Mission Cloud Announces Mission Cloud Engagements – DevOps

Posted in Commentary with tags on July 18, 2024 by itnerd

Mission Cloud today announced the launch of Mission Cloud Engagements – DevOps, a platform designed to transform how businesses manage and execute their AWS DevOps projects. Powered by Mission Control, Mission Cloud Engagements – DevOps provides real-time visibility, advanced reporting, and streamlined project management for DevOps initiatives.

Mission Cloud Engagements—DevOps addresses the growing need for transparency and efficiency in cloud and AI projects by offering a comprehensive suite of tools that enable both customer and Mission Cloud teams to track, manage, and optimize DevOps work in real time. The platform aligns with AWS best practices and Mission Cloud’s agile delivery methodology, Mission Cloud Engage, to ensure rapid, high-quality project delivery.

“Mission Cloud Engagements – DevOps provides customers with advanced transparency and collaboration on their DevOps projects,” said Ted Stuart, President & Chief Operating Officer at Mission Cloud. “By giving real-time visibility into each sprint and cadence, we’re not just improving project management – we’re transforming the entire experience of working with an AWS Premier Tier Partner. This platform lets businesses accelerate their DevOps initiatives, reduce risks, and achieve every milestone more efficiently than ever before.”

Key features of Mission Cloud Engagements – DevOps include:

  • Project Milestone Tracking: Detailed view of progress and implementation notes for key stages in an initiative’s life cycle.
  • Action Items: Flagging and tracking of issues requiring customer input or feedback, ensuring smooth collaboration.
  • Risk Log: Proactively identifying and managing potential obstacles before they become roadblocks.
  • Real-time Status Updates: Live updates on team status and progress, enabling quick pivots when needed.
  • Transparent Reporting: Clear, accurate reporting on all work, enhancing accountability and trust.
  • Backlog Generation and Prioritization: Tools to create and manage a prioritized backlog of work, aligned with best practices.

Mission Cloud Engagements – DevOps is supported by Mission Cloud’s expert teams, including Cloud Solutions Architects, DevOps Engineers, and Project Managers, ensuring that customers have access to top-tier AWS expertise throughout their projects.

Mission Cloud Engagements – DevOps marks the first release in Mission Cloud’s innovative Engagements portfolio. This platform sets the stage for a comprehensive suite of specialized solutions, with additional Engagement types slated for future rollout.

Mission Cloud Engagements—DevOps is exclusively available for purchase in the AWS Marketplace. For more information or to schedule a demo, visit https://www.missioncloud.com/mission-control/engagements/devops or contact sales@missioncloud.com.

Canadian Winners of the Ninth Annual Women in Cybersecurity Scholarship Honoured at ESET Canada Head Office

Posted in Commentary with tags on July 18, 2024 by itnerd

ESET North America proudly celebrated the Canadian winners of the Ninth Annual Women in Cybersecurity Scholarship at an event held at the ESET Canada office. The winners, Aidan Gurung from Gloucester, Ontario, and Lauren Hendley from Carp, Ontario, were recognized for their outstanding achievements and contributions to the field of cybersecurity.

Although Aidan could not be in attendance, the event highlighted the exceptional accomplishments of these two young women and featured a series of special recognitions:

  • Meet and Greet with the ESET Team:  The ESET Canada team, including members of the head office in Markham and Jean-Ian Boutin, Director of Threat Research at the ESET Research Centre of Montreal,personally congratulated Lauren, several finalists, as well as previous winners, acknowledging their dedication to cybersecurity and STEM education.
  • Video Message from local MP: Melissa Lantsman, Member of Parliament, Thornhill, Ontario, sent a heartfelt video message congratulating Aidan and Lauren and emphasizing the importance of their accomplishments in the male-dominated field of cybersecurity.
  • Certificates from local MPP: Laura Smith, Member of the Provincial Parliament and Parliamentary Assistant to the Minister of Children, Community, and Social Services, sent congratulatory certificates on behalf of the Province of Ontario, recognizing the winners’ exceptional achievements and extending best wishes for their future endeavours.

Lauren Hendley was influenced by her father’s industry involvement and early programming experiences, Lauren’s passion for technology and cybersecurity was ignited in grade 12 when she co-founded her school’s Computer Science Club and competed in CyberPatriot. Lauren has been accepted to the University of Ottawa for an Honours Bachelor of Science in Computer Science (COOP Program), with a focus on cybersecurity and Artificial Intelligence. Lauren emphasized the importance of showing women they are necessary and capable in a male-dominated field.

Through her experiences growing up in Nepal, Aidan Gurung, witnessed the importance of education and ethical standards in technological innovation. Her passion for EdTech and cybersecurity education has led her to pursue a master’s degree at the University of Cambridge. Aidan expressed her gratitude to ESET for supporting students like herself who aim to improve the technology landscape with a focus on ethics.

This scholarship is an annual initiative, and interested women should keep an eye on the WICS site for updates in 2025. Find out more here.

Bell Canada and ServiceNow announce expanded multi-year strategic agreement

Posted in Commentary with tags , on July 18, 2024 by itnerd

Bell Canada and ServiceNow today announced a multi‑year strategic agreement to accelerate Bell’s transformation to meet the growing customer demand for tech services and digital media. The renewed commitment makes Bell one of ServiceNow’s largest communications customers with a first of its kind collaboration in Canada. Bell will expand its use of the ServiceNow platform, supporting its own digital transformation while continuing to offer ServiceNow implementation expertise to support the digital transformation of its Bell Business Markets customers.

FX Innovation, a leader in cloud focused services, an Elite ServiceNow implementation partner and acquired by Bell in 2023, will implement the Now Platform throughout Bell’s ecosystem. Bell will use automation, purpose‑built telecommunications solutions, and AI‑driven insights to provide both technicians and customers with a more efficient experience, enhancing customer service. The Now Platform is a key factor in Bell’s digital transformation strategy and will streamline several areas of the business, including Network, Customer and Field Service Operations and Corporate Services, resulting in:

  • An AI‑optimized experience leveraging the power of GenAI‑driven insights to automate scheduling, better meet customer requests, and reduce drive time.
  • Enhanced customer support with powerful automation capabilities to streamline order management, case management, and incident response processes.
  • Faster service deliveries using purpose‑built telecommunications solutions designed to enable customers to get their needs met in a matter of hours or days versus weeks.

The Bell and ServiceNow collaboration builds on an initial engagement announced in November 2023. Bell was among the first to launch ServiceNow Service Bridge capabilities in North America, augmenting Bell Business Markets’ robust suite of service offerings. The new collaboration strengthens Bell in its purpose to advance how Canadians connect with each other and the world, while supporting the company’s evolution from a telecommunications company to tech services leader.

New AI-Generated Crypto Phishing Threat Actor Exploits 30 Major Brands 17K+ Fake GitBook Lure Sites

Posted in Commentary with tags on July 18, 2024 by itnerd

Netcraft has revealed a novel crypto phishing campaign in which a threat actor that Netcraft has been tracking for a year is using AI-generated content to create 17,000 phishing lure sites impersonating more than 30 major crypto brands, including Coinbase, Crypto.com, Metamask, and Trezor. 

The lure and phishing sites are part of a massive multi-step attack, including those that capture login credentials and two-factor authentication (2FA) codes, as AI allows attackers to create high-quality content at an unprecedented scale, impossible with manual effort. 

Hosted on Gitbook, a documentation platform for software developers, the sites claim to provide advice and tutorials for a wide range of crypto industry brands. They contain a CTA link redirecting to domains with a UUID to track user visits and appear to be registered with access keys and hosted by Amazon.

The redirect URLs use advanced traffic distribution systems to mask the relationships between attack infrastructure, choosing the redirect destination based on different factors (i.e., hide the phishing infrastructure from security researchers).

The end phishing sites in this campaign aim to obtain one of two credentials: the victim’s login details for the cryptocurrency platform or the seed recovery phrase for the victim’s wallet. Netcraft has been tracking this campaign and has observed the attackers evolving their strategies in response to countermeasures. 

You can read the details here.

Bassett Furniture shuts down manufacturing after being hacked 

Posted in Commentary with tags on July 18, 2024 by itnerd

In an 8-K filing with the SEC, Bassett Furniture said it shut down some of its IT systems following a ransomware attack it discovered on July 10.

“The threat actor disrupted the Company’s business operations by encrypting some data files. As a result of the Company’s containment measures, which included shutting down some systems, the Company has not been, and, as of the date of this Report is not operating its manufacturing facilities.

“The Company’s retail stores and e-commerce platform are open, and customers are able to place orders and purchase available merchandise; however, the Company’s ability to fulfill orders is currently impacted,” Bassett Furniture said in the 8-K filing.

“[…] the incident has had and is reasonably likely to continue to have a material impact on the Company’s business operations until recovery efforts are completed,” Bassett Furniture admitted.

No ransomware group has come forward to take credit for the incident as of Tuesday afternoon.

Evan Dornbush, former NSA cybersecurity expert had this to say:

   “The 8-K disclosure does not explicitly make clear that Bassett has been prompted to pay a ransom and with none of the more notorious actors yet coming forward to claim credit, it could be the breach was by a newer operator appearing on to the scene without the refined processes seen by the more established groups.  

   “The cybersecurity community needs to do a better job of prohibiting new actors from emerging, ensuring manufacturing and retail sectors don’t have to experience downtime and face other material impacts.”

Stephen Gates, Principal Security SME, Horizon3.ai followed with this:

In Bassett Furniture’s recent Form 8-K filing with the SEC, the company announced a disruption in its operations due to a cyber incident. It appears that a threat actor may have gained a foothold inside the company’s business operations network, likely leading to a human-operated, ransom-based attack.

Considering the potential virtual connectivity between Bassett’s business network and its suppliers for ordering and fulfilling raw materials, I would recommend investigating the breach from the perspective that the attacker might have first gained access through a supplier’s network. This scenario is highly probable in today’s interconnect supply chains.

If this were the case, the attacker, once inside Bassett’s business system, would have likely escalated their privileges, moved laterally within the network, accessed critical data, and encrypted it as part of the ransom attack. Consequently, Bassett’s response appears to have included disconnecting their production network from the business network as a containment measure.

Manufacturers and organizations with supply chains must acknowledge that their cyber risk now extends to their suppliers as well. I highly advise organizations with supply chains to incorporate third-party risk management using continuous cyber risk assessments into their risk management plans. Autonomous cyber risk assessment technologies that provide continuous and affordable assessments are readily available to help meet these types of directives.

I said this yesterday. Companies can either spend money up front to protect themselves, or spend even more money after getting pwned. The choice is theirs.

Account data on 15 million Trello users stolen from open API and leaked on the web

Posted in Commentary with tags on July 18, 2024 by itnerd

Yesterday, a hacker with the alias “Emo”, leaked 21.1 GB of information on over 15 million users of the Atlassian-developed project management tool Trello.

According to the hacker, the data breach occurred in January 2024, including the following:

  • 15,182,073 email addresses
  • User IDs
  • Usernames
  • Full names
  • Profile URLs
  • Status information
  • Various settings and limits
  • Associated board memberships

Initially, the hacker used email addresses from already-breached databases and then expanded the attack. The hacker explained that Trello had an insecure API endpoint accessible without logins, allowing the hacker to link email addresses to Trello accounts, revealing user identities, resulting in the widespread breach.

“I originally was only going to feed the endpoint emails from ‘com’ (OGU, RF, Breached, etc.) databases, but I just decided to keep going with emails until I was bored. This database is very useful for doxing, find enclosed email address matched to full names and aliases matched to personal email addresses,” the hacker said.

Evan Dornbush, a former NSA cybersecurity expert offers comments:

   “Data disclosure like this is unfortunate.  The attacker was using an unauthenticated-yet-legitimate API call to obtain sensitive information. Considering we’re talking about text data, 21.2GB is a lot to leak.

   “For a long time, anomaly detection failed to live up to the hype.  Modern computational processing leveraging machine learning techniques in theory make alerting on these kinds of abnormal operating behaviors a reality.  If they can emerge onto the cybersecurity scene more aggressively, perhaps companies could more quickly detect this kind of behavior in the future.”

This is pretty bad. And Trello really has to not only explain how this specific hack happened, but what they are going to do to safeguard customer data going forward. Because a leak of this scale is completely unacceptable.

Yacht giant MarineMax data breach impacts over 123,000 people

Posted in Commentary with tags on July 17, 2024 by itnerd

Recreational boat and yacht retailer MarineMax is notifying over 123,000 individuals whose personal information was stolen in a March security breach claimed by the Rhysida ransomware gang. The hack was discovered back in March but is only being reported now. More on that in a moment.

Rogier Fischer, CEO, Hadrian had this to say:

Any organization that faces such a situation should focus on both immediate and long-term corrective actions, according to Rogier Fischer, CEO of Netherlands-based cybersecurity service Hadrian.”In the short term, they need to enhance security measures, strengthen access controls, and provide employee training to prevent future breaches. They should also automate their monitoring and detection capabilities,” he said.”For the long term, conducting a comprehensive security audit, updating their incident response plan, and moving to an automated compliance and reporting process are crucial.”Additionally, investing in advanced cybersecurity technologies and establishing robust cybersecurity governance will help them mitigate future risks and improve their overall security posture, he added.

My problem with this is that this breach is that the hack was discovered in March. It’s July and we’re only learning of this now. There’s something seriously wrong with that and I along with those who have been affected would really like to know what the deal is with that.

Nearly 150,000 Records Were Exposed Online by On-Site Medical Service Provider 

Posted in Commentary with tags on July 17, 2024 by itnerd

Documents belonging to InHouse Physicians, a US healthcare provider that offers on-site medical services and wellness programs to organizations, have been exposed as reported by cybersecurity researcher Jeremiah Fowler.

What happened: 148,415 PDF documents totalling 12 GB were exposed. The database contained documents indicating if the person was cleared to enter an event or tested positive for COVID-19 and denied entry.

Why it matters: Documents in question included the name of the event and the phone number of the attendee along with their full name. This data exposure of COVID-19 era documents is a prime example of how healthcare organizations should prioritize auditing and reviewing what information they have stored.

If you want to know more about Jeremiah’s findings you can read the full report here: https://www.websiteplanet.com/news/inhousephysicians-breach-report/

HYAS Infosec Celebrated for Excellence in Innovation and Cybersecurity at 2024 Visionary Spotlight Awards

Posted in Commentary with tags on July 17, 2024 by itnerd

HYAS Infosec is proud to announce its recognition as a recipient of the 2024 ChannelVision Magazine Visionary Spotlight Awards, winning in both the Top Innovation Award 2024 (Overall Excellence) and Cybersecurity (Business Technology) categories.

The Visionary Spotlight Awards (VSA) are an annual competition that celebrates excellence in channel and service provider innovation within the communications industry. This year, editors from Beka Business Media, along with a distinguished panel of judges from independent industry resources, evaluated hundreds of applications based on criteria such as overall innovation, future industry impact, creativity, feature set differentiation, ease of use, and interoperability.

HYAS Infosec was commended for its rapid innovation and substantial impact within the communications industry. The company’s advanced threat intelligence and protective DNS solutions, HYAS Insight and HYAS Protect, empower organizations to proactively defend their networks, and provide resiliency even in the event of a breach by ensuring that the breach does not result in a successful attack causing damage. By revealing, tracking, and attributing adversary infrastructure, HYAS enables channel partners to enhance their roles as trusted advisors in achieving business success by ensuring that their clients are properly protected with today’s most advanced solutions.

These award-winning solutions not only bolster organizational security but also provide significant advantages to channel partners. HYAS Insight and HYAS Protect offer scalable, easy-to-deploy technologies that integrate seamlessly into any existing security framework. By leveraging HYAS’s innovative solutions, channel partners can deliver enhanced security services to their clients, differentiate their offerings, expand their service portfolios, and drive new revenue streams. Additionally, the proactive nature of HYAS’s solutions helps reduce the incidence and impact of security breaches, and speeds the closure of open cases by three times or more, leading to increased client satisfaction and long-term trust.

The full list of ChannelVision’s 2024 Visionary Spotlight Award winners can be viewed online here. For more information about HYAS Infosec and its award-winning solutions, please visit HYAS.com.

Anime figurine maker exposes North American customer names, home addresses

Posted in Commentary with tags on July 17, 2024 by itnerd

The Cybernews research team has discovered that Good Smile Company, a Japanese hobby products maker best known for anime and gaming figurines, misconfigured an Amazon web services (AWS) simple storage service (S3) bucket, exposing a whopping 1.2 million files.

Key findings:

  • The exposed data hides the personally identifiable information (PII) of over 270,000 Good Smile Company customers.
  • Only a fraction of the exposed files, 156 CSV (comma-separated values) files, and 1058 XLSX files, contain sensitive information.
  • Most of the customers who had their details revealed reside in the US and Canada. 
  • The data has been exposed since at least April 2024, when the team first discovered the open instance. 

The exposed customer details include:

  • Full names
  • Email addresses
  • Nicknames
  • Home addresses
  • Order details (order date, type of purchase, payment method, and amount)
  • IP addresses

Multiple attempts to reach out to the Good Smile Company didn’t result in a response. And the instance was still open at the time of writing.

Dangers of the leak

Leaving chunks of PII belonging to a group of people with specialized interests invites attackers to use the situation to their advantage.

For the full research, please visit: https://cybernews.com/security/good-smile-company-leaks-customer-data/