Salesforce Enhances Team Productivity With New Slack Innovations

Posted in Commentary with tags on September 16, 2024 by itnerd

To answer the need for a better, more efficient way for teams to work together, Slack is releasing new AI enhancements set to improve team collaboration and data integration.

These enhancements follow a recent report from Salesforce which highlighted that Slack AI integrations saved50,000 hours of work in just one quarter. With the innovations announced today, customers can centralize everything they need to get work done more efficiently.

Key innovations include:

  • Agentforce in Slack: With a new user interface (UI) for agents, teams can now talk to their data, surface insights, and take action on tasks in Slack with Salesforce’s Agentforce Agents.
  • Third-party AI agents: AI agents and assistants from partners like Adobe, Anthropic, Cohere, Perplexity, and more can be deployed in the same trusted, secure environment in Slack.
  • Salesforce channels: A new type of channel that connects Salesforce CRM records to channel-based conversations in Slack gives teams a comprehensive space to collaborate on every account and opportunity, increasing alignment to move work forward. Coming soon, Salesforce channels will be embedded in the Salesforce user interface.

New enhancements in Slack also include purpose-built AI functionality across search and automation as well as new solutions-based templates to unlock productivity for every use case and line of business. 

  • New Slack AI features: Enhanced capabilities like huddle notes, simplified automation, and improved search allow teams to work smarter, faster, and with greater focus.
  • Slack templates: Collections of ready-to-use templated channels, canvaseslists, and automated workflows make work in any department and for any task faster and more productive.
  • AI Workflow BuilderGenerates workflows with simple conversational prompts so users can easily automate their tasks.

Availability: 

  • Third-party agents are available now in the Slack Marketplace, with more coming soon.
  • Agentforce (formerly Einstein Copilot) in Slack will be available in beta in October 2024.
  • Slack AI is available now as a paid add-on for all paid Slack plans.
  • Salesforce channels are available to Slack Sales Elevate customers now and will be included in Salesforce Starter Suite in the coming months.
  • Slack templates will be available in October 2024.

Explore more:

IDs, Driver Licenses & More Exposed By Fuel Industry Software Provider 

Posted in Commentary with tags on September 16, 2024 by itnerd

A data breach involving FleetPanda (FuelPanda), a software and technology company providing services and support for the petroleum and fuel industry, was discovered and reported to WebsitePlanet by cybersecurity researcher Jeremiah Fowler. 

What happened: 

A non-password-protected database containing 780,000 records, including invoices, driver applications, images of driver licenses, and background checks with PII, was exposed. 

Why it matters: 

The exposure of internal documents poses a significant risk for invoice fraud, where criminals could trick organizations into paying fraudulent invoices by posing as legitimate vendors or suppliers. Additionally, personal data and documents could be exploited for identity theft, financial fraud, social engineering phishing attacks and more cyber threats. 

If you want to understand what was at stake and the risks of leaving such information exposed, you can find their report with more details here: https://www.websiteplanet.com/news/fleetpanda-breach-report/

How You Can Prepare Your iPhone For iOS 18

Posted in Tips with tags on September 16, 2024 by itnerd

At 1PM EST on Monday, Apple will release iOS 18 to the public. As long as you have a supported device, it will bring you new features and improvements to your iDevice experience. One thing that will be an exception is Apple Intelligence. Unless you buy an iPhone 16, the only existing iPhones that will get Apple Intelligence are the 15 Pro and the 15 Pro Max.

If you want to see a full feature set, click here.

Speaking of supported devices, here’s what iOS 18 will run on:

  • iPhone 15
  • iPhone 15 Plus
  • iPhone 15 Pro
  • iPhone 15 Pro Max
  • iPhone 14
  • iPhone 14 Plus
  • iPhone 14 Pro
  • iPhone 14 Pro Max
  • iPhone 13
  • iPhone 13 mini
  • iPhone 13 Pro
  • iPhone 13 Pro Max
  • iPhone 12
  • iPhone 12 Pro
  • iPhone 12 Pro Max
  • iPhone 12 Mini
  • iPhone 11
  • iPhone 11 Pro
  • iPhone 11 Pro Max
  • iPhone XS
  • iPhone XS Max
  • iPhone XR
  • iPhone SE (Second Generation Or Later)

If your phone isn’t on this list, then it’s not supported. And the following phones will come with iOS 18 out of the box:

  • iPhone 16
  • iPhone 16 Plus
  • iPhone 16 Pro
  • iPhone 16 Pro Max

If you are wondering why there are no iPads on the list, that’s because Apple has spun off the iPads into a separate OS called iPadOS which is due out at the same time. Having said that, this advice applies to iPads as well. 

Now, since this is a major upgrade there is always a chance, no matter how remote that something can go sideways. To make sure that you’re not caught out by something unexpected, here’s what you can do:

1. Update your Apps: Make sure that all your apps are up to date before upgrading by opening the App Store app and seeing if any updates are required. This is important because it is possible that the changes that Apple has made on areas like privacy and performance could break an app that you rely on. Thus I find that it is always a good idea to check for updates and install them before a new version of iOS hits the streets.

2. Dump any uneeded photos, videos or apps: iOS updates tend to need a fair amount of free space to allow for a successful installation. Thus if you have anything less than 8GB of free space, consider deleting unused apps or photos/videos. In terms of the photos and videos you want to keep, you can move them to the cloud or a computer so that they’re safely stored without taking up space on your iPhone. I personally use iCloud myself, but Google Photos is another option.

3. Backup your iDevice: If you value the data on your iDevice, backing it up is a must. You have two options for backing up your iDevice: iCloud or iTunes. Follow this guide to backing up your iPhone using iCloud or iTunes.

At this point you should be good to go to upgrade to iOS 18. Key word being SHOULD. Upgrading an operating system isn’t a trivial process. But if you take these steps beforehand, you should reduce the risk of any issues that you might encounter.

One other thing before I go, you may want to consider not upgrading to iOS 18 and instead wait for iOS 18.1 to hit the streets before you upgrade as that’s likely to have additional bug fixes and also fix issues that hit the streets when iOS 18 comes out. Plus that’s the version that is going to bring Apple Intelligence to the table. I’ll be upgrading later today and I will let you know how it goes.

What You Should Do Before Upgrading To macOS Sequoia ….. And Why You Shouldn’t Upgrade Just Yet

Posted in Commentary with tags on September 16, 2024 by itnerd

Apple is expected to release their latest OS which is macOS Sequoia today. Before we go on, here’s a list of what macOS Sequoia will run on:

  • iMac 2019 and later
  • Mac Pro 2019 and later
  • iMac Pro 2017
  • Mac Studio 2022 and later
  • MacBook Air 2018 and later
  • Mac mini 2018 and later
  • MacBook Pro 2018 and later

You should note that some features won’t work on Intel Macs. Apple Intelligence is one of those features as that feature will only work on an Apple Silicon Mac. I am also sure that this is a backhanded way for Apple to “encourage” you to replace your Intel Mac with an Apple Silicon Mac. Which to be frank you should consider as Intel Macs are on their last legs from a support standpoint. In any case, here’s list of features that Sequoia includes.

If your Mac isn’t on this list, you’re out of luck. But assuming that it is, here’s some tips on what you might want to do before you pull that trigger and upgrade. And a couple reasons why you shouldn’t.

  1. Don’t Upgrade… At least not yet. Part 1 : The reason why you shouldn’t upgrade is that Apple’s initial releases tend to be buggy. But they get better after they release an update or two. So you may want to wait until at least the .1 update hits the streets before making the jump. Or better yet, wait until the .2 release to be extra safe. 
  2. Don’t Upgrade… At least not yet. Part 2: Your apps that you depend upon may not be ready for Sequoia. Thus out may be a better strategy to confirm whether they are ready or not. And if they’re not, wait for them to be compatible with Sequoia before you upgrade.
  3. If you Must Upgrade, Make A Backup: Needless to say, making a backup of your current setup is vital before upgrading. That way you have a way to go back to where you were if things don’t work out. There’s plenty of backup solutions out there from Apple’s own Time Machine to third party utilities such as Carbon Copy Cloner that can be used for this purpose.
  4. Upgrade Your Software BEFORE You Upgrade: Assuming your apps are going to be compatible with Sequoia, you should ensure that all your apps are up to date before you pull the trigger on upgrading. That will reduce the risk that something might go sideways during the upgrade.
  5. Run Disk Utility BEFORE You Upgrade: The last thing I would do is boot of the Recovery Partition and run Disk Utility to verify the volume that you plan to install the upgrade on. It likely wouldn’t hurt to do a permission repair as well.

At this point you should be good to go. Key word being SHOULD. Upgrading an operating system isn’t a trivial process. But if you take these steps beforehand, you should reduce the risk of any issues. Or you can take my first couple of suggestions which is to wait for a bit before upgrading. Then follow the rest of my advice. In my case, I need to do a few upgrades of software before making the jump to Sequoia. As a result, I will not be upgrading this afternoon. But I will be in the coming weeks.

23andMe Pays Up To Make Their Legal Problems Go Away…. Maybe

Posted in Commentary on September 16, 2024 by itnerd

You might recall that DNA testing service 23andMe got pwned in epic fashion. And that was only the beginning. That led to them quietly trying to alter their terms of service to avoid getting sued. But when that didn’t work, they blamed their users for getting pwned. Now the latest twist in this story is the fact that the company has decided to pay up:

23andMe will pay $30 million to settle a class action lawsuit over a data breach that affected more than 6.9 million customers. As part of the proposed settlement, the genetic testing site will compensate affected customers and provide them with access to a security monitoring program for three years.

A judge still needs to sign off on this. But if that happens, it will put an end to litigation against the company who has been on life support even before this pwnage happened. And if it doesn’t happen, 23andMe is done like dinner.

Stay tuned to find out which outcome it will be.

With iOS 18, Thieves Who Want To Steal Your iPhone Might As Well Not Even Bother

Posted in Commentary with tags on September 15, 2024 by itnerd

iPhones for a long time now have had something called Activation Lock. What that does is it basically locks the phone so that if the phone gets stolen, it cannot be sold and reactivated. That’s led to two things. One is scams such as this one, or this one that are meant to get you to remove activation lock so that the thief can resell your phone. The second thing are phones being dismantled for their parts since individual parts aren’t affected by activation lock.

Apple is going solve the latter problem, or at least try to. And to their credit, they did announce this months ago. Though that announcement did fly under the radar at the time:

Apple will also extend its popular Activation Lock feature to iPhone parts in order to deter stolen iPhones from being disassembled for parts. Requested by customers and law enforcement officials, the feature was designed to limit iPhone theft by blocking a lost or stolen iPhone from being reactivated. If a device under repair detects that a supported part was obtained from another device with Activation Lock or Lost Mode enabled, calibration capabilities for that part will be restricted.

Enter BetaProfiles who noted that the RC (Release Candidate) of iOS 18 had this feature enabled. Thus everybody who updates their iPhone to iOS 18 will get this feature. And in the process, make their phones less valuable to thieves. I suspect that there will be a further increase in scams as thieves who want to cash in on stealing iPhones will try to go that route to cash in on their ill gotten gains. But any deterrent to stop phone thefts is a good thing.

TTC To End Free WiFi In Subway Stations…. I Can Argue This Both Ways

Posted in Commentary with tags on September 15, 2024 by itnerd

News filtered out at the end of last week that the TTC is going to kill off their free WiFi service in the subway system at the end of the year. Here’s the reason why:

The TConnect system was launched more than a decade ago and the transit agency says concerns over the age of the technology and infrastructure related to reliability/performance along with security for users were behind the decision to discontinue the free service.

“We’ve also seen a 65 per cent drop in use of TConnect since 5G connectivity for all carriers was introduced,” TTC spokesperson Stuart Green tells CityNews.

“And then there’s the cost – $17 million to upgrade the infrastructure to address performance and security issues does not feel like a wise investment. We think our customers would rather see that money spent on our core business – safe and reliable transit service.”

Green says they will continue to work with Rogers to build out the 5G network and enhance connectivity on the TTC while improving the customer experience.

If Rogers completes the 5G rollout, which I am pretty sure that they will as they have the Federal Government holding their feet to the fire, then this is a complete non-issue. Besides, there’s this:

So you might think I am all for this decision. Right? Well. Not quite. The other side of this is that you would have to use 5G or 4G LTE data instead. And since Toronto is part of Canada, and Canada has some of the highest prices on planet Earth for cellular data, that is going to hurt low income people who may not be able to afford a cell phone plan with a lot of data. And there’s the fact that Rogers 5G rollout in the subway isn’t scheduled to be done until 2026. If the the TTC pulled the plug then, I think it would be less of an issue. But the fact that they’re doing it at the end of the year makes this an immediate problem for those on lower incomes. Finally, GO Transit is aggressively rolling out free WiFi on their buses and trains. And both are overseen by the agency that runs Transit in the Greater Toronto Area which is Metrolinx. Which means you have one transit provider who has free WiFi, and one that doesn’t. That doesn’t seem consistent to me.

I don’t know what the right answer is, but my feeling is that the TTC might want to do a rethink of this as I am not sure that they have thought this through completely and taken into account all the various angles of them killing WiFi in the subway system.

Fortra Discovers Sophisticated QR Code Phishing Campaign That Targets Office 365 Users

Posted in Commentary with tags on September 15, 2024 by itnerd

Global cybersecurity software and solutions provider Fortra has discovered a sophisticated QR code phishing campaign specifically targeting Microsoft Office 365 users across various industries, including finance and healthcare. In this campaign, employees are tricked into scanning a QR code sent through a blank email. That code redirects them to a highly personalized phishing page tailored to look like their company’s Office 365 login portal.

Now at this time, I don’t have a link to send you to read this document on for yourself. But here’s how the campaign works:

  • The target, because this is a targeted attack, gets an email that contains a PDF. The PDF claims it is an “Enhanced Bonus Distribution Strategy” from HR and requests that the user scan a QR code to access the document.
  • Embedded in the QR code was a phishing redirect link that takes the user to a fake Microsoft Identity Verification Check. Upon analyzing the source code of this page, it was discovered two base64 encoded strings. One decoded string is a URL for a site hosting an email list with n290,000 emails in it, and the other goes to the Office365 phishing attack. It was also discovered in the same code that if the users email address is in the email list, they are permitted to continue to the next part of the phish.
  • The background of the Office365 phishing site changes to reflect the company name based on the users email domain. If the users email address is not found in the list, they are given four chances to input their email and then redirected to a random Wikipedia article. The user is given four chances so the attacker can harvest extra email addresses.

Why this matters:

  • QR code phishing attacks are becoming more prevalent due to the reliance on remote and hybrid work environments, which often use QR codes for authentication, document sharing, and security. While often perceived as convenient or harmless, they are now being weaponized to bypass traditional email security measures.
  • The phishing campaign was designed specifically to exploit Office 365, a platform used by over a million companies globally. With over 290,000 email addresses targeted in this attack, this finding represents a major security risk for companies relying on Office 365.
  • The high level of personalization in the phishing attacks can easily trick even trained employees, increasing the risk of credential theft and data breaches.
  • QR codes are under the radar for many cybersecurity protocols, as most rely on anti-phishing tools that scan links in emails, creating blind spots for security teams.

Thus the take home message is that scanning QR codes is becoming a risky endeavour. Thus if you get one from via email from someone that you don’t know, or that you don’t expect, your best course of action is to perhaps delete it and report it to your IT department as it might be dangerous.

Fortinet Pwned Via Third-Party Attack 

Posted in Commentary with tags on September 14, 2024 by itnerd

Fortinet has just disclosed that it has suffered a data breach after a threat actor gained unauthorized access to a third-party it used.

Initially, the data breach at Fortinet was detected on a hacking forum, with the threat actor claiming that their Azure SharePoint was leaked, with 440 GB of data. This is part of what the company said:

An individual gained unauthorized access to a limited number of files stored on Fortinet’s instance of a third-party cloud-based shared file drive, which included limited data related to a small number (less than 0.3%) of Fortinet customers.

Evan Dornbush, former NSA cybersecurity expert had this to say:

Modern business IT ecosystems are complex, relying on external providers and a hodgepodge of “shared responsibility” agreements as pertains to security. So long as the data is valuable, attackers will take interest.

This could become an interesting 8-k as the breach is Fortinet’s material event (as defined by the SEC) even if the customer data was stored on a third-party platform. As of the time of this writing how the access occurred has not been disclosed (at least I haven’t been able to find it).

Ted Miracco, CEO, Approov follows with this:

  “Data centers are now as vital as power plants—meaning tighter security, more government oversight, and faster responses to cyber threats. Expect more scrutiny, but also more investment in the sector. This recognition highlights the critical role that data centers play in supporting the healthcare, finance, and broader public services sectors of the economy, particularly in light of growing cyber threats and the increasing reliance on digital infrastructure.

  “Though good for security and investment, this could hamper innovation with over-regulation. It’s a necessary step, but bureaucratic hurdles could be an issue. Given that data centers house sensitive information, such as NHS patient records and financial data, their inclusion in CNI status means they will receive prioritized access to security resources like the National Cyber Security Centre (NCSC). This added layer of oversight and support can improve incident response, reduce downtime, and protect critical data during outages or attacks.

  “The move should improve overall resilience against attacks, but unless the private sector steps up on security innovation, it may not stop the next big breach. Cybersecurity vendors, especially those providing robust API and cloud security solutions may see this development as an opportunity to expand into the CNI-protected sectors by offering more advanced security services tailored for data centers.”

Finally Stephen Gates, Principal Security SME, Horizon3.ai:

  “As someone deeply motivated by security, I see this as a crucial step in safeguarding citizens, public and private sector organizations, and the nation as a whole. Today’s critical infrastructures—such as energy, water, and emergency services, and so on—already rely heavily on the continuous operation of the nation’s data centres.

  “With these data centres now being classified similar to other critical infrastructure, they will likely be subject to the same regulations and directives designed to protect private data, ensure operational uptime, and demonstrate cyber resilience. Additionally, the need for continuous cyber risk assessments of these environments will be imperative to identifying cyber risks, mitigating emerging threats, and ensuring that these centres remain resilient against evolving cyberattacks.”

Clearly Fortinet are trying to minimize the scope of this as 440 GB doesn’t sound like a “limited number of files” to me. That likely means that this is pretty bad. And when the details finally appear, we won’t like the scope of this hack at all.

5.2 Million Files Allegedly Stolen From ICBC’s London HQ

Posted in Commentary with tags on September 14, 2024 by itnerd

On Thursday, ransomware gang Hunters International claimed to have stolen more than 5.2 million files from the London branch of the Industrial and Commercial Bank of China (ICBC).

The threat actors allegedly swiped 6.6 TB of the bank’s data after hacking their network, and threatened to publish all of it unless ICBC pays up by September 13th. Which was yesterday.

ICBC is the world’s largest bank by assets, and, almost a year ago, the US arm of ICBC was hit by ransomware that disrupted trading in the US treasury markets. LockBit told Reuters that the bank paid the ransom after that attack.

Comparitech researchers logged 127 ransomware attacks claimed by Hunters so far in 2024, but these haven’t been acknowledged by the targets.

I have two comments on this. Starting with Evan Dornbush, former NSA cybersecurity expert:

“Is there a more cost-effective way to fight ransomware?

  “This is a timely reminder that organizations should continually question the effectiveness of their cybersecurity measures lest they too be caught in a vicious cycle of reactive spending while failing to address the root causes of these attacks.

  “Simply throwing money at security solutions isn’t enough. This may be an ideal time for the industry to consider a shift in focus towards disrupting the economic model of ransomware attackers rather than dealing with the effects of their crimes.”

Next up is Ted Miracco, CEO, Approov:

Privacy, security and possible culprit behind the attack:

  • Privacy – Financial institutions are custodians of highly sensitive data, and a breach of this magnitude could result in heavy fines and penalties, as well as lawsuits from affected customers and businesses. If Hunters publishes ICBC’s data, it will lead to severe legal and compliance breaches, especially in regions with stringent financial and data privacy regulations, such as the EU’s GDPR or the UK’s Data Protection Act.
  • Security – The attack by Hunters underscores the prevalence of ransomware-as-a-service (RaaS), where groups like this operate with increasing efficiency. The involvement of RaaS models lowers the bar for cybercriminals, enabling them to outsource sophisticated ransomware attacks and focus on large, lucrative targets such as banks. A key part of protecting financial data involves strengthening the security of mobile applications and APIs, which are often targeted as points of entry for ransomware attacks. However, organizations have demonstrated their capability to compromise even large and presumably secure institutions like ICBC, because API security vulnerabilities remain largely unaddressed.
  • Culprit? – The fact that Hunters does not target Russian organizations suggests a potential association with Russia’s safe harbor policy for cybercriminals operating within its borders. This geopolitical dynamic is common with ransomware gangs, especially those with links to Russia, which often avoid targeting domestic organizations to stay under government protection. Ransomware attacks focused on extortion for financial gain, are a hallmark of many Russia-based cybercrime.”

ICBC has paid ransoms before. And my feeling is that they will pay up this time around. That’s unfortunate as I believe that organizations should not pay ransoms under any circumstances because that only encourages threat actors to launch more attacks. Besides, that money would likely be better spent ensuring that they do not pwned in the first place.