exposure presents serious risks, such as identity theft, employment fraud, financial fraud, or targeted phishing campaigns. These risks could impact healthcare professionals as well as the facilities that employ them.

You can find a report on this here: https://www.websiteplanet.com/news/eshyft-report-breach/

Kansas urgent care provider confirms over 220,000 patient’s data swiped in a cyberattack

Posted in Commentary with tags on March 11, 2025 by itnerd

Sunflower Medical Group, a Kansas healthcare provider with multiple urgent care facilities, confirmed a cyberattack on December 15th exposed sensitive information from nearly 221,000 of its patients. 

The company said it initially discovered the breach on January 7, but the investigation revealed that hackers had been inside their systems since mid-December and made copies of Sunflower’s files.

Data potentially impacted includes: 

  • Names
  • Addresses
  • Dates of birth
  • Social Security numbers
  • Driver’s license numbers
  • Medical information
  • Health insurance information

The Rhysida ransomware gang took credit for the attack in January on its dark web leak site with proof of claims, threatening to leak the stolen data if a ransom of about $800,000 was not paid.

When Rhysida leaked the data, they claimed they had 7.6 TB, consisting of 5,277,062 files. A DataBreaches investigation found that entire backups were included, as well as folders with patient data.

Lawrence Pingree, VP, Dispersive:

“Systems and Identities must be segmented properly, to eliminate lateral movement and authentication without multi-factor can leave you vulnerable. Rapid backup and restore is also important to help defend against ransomware.”

While the number isn’t huge by 2025 standards, this is still very bad. And it will get worse for those affected as the data that was swiped will undoubtably be used in secondary attacks. Which means that this will have knock on effects for a long time to come.

Backblaze Selects Cologix to Expand Delivery of High-Performance Cloud Storage Solutions

Posted in Commentary with tags on March 11, 2025 by itnerd

Cologix today announced Backblaze, a publicly traded cloud storage company, has deployed its services at Cologix’s TOR3 digital edge data center in Toronto. This deployment features a high-capacity setup with dedicated power and a direct fiber connection to Cologix’s TOR1 digital edge data center, Canada’s largest carrier hotel, providing fast access to multiple network providers and TorIX.

Backblaze’s expansion into TOR3 marks a significant step in ensuring data sovereignty compliance for businesses operating in Canada. This collaboration allows Backblaze to offer cloud storage solutions that meet strict local regulations, enabling companies to store and process data within Canadian borders.

The move aligns with the rapidly expanding Canadian cloud services market, which is driven by industries such as healthcare, finance and government that often require data to remain within national borders. Backblaze’s presence in TOR3 demonstrates its commitment to supporting businesses in their digital transformation efforts while ensuring adherence to Canadian data sovereignty requirements.

Strategically located in downtown Toronto, TOR3 is a 20,000-square-foot, Tier III facility with two megawatts of power. TOR3 is a highly secure and efficient colocation and interconnection hub that features industry leading cooling designs, robust 24/7 security with biometric dual authentication access, and compliance with SOC 1, SOC 2, HIPAA and PCI-DSS as well as ISO 27001 certification by Schellman. It also provides diverse, high-capacity connectivity to 160+ networks and 50+ cloud providers.

Over the past decade, Cologix has significantly expanded its Canadian operations, extending its leadership in the country’s data center market. The company now operates a portfolio of 22 data centers across Montréal, Toronto and Vancouver, providing 1,057,000 square feet of space and 94MW of power. Cologix also has a robust Canadian interconnection ecosystem of 350 networks, 200+ cloud providers, 15 public cloud onramps and three internet exchanges. Currently, Cologix is the leading provider of public cloud onramps in Canada, including Amazon Web Services® Direct Connect, Google Cloud Interconnect, IBM Cloud, Microsoft® Azure ExpressRoute and Oracle FastConnect.

Zoho Launches Projects Plus

Posted in Commentary with tags on March 11, 2025 by itnerd

 Zoho Corporation today launched Projects Plus, a flexible, collaborative new platform providing data- and intelligence-driven project management for mid-sized and large organizations. Through native integration of four key Zoho applications—Projects, WorkDrive, Analytics, and Sprints—Projects Plus enables asynchronous collaboration, seamless file management, real-time business intelligence, and Agile or Waterfall workflows.

Building on Zoho Projects, which doubled its revenue growth in 2024 due to migration away from third-party apps, with 55% of new users migrating from Microsoft Projects and JIRA, Projects Plus drives superior value to mid-sized and enterprise organizations by addressing their operational complexity. Projects Plus, now a platform, expands across four key areas: data democratization, AI, hybrid project management, and collaborative work management. While 18% of Enterprise customers deployed both Zoho Projects and Zoho Analytics, Projects Plus directly addresses these advanced needs by consolidating the two, and more, into a singular, efficient solution.

Business Intelligence Leading to Project Democratization

Project management is rapidly evolving with the advent of Data-Driven Project Management (DDPM), shifting from intuition-based decisions to a focus on data and analytics. Projects Plus utilizes this approach, harnessing data across various aspects, such as time tracking, budgeting, task completion, and team and deliverability metrics and transforming them into actionable insights for smarter decision making. This includes:

  • Predictive Analysis: Using historical data to predict risks, estimate timelines, and anticipate resource needs, predictive analysis is essential for forecasting future project outcomes and allows for proactive project planning and risk management.
  • Progress Tracking and Bottleneck Analysis: Traditional project management relied on static tools like Gantt charts to track project progress. With analytics, project managers can now utilize real-time dashboards that provide dynamic and up-to-date insights into project status.
  • Quality Control Analytics: Analytics can be employed to implement robust quality control measures throughout the project lifecycle. By analyzing data related to project deliverables, project managers can ensure that each component meets predefined standards.

Easier, Faster, Stronger Project Management with Zia

Advanced AI/ML capabilities introduced to Projects Plus via Zia, Zoho’s in-house AI engine, automate complex data analyses and provide predictive insights, reshaping the role of project managers into strategic, data-savvy leaders and allowing for:

  • Improved Efficiency and Productivity: By analyzing data on project performance, businesses can identify areas where processes can be streamlined and optimized. For example, data analytics can reveal bottlenecks in the project timeline, take corrective action, and keep the project on track.
  • Smarter Resource Allocation: Determine where resources are being underutilized or overutilized to optimize resource allocation and employ the right people to the right tasks by taking their skills into account.
  • Accurate Forecasting and Planning: Make more accurate predictions about future project outcomes and adjust plans accordingly to avoid delays and cost overruns, leading to more successful projects overall.

Projects Plus integrates easily across Zoho’s extensive software suite as well as third-party software including Microsoft Office 365, Google Workspace, and popular repository management, collaboration, customer service, and analytics tools.

Pricing and Availability

Projects Plus is available for immediate use globally. Projects Plus is priced at Canadian $20 per user per month, 27% lower than combining Projects, Sprints, Workdrive and Analytics a la carte. For regional pricing, go to https://www.zoho.com/projectplus/.