Discounting Dominates Prime Day Says Salesforce data

Posted in Commentary with tags on July 19, 2024 by itnerd

Amazon reported its biggest sales this year via Prime Day. Here’s some key Canadian and global data which provides a snapshot based on the activity of 1.5 billion shoppers globally across Commerce Cloud and other Salesforce products.

Canadian data shows:

  • Discount rates (averaging at 27% off) were much more enticing this year compared to last year’s Prime Day with Canadian retailers increasing discount usage by 11%
  • Sales for non-Amazon retailers in Canada grew by 8% YoY
  • Canadian retailers witnessed consumers buying more units per transaction YOY (4.7% compared to 4.2 in 2023)
  • Canadian web traffic grew by 5% YoY (compared to +2% globally), while order growth shows an increase of 6% (higher than the flat 0% growth globally) 
  • Add to cart value (19%), conversion rate (2.5%) and cart abandonment rate (87%) for Canada remains stable YOY
  • Social traffic grew by 1% YOY (11% compared to 10% in 2023)

Global data shows: 

  • Global web traffic has grown +2% YoY
  • Top performing verticals (for sales growth) are:
  • Health & Beauty including makeup, skincare and haircare (+16%)
  • Makeup +30%
  • Skincare +14%
  • other health & beauty +14%
  • Active Footwear (+12%)
  • General Footwear (+8%)
  • Highest discounted categories for Prime Day 1+2 combined globally are:
  • General Apparel 28% 
  • Beauty, Makeup 28% (a jump of 7% from last year)
  • Beauty, Skincare 22%
  • Home, Furniture 22%

This data was provided by Salesforce.

CrowdStrike CEO Speaks To Taking Down The Entire Planet With A Bad AV Update…. And He Actually Apologizes For This Mess

Posted in Commentary with tags on July 19, 2024 by itnerd

Earlier today I posted a story about security company CrowdStrike taking down the entire planet with a bad antivirus update. In that story I pointed out that the CEO of CrowdStrike George Kurtz posted a Tweet where he completely failed to apologize for bringing the entire planet to a standstill. At the time I said this:

The problem with this Tweet is that he completely failed to apologize for basically taking down the entire planet because of a screw up with his product. If I used his product, I’d be looking to move to some other antivirus product. Because this Tweet to be frank, sucks.

Well, I guess someone must have told him that the Tweet in question didn’t go over well because I just found this on the YouTube channel of NBC:

You tell me about the quality of his response. I’m really not impressed by this as this kind of looks like a hostage video. But to be fair, he’s likely been up all night and he’s likely reconsidering his life choices. At least he apologized for taking down the entire planet, but maybe you have a different view. If so, post a comment and share it.

#Fail: Faulty CrowdStrike AV Update Takes Down Millions Of Windows PCs Globally

Posted in Commentary with tags on July 19, 2024 by itnerd

This is not a good look for cybersecurity company Crowdstrike.

A bad update for the CrowdStrike Falcon antivirus product installed on Windows PCs has taken down millions of PC globally. I am hearing stories of flights being grounded, Sky News being taken off air for a few hours, and retailers being unable to sell anything.

In short, this is extraordinary bad.

This is made worse by the CEO of CrowStrike who decided to Tweet. This Tweet was not a good idea:

The problem with this Tweet is that he completely failed to apologize for basically taking down the entire planet because of a screw up with his product. If I used his product, I’d be looking to move to some other antivirus product. Because this Tweet to be frank, sucks.

There is a workaround that was posted to Reddit. But it will have to be done on a PC by PC basis. Which means that companies could be down for days. Which is of course bad.

I’ll be watching this situation and posting updates when it warrants an update. But this situation is bad and likely won’t improve for a while. And when this is resolved, CrowdStrike will have a whole lot of explaining to do.

Former Trump Media Shell Company CEO Hit With Lawsuit Alleging Securities Fraud

Posted in Commentary with tags on July 18, 2024 by itnerd

From the “this might not help the share price” department comes news that Patrick Orlando who is the former CEO of Digital World Acquisition Company, which was a shell company that helped to take social media platform Truth Social public is being sued for securities fraud by the SEC:

In a filing with the court of District of Columbia, the SEC said Orlando broke rules concerning securities by issuing false and misleading statements while he led the blank-check firm.

Orlando misled investors by failing to disclose that his company had formulated a plan to acquire Trump Media & Technology Group Corp and was pursuing the acquisition before DWAC’s initial public offering, according to the filing.

In March, Digital World completed its merger with Trump Media & Technology Group that owns social media platform Truth Social, which is backed by Trump.

In July last year, DWAC had settled regulatory charges of “material misrepresentations” to investors.

The SEC had said DWAC was found to have violated antifraud provisions of federal securities laws. The company had agreed to a cease-and-desist order and to pay an $18 million penalty if it closes the merger.

Now news like this won’t help the stock price of a normal stock. But Trump Media is the definition of a meme stock as it is grossly overvalued. So the normal rules don’t apply. Having said that, this likely isn’t going to be good news for the stock and Trump Media. Thus it will be interesting to see what effect that this lawsuit has on both parties.

Mission Cloud Announces Mission Cloud Engagements – DevOps

Posted in Commentary with tags on July 18, 2024 by itnerd

Mission Cloud today announced the launch of Mission Cloud Engagements – DevOps, a platform designed to transform how businesses manage and execute their AWS DevOps projects. Powered by Mission Control, Mission Cloud Engagements – DevOps provides real-time visibility, advanced reporting, and streamlined project management for DevOps initiatives.

Mission Cloud Engagements—DevOps addresses the growing need for transparency and efficiency in cloud and AI projects by offering a comprehensive suite of tools that enable both customer and Mission Cloud teams to track, manage, and optimize DevOps work in real time. The platform aligns with AWS best practices and Mission Cloud’s agile delivery methodology, Mission Cloud Engage, to ensure rapid, high-quality project delivery.

“Mission Cloud Engagements – DevOps provides customers with advanced transparency and collaboration on their DevOps projects,” said Ted Stuart, President & Chief Operating Officer at Mission Cloud. “By giving real-time visibility into each sprint and cadence, we’re not just improving project management – we’re transforming the entire experience of working with an AWS Premier Tier Partner. This platform lets businesses accelerate their DevOps initiatives, reduce risks, and achieve every milestone more efficiently than ever before.”

Key features of Mission Cloud Engagements – DevOps include:

  • Project Milestone Tracking: Detailed view of progress and implementation notes for key stages in an initiative’s life cycle.
  • Action Items: Flagging and tracking of issues requiring customer input or feedback, ensuring smooth collaboration.
  • Risk Log: Proactively identifying and managing potential obstacles before they become roadblocks.
  • Real-time Status Updates: Live updates on team status and progress, enabling quick pivots when needed.
  • Transparent Reporting: Clear, accurate reporting on all work, enhancing accountability and trust.
  • Backlog Generation and Prioritization: Tools to create and manage a prioritized backlog of work, aligned with best practices.

Mission Cloud Engagements – DevOps is supported by Mission Cloud’s expert teams, including Cloud Solutions Architects, DevOps Engineers, and Project Managers, ensuring that customers have access to top-tier AWS expertise throughout their projects.

Mission Cloud Engagements – DevOps marks the first release in Mission Cloud’s innovative Engagements portfolio. This platform sets the stage for a comprehensive suite of specialized solutions, with additional Engagement types slated for future rollout.

Mission Cloud Engagements—DevOps is exclusively available for purchase in the AWS Marketplace. For more information or to schedule a demo, visit https://www.missioncloud.com/mission-control/engagements/devops or contact sales@missioncloud.com.

Canadian Winners of the Ninth Annual Women in Cybersecurity Scholarship Honoured at ESET Canada Head Office

Posted in Commentary with tags on July 18, 2024 by itnerd

ESET North America proudly celebrated the Canadian winners of the Ninth Annual Women in Cybersecurity Scholarship at an event held at the ESET Canada office. The winners, Aidan Gurung from Gloucester, Ontario, and Lauren Hendley from Carp, Ontario, were recognized for their outstanding achievements and contributions to the field of cybersecurity.

Although Aidan could not be in attendance, the event highlighted the exceptional accomplishments of these two young women and featured a series of special recognitions:

  • Meet and Greet with the ESET Team:  The ESET Canada team, including members of the head office in Markham and Jean-Ian Boutin, Director of Threat Research at the ESET Research Centre of Montreal,personally congratulated Lauren, several finalists, as well as previous winners, acknowledging their dedication to cybersecurity and STEM education.
  • Video Message from local MP: Melissa Lantsman, Member of Parliament, Thornhill, Ontario, sent a heartfelt video message congratulating Aidan and Lauren and emphasizing the importance of their accomplishments in the male-dominated field of cybersecurity.
  • Certificates from local MPP: Laura Smith, Member of the Provincial Parliament and Parliamentary Assistant to the Minister of Children, Community, and Social Services, sent congratulatory certificates on behalf of the Province of Ontario, recognizing the winners’ exceptional achievements and extending best wishes for their future endeavours.

Lauren Hendley was influenced by her father’s industry involvement and early programming experiences, Lauren’s passion for technology and cybersecurity was ignited in grade 12 when she co-founded her school’s Computer Science Club and competed in CyberPatriot. Lauren has been accepted to the University of Ottawa for an Honours Bachelor of Science in Computer Science (COOP Program), with a focus on cybersecurity and Artificial Intelligence. Lauren emphasized the importance of showing women they are necessary and capable in a male-dominated field.

Through her experiences growing up in Nepal, Aidan Gurung, witnessed the importance of education and ethical standards in technological innovation. Her passion for EdTech and cybersecurity education has led her to pursue a master’s degree at the University of Cambridge. Aidan expressed her gratitude to ESET for supporting students like herself who aim to improve the technology landscape with a focus on ethics.

This scholarship is an annual initiative, and interested women should keep an eye on the WICS site for updates in 2025. Find out more here.

Bell Canada and ServiceNow announce expanded multi-year strategic agreement

Posted in Commentary with tags , on July 18, 2024 by itnerd

Bell Canada and ServiceNow today announced a multi‑year strategic agreement to accelerate Bell’s transformation to meet the growing customer demand for tech services and digital media. The renewed commitment makes Bell one of ServiceNow’s largest communications customers with a first of its kind collaboration in Canada. Bell will expand its use of the ServiceNow platform, supporting its own digital transformation while continuing to offer ServiceNow implementation expertise to support the digital transformation of its Bell Business Markets customers.

FX Innovation, a leader in cloud focused services, an Elite ServiceNow implementation partner and acquired by Bell in 2023, will implement the Now Platform throughout Bell’s ecosystem. Bell will use automation, purpose‑built telecommunications solutions, and AI‑driven insights to provide both technicians and customers with a more efficient experience, enhancing customer service. The Now Platform is a key factor in Bell’s digital transformation strategy and will streamline several areas of the business, including Network, Customer and Field Service Operations and Corporate Services, resulting in:

  • An AI‑optimized experience leveraging the power of GenAI‑driven insights to automate scheduling, better meet customer requests, and reduce drive time.
  • Enhanced customer support with powerful automation capabilities to streamline order management, case management, and incident response processes.
  • Faster service deliveries using purpose‑built telecommunications solutions designed to enable customers to get their needs met in a matter of hours or days versus weeks.

The Bell and ServiceNow collaboration builds on an initial engagement announced in November 2023. Bell was among the first to launch ServiceNow Service Bridge capabilities in North America, augmenting Bell Business Markets’ robust suite of service offerings. The new collaboration strengthens Bell in its purpose to advance how Canadians connect with each other and the world, while supporting the company’s evolution from a telecommunications company to tech services leader.

New AI-Generated Crypto Phishing Threat Actor Exploits 30 Major Brands 17K+ Fake GitBook Lure Sites

Posted in Commentary with tags on July 18, 2024 by itnerd

Netcraft has revealed a novel crypto phishing campaign in which a threat actor that Netcraft has been tracking for a year is using AI-generated content to create 17,000 phishing lure sites impersonating more than 30 major crypto brands, including Coinbase, Crypto.com, Metamask, and Trezor. 

The lure and phishing sites are part of a massive multi-step attack, including those that capture login credentials and two-factor authentication (2FA) codes, as AI allows attackers to create high-quality content at an unprecedented scale, impossible with manual effort. 

Hosted on Gitbook, a documentation platform for software developers, the sites claim to provide advice and tutorials for a wide range of crypto industry brands. They contain a CTA link redirecting to domains with a UUID to track user visits and appear to be registered with access keys and hosted by Amazon.

The redirect URLs use advanced traffic distribution systems to mask the relationships between attack infrastructure, choosing the redirect destination based on different factors (i.e., hide the phishing infrastructure from security researchers).

The end phishing sites in this campaign aim to obtain one of two credentials: the victim’s login details for the cryptocurrency platform or the seed recovery phrase for the victim’s wallet. Netcraft has been tracking this campaign and has observed the attackers evolving their strategies in response to countermeasures. 

You can read the details here.

Bassett Furniture shuts down manufacturing after being hacked 

Posted in Commentary with tags on July 18, 2024 by itnerd

In an 8-K filing with the SEC, Bassett Furniture said it shut down some of its IT systems following a ransomware attack it discovered on July 10.

“The threat actor disrupted the Company’s business operations by encrypting some data files. As a result of the Company’s containment measures, which included shutting down some systems, the Company has not been, and, as of the date of this Report is not operating its manufacturing facilities.

“The Company’s retail stores and e-commerce platform are open, and customers are able to place orders and purchase available merchandise; however, the Company’s ability to fulfill orders is currently impacted,” Bassett Furniture said in the 8-K filing.

“[…] the incident has had and is reasonably likely to continue to have a material impact on the Company’s business operations until recovery efforts are completed,” Bassett Furniture admitted.

No ransomware group has come forward to take credit for the incident as of Tuesday afternoon.

Evan Dornbush, former NSA cybersecurity expert had this to say:

   “The 8-K disclosure does not explicitly make clear that Bassett has been prompted to pay a ransom and with none of the more notorious actors yet coming forward to claim credit, it could be the breach was by a newer operator appearing on to the scene without the refined processes seen by the more established groups.  

   “The cybersecurity community needs to do a better job of prohibiting new actors from emerging, ensuring manufacturing and retail sectors don’t have to experience downtime and face other material impacts.”

Stephen Gates, Principal Security SME, Horizon3.ai followed with this:

In Bassett Furniture’s recent Form 8-K filing with the SEC, the company announced a disruption in its operations due to a cyber incident. It appears that a threat actor may have gained a foothold inside the company’s business operations network, likely leading to a human-operated, ransom-based attack.

Considering the potential virtual connectivity between Bassett’s business network and its suppliers for ordering and fulfilling raw materials, I would recommend investigating the breach from the perspective that the attacker might have first gained access through a supplier’s network. This scenario is highly probable in today’s interconnect supply chains.

If this were the case, the attacker, once inside Bassett’s business system, would have likely escalated their privileges, moved laterally within the network, accessed critical data, and encrypted it as part of the ransom attack. Consequently, Bassett’s response appears to have included disconnecting their production network from the business network as a containment measure.

Manufacturers and organizations with supply chains must acknowledge that their cyber risk now extends to their suppliers as well. I highly advise organizations with supply chains to incorporate third-party risk management using continuous cyber risk assessments into their risk management plans. Autonomous cyber risk assessment technologies that provide continuous and affordable assessments are readily available to help meet these types of directives.

I said this yesterday. Companies can either spend money up front to protect themselves, or spend even more money after getting pwned. The choice is theirs.

Account data on 15 million Trello users stolen from open API and leaked on the web

Posted in Commentary with tags on July 18, 2024 by itnerd

Yesterday, a hacker with the alias “Emo”, leaked 21.1 GB of information on over 15 million users of the Atlassian-developed project management tool Trello.

According to the hacker, the data breach occurred in January 2024, including the following:

  • 15,182,073 email addresses
  • User IDs
  • Usernames
  • Full names
  • Profile URLs
  • Status information
  • Various settings and limits
  • Associated board memberships

Initially, the hacker used email addresses from already-breached databases and then expanded the attack. The hacker explained that Trello had an insecure API endpoint accessible without logins, allowing the hacker to link email addresses to Trello accounts, revealing user identities, resulting in the widespread breach.

“I originally was only going to feed the endpoint emails from ‘com’ (OGU, RF, Breached, etc.) databases, but I just decided to keep going with emails until I was bored. This database is very useful for doxing, find enclosed email address matched to full names and aliases matched to personal email addresses,” the hacker said.

Evan Dornbush, a former NSA cybersecurity expert offers comments:

   “Data disclosure like this is unfortunate.  The attacker was using an unauthenticated-yet-legitimate API call to obtain sensitive information. Considering we’re talking about text data, 21.2GB is a lot to leak.

   “For a long time, anomaly detection failed to live up to the hype.  Modern computational processing leveraging machine learning techniques in theory make alerting on these kinds of abnormal operating behaviors a reality.  If they can emerge onto the cybersecurity scene more aggressively, perhaps companies could more quickly detect this kind of behavior in the future.”

This is pretty bad. And Trello really has to not only explain how this specific hack happened, but what they are going to do to safeguard customer data going forward. Because a leak of this scale is completely unacceptable.