US Supreme Court To Hear Last Ditch Attempt By TikTok To Stay Alive In The US

Posted in Commentary with tags on December 18, 2024 by itnerd

To be honest, I’m not surprised that the US Supreme Court is going to hear an appeal from TikTok to stop it from being banned in the US:

The country’s highest court set oral arguments in the case for Friday, January 10, just nine days ahead of the looming deadline on January 19. 

It comes after Congress passed a law earlier this year banning TikTok unless its Chinese parent company ByteDance sells its stakes by the deadline. 

Lawmakers were responding to warnings that the wildly popular social media app is a national security concern with the collection of Americans’ data. 

But some 170 million Americans use the video app. 

Now the Supreme Court will decide whether the Protecting Americans from Foreign Adversary Controlled Applications Act, which would ban TikTok, violates the First Amendment. 

Both TikTok and the Justice Department were directed to file briefs before 5pm ET on Friday, December 27. 

Will it succeed? Well, I am not a lawyer so I don’t know. But YouTube channel Legal Eagle who is an actual lawyer suggests that Congress has the right to ban TikTok for national security reasons and the courts have tended to steer clear of national security issues in the past. Which is likely why TikTok is going with the First Amendment option as they will argue that a ban violates the free speech of Americans. And there’s the Donald Trump factor. In the past he’s been anti TikTok. But he’s said that he may stop a ban of the social media platform. So who knows where this will go. All I know is that we’re in the endgame now.

2025 Predictions From The CEO Of Peer Software

Posted in Commentary with tags on December 18, 2024 by itnerd

Today we have 2025 Technology Predictions from the CEO of Peer Software, Jimmy Tam, on trends data storage industry.

Rise of Data Orchestration for AI and ML

As more organizations turn to AI for everything from better-informed decision-making and operational efficiency, it’s becoming clear that data needs to be managed more effectively. With data creation becoming ubiquitous, automated data orchestration will gain prominence to aggregate and streamline disparate data sources into AI engines. This will be essential for customizing large language models (LLMs) using methods like Retrieval-Augmented Generation (RAG), tailoring these tools for specific industries or companies.

Transition to Active-Active Data Systems
Traditional backup methods, such as snapshots, are becoming less effective with growing data volumes. Organizations are finding it increasingly challenging to meet recovery time objectives and maintain high availability with these approaches. Active-active systems, which allow simultaneous use and synchronization of data across locations, will emerge as critical not only for reducing recovery times, but also ensuring seamless operations and managing massive datasets.

Focus on Reducing Data Sprawl at the Edge
As distributed workforces and applications continue to grow, companies will increasingly prioritize controlling edge data sprawl. Intelligent systems will relocate unused data from edge locations to centralized or cloud storage, optimizing resource use and minimizing costs.

Continued Adoption of Hybrid Cloud Strategies
Businesses, including major players like Netflix, will increasingly embrace hybrid cloud models. The shift is driven by cost savings, workload optimization, and the need to balance on-premise and cloud environments for better performance and financial efficiency.

Reducing Storage and Power Usage to Meet Environmental Goals

Efforts to minimize storage footprints and power consumption will align with sustainability objectives. Managing data growth, particularly at the edge, will evolve into both a cost-saving strategy and an environmental imperative.

Bureau raises $30M Series B as global fraud losses hit $486B

Posted in Commentary with tags on December 18, 2024 by itnerd

AI isn’t just making fraud smarter – it’s making it nearly impossible to catch. With global losses hitting $486B annually, Bureau today announced $30M in Series B to level the playing field. A leading risk intelligence platform, which has seen its revenue grow 3x since it’s last fundraise, is arming businesses with AI to combat the exponential rise in sophisticated fraud attacks worldwide. 

The round was led by Sorenson Capital with participation from PayPal Ventures and continued support from Commerce Ventures, GMO Venture Partners, Village Global, Quona Capital, and XYZ Ventures. The funding will accelerate Bureau’s product expansion into new use-cases, and geographical expansion to several new markets worldwide to meet a significant surge in global demand. 

Traditionally, compliance, fraud, security, and credit risks have been siloed in companies and served by multiple point solutions in each domain. Bureau’s platform brings together device intelligence, behavioral AI, identity data, and predictive modeling to deliver contextual fraud prevention that goes beyond traditional rule-based systems. The company’s proprietary identity knowledge graph now contains over half a billion identities and behavioral patterns, providing real-time risk intelligence across the entire customer lifecycle.

What typically would require several vendor integrations, multiple data API outputs, and complex rule engines can now be accomplished through one platform. Bureau’s comprehensive capabilities span money mule detection, account takeover prevention, fraud ring detection, onboarding compliance, and decisioning workflows. Unlike other solutions that act as data brokers, Bureau shares decisions rather than consumer data, with tokenized identities built into its privacy architecture.

The platform has proven particularly valuable for banking, fintech, gaming, and e-commerce companies facing sophisticated cyber threats and increasing regulatory pressures. Results demonstrate its impact across use cases – from detecting collusion in gaming platforms through behavioral AI, to preventing synthetic identity fraud in neobanks, to enabling secure lending to new-to-credit customers through improved risk profiling. As a result, Bureau has earned recognition as a top global leader in preventing fraud by Liminal. 

The funding will support two key expansion initiatives: enhanced data and AI capabilities to improve decision efficiency and coverage, and geographical expansion to serve more markets globally. Bureau’s current focus has been on Asia, and this round will fuel its expansion to additional regions, enabling more businesses worldwide to access its comprehensive fraud prevention capabilities.

You May Not Want To Buy That TP-Link Router For Christmas As It May Be Banned As A National Security Risk

Posted in Commentary with tags on December 18, 2024 by itnerd

If you want to buy a TP-Link router, or you own one, you might want to pay attention to the fact that three US Government agencies are investigating TP-Link at the moment:

U.S. authorities are considering a ban on China’s TP-Link Technology Co over potential national security concerns after its home internet routers were linked to cyberattacks, the Wall Street Journal reported on Wednesday, citing people familiar with the matter.

In August two U.S. lawmakers urged the Biden administration to probe the Chinese router-manufacturer and its affiliates over fears their Wifi routers could be used in cyber attacks against the U.S., according to a letter seen by Reuters.

The Commerce, Defense, and Justice departments have opened separate probes into the company, with authorities targetting a ban on the sale of TP-Link routers in the U.S. as early as next year, the report said.

An office of the Commerce Department has even subpoenaed the company while the Defense Department launched its investigation into Chinese-manufactured routers earlier this year, the newspaper reported, citing people familiar with the matter.

Last year, the U.S. Cybersecurity and Infrastructure Agency said TP-Link routers had a vulnerability that could be exploited to execute remote code.

Now TP-Link is highly competitive in the home router market via their aggressive pricing relative to companies like ASUS, Netgear, and others. And ISP’s have been supplying TP-Link gear to their customers for some time now. For example, when I switched from Bell to Distributel, I got a TP-Link router. I didn’t use it though which now looks like it may have been a good decision on my part. But one thing that might be driving this is the fact that TP-Link’s routers have been the target of botnets like this one for some time. And there have always been rumours in security circles that these routers have unpatched vulnerabilities that can come back to bite users of these routers at some point. Thus if you were thinking of buying a TP-Link router, you might want to hold off doing so until you see how this plays out. And if you own one, you may want to consider switching to another brand if this ban actually happens.

Finally, some advice for TP-Link, you may want to come out with a statement that is evidence backed which describes in detail why your gear isn’t a threat and what you’re going to do to improve your security posture. And then commit to throwing the metaphorical doors open so that the world can see you taking action. And you should do that ASAP. As in today.

This TELUS Email Scam Is Interesting… Let Me Tell You Why

Posted in Commentary with tags , on December 18, 2024 by itnerd

Last night I was watching an episode of Terhan on Apple TV+ which is my favourite show on that streaming platform when I got this email on my iPhone:

Now I did my usual check whether this was real or not by checking the email address. And based on this, this email appeared to be real:

I also checked the headers and that confirmed that this was real. And the links in the email went to TELUS as well as evidenced by this example:

So this email meant that someone was trying to log into my TELUS account. That was interesting as I haven’t been a customer with TELUS for almost a year as I moved my cell phone service to Freedom Mobile to cut my telco costs about this time last year. And there should be no billing information stored by TELUS as I always paid my TELUS bill using my credit card the second the bill arrived. I confirmed that by logging into my TELUS account via going directly to the web page and not clicking on any of the links in the email. I did that because even though the email appeared to be real, it could have been an extremely good fake that was fooling me. Another thing to note is that TELUS uses two factor authentication for their accounts which is a good thing as it makes it far less likely that a threat actor could break into your account. Combine that with the fact that I had a very strong password that I would have changed if I could as I could find no way to change my password either via the TELUS website or mobile app, I decided to make this a tomorrow problem.

I woke up this morning and I found this in my junk email:

This is your classic phishing email. As evidenced by the fact that TELUS didn’t send this email:

And the “Pay The Bill” which by the way is language that a major company like TELUS would never use in a customer facing email has a link that isn’t going to TELUS:

Thus I have to wonder if the events of last night are somehow connected to this phishing email? I say that because it seems coincidental that both events would happen within hours of each other. I cannot say for sure, and to add to that I wasn’t able to further investigate this phishing scam as it looks like the web page was taken down. But what is clear is that TELUS customers are being targeted by a threat actor. And it is possible that this threat actor is more sophisticated than the usual phishing email scammers that are out there. Thus you need to stay on your toes to avoid being scammed.

CISA Issues Binding Operational Directive To Increase The Security Of Cloud Services

Posted in Commentary with tags on December 18, 2024 by itnerd

The CISA has recently put out a Binding Operational Directive on Implementing Secure Practices for Cloud Services:

Malicious threat actors have increasingly targeted cloud environments and evolved tactics to gain initial cloud access. In recent cybersecurity incidents, the improper configuration of security controls in cloud environments introduced substantial risk and resulted in actual compromises. To combat these threats, the Cybersecurity and Infrastructure Security Agency (CISA) initiated the Secure Cloud Business Applications (SCuBA) project. Through the SCuBA project, CISA developed Secure Configuration Baselines, providing consistent and manageable cloud security configurations and assessment tools, allowing agencies and CISA to improve security for Federal Civilian Executive Branch (FCEB) assets hosted in cloud environments. This Directive requires agencies to implement a set of SCuBA Secure Configuration Baselines for certain Software as a Service (SaaS) products widely used in the FCEB, deploy CISA developed automated configuration assessment tools to measure against the required baselines, integrate with CISA’s continuous monitoring infrastructure, and remediate deviations from the secure configuration baselines. These steps reduce risks highlighted by recent adversary activity and increase resiliency for FCEB agencies against cyber threats. 

Jim Routh, Chief Trust Officer, Saviynt had this comment:

“IT Hygiene is a way of describing an enterprise’s capabilities to identify IT assets, manage the configuration of those assets, apply vulnerability management to those assets and to update those assets when necessary. The new Directive from CISA is requiring federal agencies to improve their IT Hygiene for cloud hosted services supporting their needs. The configuration management requirements in cloud computing are different from IT assets hosted in proprietary data centers. Federal agencies with legacy infrastructure (non-cloud) must apply a different way to manage the configuration of cloud hosted IT assets that includes discovery, asset inventory management, configuration management and vulnerability management.”

Paul Zolfaghari, President, Saviynt follow up with this:

“As we navigate an increasingly complex cyber landscape, the issuance of Binding Operational Directive 25-01 by the Cybersecurity and Infrastructure Security Agency (CISA) represents a pivotal advance in cloud security. This directive underscores our collective commitment to not only securing our nation’s digital infrastructure but also setting a benchmark for future cloud security measures. By mandating secure configuration baselines and integrating continuous monitoring, CISA is leading the charge in fortifying our federal networks against sophisticated cyber threats. This proactive approach is essential in ensuring the resilience and security of our cloud environments, and we are proud to support these vital initiatives.”

The CISA really has a great grasp as to what it needs to do to ensure that government does not become a target for threat actors. Private industry needs to copy what they are doing as they are really on the ball.

 UPDATE: Chris Botelho, Sr. Solutions Engineer, LimaCharlie adds this:

“The directive forces these agencies to modernize their security controls in order to better protect against malicious actors and software. Given the increase in activity of both nation-state actors and ransomware groups targeting third-parties that contract with the federal government rather than the federal government itself, it has become even more important to not only ensure federal systems are protected, but also the organizations that the federal government contracts with in order to protect data and prevent large-scale incidents. Malicious actors will always go for the weakest link in the chain, which currently are the SMBs that frequently don’t have the knowledge, time, expertise, or budget for implementing recommended security controls.

“Most of the controls being required by the directive are part of Microsoft’s own best practices and should already in place. The controls and scanner are provided for free from CISA, so they can be implemented without any licensing costs. If an organization is using an enterprise M356 license, then they will likely have all the required controls available to them. However, organizations using F3 licenses or purchasing their M365 subscriptions through a third-party provider will likely need to upgrade their licenses or purchase additional licenses to gain access to the security controls required by the directive, such as Microsoft Purview. There will also be a time cost to implement the controls and update internal policies such as password management policies to reflect the new control requirements.

“Controls required by federal agencies frequently influence the controls implemented by private businesses both directly, through direct implementation of the controls based on the agency’s requirements, but also indirectly through regulatory bodies such as HITRUST and PCI-DSS that adopt the federal agency’s requirements as part of their own requirements. Additionally, by adopting federal controls, the effort required by leadership to create their own security controls is reduced while providing a tested and vetted method for ensuring the controls are implemented and can be easily tested through readily-available tools such as CISA’s SCuBA, without additional cost.

“The biggest challenge will be changing the user and management mindset for many of the historical security controls that no longer apply or work in today’s computing environments as well as the cost that would be involved if a business’s current license(s) don’t include the controls prescribed by the mandate. This could be something such as MFA, which may not be included in a business’s current service license and historically is seen by many as an unnecessary extra step, but significantly increases the authentication security of a business. Additionally, there may be regulations in place that a business has to follow that are in conflict with the CISA directive. For example, the new controls require that passwords are set to never expire. Historically, the industry standard was to change passwords every 60-90 days. However, research has shown that this actually decreases password security, but many organizations still do this because it has been the practice for decades and regulations such as PCI-DSS still require it.”

Hammerspace and Cachengo Partner 

Posted in Commentary with tags on December 18, 2024 by itnerd

 Hammerspace, the company orchestrating the next data cycle, today announced a partnership with Cachengo, the decentralized cloud company, to provide a joint energy-efficient solution for capturing and processing data, coupled with hybrid cloud (data) storage and orchestration for AI at the edge. 

Cachengo’s peer-to-peer encrypted and trusted business model called Rent-a-Node  decentralizes and democratizes AI, compute and storage – offering an economically compelling alternative to the public cloud by allowing brick-and-mortar businesses to become the Infrastructure-as-a-Service providers to other clouds, thus allowing content to be distributed very close to the end-users.

With its unique peer-to-peer network architecture, Cachengo connects thousands of Symbiotes (compute and storage nodes) on-demand, enabling massive scalability and enhanced data security without any form of egress fees for data at a fraction of the price of other traditional cloud services. 

Cachengo platforms are optimized as both servers and storage systems, enabling them to leverage the Hammerspace Tier 0 capability, utilizing their Bento and Pizza products for internal storage as part of Hammerspace’s Global Data Platform for high performance, lower cost and greater power efficiency. The combination of Hammerspace data orchestration and Cachengo’s Rent-a-Node is pioneering AI at the edge.

Learn More

Phreesia ConnectOnCall Breach Exposes Medications SSNs of 900K Patients

Posted in Commentary with tags on December 17, 2024 by itnerd

After-hours Telehealth platform ConnectOnCall started notifying 914,138 patients that their personal and health data was exposed in a May breach. The company’s Notice of Security Incident notes: “On May 12, 2024, ConnectOnCall learned of an issue impacting ConnectOnCall and immediately began an investigation and took steps to secure the product and ensure the overall security of its environment.”

Social security numbers, diagnoses and medications are among patient data potentially compromised. ConnectOnCall is a subsidiary of Phreesia, a patient intake software as a service provider. Based on the investigation, there is no evidence that Phreesia’s other services have been affected. In response, Dispersive cybersecurity expert Lawrence Pingree (formerly with Gartner) offers perspective.

Lawrence Pingree, VP, Dispersive had this comment:

“This breach looks like it’s application security related, likely a breach of the application via SQL injection or credential theft exposure, but since no details of the breach are available, it’s hard to say. In any case, isolating critical systems and applications with the best possible multi-factor authentication and protecting applications through micro-segmentation are key approaches to isolate the breadth of breach.”

This is yet another example of health care being the target of a cyberattack. This was an ongoing theme in 2024, and it is likely going to be an ongoing theme in 2025 unfortunately.

TEMU was Canada’s most downloaded iPhone application in 2024

Posted in Commentary with tags on December 17, 2024 by itnerd

Temu has been the Top downloaded iPhone app in Canada for 2024, according to App Store data just released by Apple. Temu is also the only e-commerce app in the top 15 free apps in the Apple rankings.

Launched in Canada in February 2023Temu empowered qualified sellers to manage their logistics and ship products directly from local warehouses in Canada. This initiative expanded our product range and significantly reduced delivery times for local customers. Canadian consumers can now enjoy the convenience of receiving their Temu orders in as little as one business day.

Globally, Temu is ranked #1 in Canada, as well as 23 other markets out of the 30+ countries and regions with an official ranking released by Apple such as the U.S., UK, Germany, and South Korea. In the US, Temu has maintained its #1 position for two consecutive years (2023 and 2024).

Temu launched in the U.S. in 2022 and has since expanded to serve consumers in over 80 markets across the Americas, Europe, the Middle East, Africa, Asia, and Oceania. Through its direct-from-factory model, Temu connects consumers directly with manufacturers, minimizing the number of intermediaries and associated costs. These savings are passed directly to customers through competitive pricing.

Data Dog Does A Deep Dive Into A WordPress Supply Chain Attack

Posted in Commentary with tags on December 17, 2024 by itnerd

Since I am a WordPress user, any security news related to WordPress tends to catch my attention. The this research by Data Dog certainly did. In short A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials. This campaign is huge and has been going on for years. Thus it is far from trivial. Full details in terms of how this campaign worked are in the research that I linked to. But if you want the TL:DR, Matt Bromiley, Lead Solution Engineer at LimaCharlie can help you with that:

“This attack utilized two initial access mechanisms. These techniques are the methods by which adversaries attempt to infect victim users. The two mechanisms were:

  • Spearphishing – This mechanism targeted academics. The phishing emails were crafted to look like kernel upgrade notifications, providing a link to run malicious code.
  • Trojanized GitHub Repositories – This mechanism mimicked GitHub repositories of legitimate proof-of-concept (PoC) exploits for known CVEs. However, the PoC code was changed to utilize malicious libraries, subsequently infecting the systems of victims who ran the copied repositories.

The term same second-stage payload indicates that regardless of phishing or malicious PoC code, the secondary payload dropped onto the victim systems was the same. Essentially, this means that the attackers had two delivery mechanisms – and targeted victims – to deliver the same payload, which was a backdoor that exfiltrated systems details and credentials, amongst other information.

The report indicated 49 malicious repositories masquerading as legitimate PoC code. They were strategically named to appear legitimate, as not to tip off adversaries. It is not irregular to see these types of numbers, as replicating a code repository with malicious code is trivial.

This is classified as a supply chain attack due to the exploit of libraries or tools utilized in code. In this case, the victims did not executed inherently malicious code. Instead, they executed code that incorporated a malicious package. Thus, analysis of the initial code would not warrant suspicion. It would require that users analyze the imported libraries in order to identify the malicious backdoor.”

This attack is very crafty which is why it has been so successful. It shows that defenders need to alter how they defend so that the next attack that uses methods like these aren’t nearly as successful.