Ricoh acquires leading Canadian workplace technology and collaboration integrator ET Group

Posted in Commentary with tags on February 2, 2026 by itnerd

Ricoh today announced the acquisition of ET Group, a leading Canadian workplace technology and collaboration integrator. This strategic acquisition by Ricoh Canada Inc. accelerates Ricoh’s expansion into high‑growth digital services, strengthens its position as a leading provider of end‑to‑end workplace experience solutions in Canada, and reinforces its global strategy to support an evolving workplace environment.

By integrating ET Group’s audiovisual (AV) engineering expertise and long‑standing reputation for designing, delivering and supporting enterprise-wide collaboration environments — particularly within government and other highly regulated sectors — Ricoh further enhances its ability to provide scalable, technology‑driven workplace solutions across Canada.

Advancing Ricoh’s Digital Services Strategy

This strategic investment expands Ricoh’s digital workplace capabilities with:

  • Enterprise grade AV design, integration, and support
  • Hybrid meeting and collaboration solutions
  • Managed digital workplace services
  • Workplace experience and on-site staffing services

The acquisition formalizes and expands the existing partnership between Ricoh and ET Group, which will operate as a wholly owned subsidiary of Ricoh Canada.

Building a Stronger Service Network for Public‑ and Private‑Sector Organizations

ET Group brings a highly skilled team of AV engineers, designers, project managers, and support specialists trusted by major corporations, government agencies, and judicial systems. Its expertise in secure, resilient environments complements Ricoh’s footprint with Canada’s large enterprises and public institutions.

Customers will benefit from a more comprehensive service ecosystem that now integrates:

  • Audiovisual and collaboration technologies
  • Office and workplace experience services
  • Mailroom automation
  • Managed print, scan, and fleet services
  • On‑site staffing and managed services

This combined portfolio enables organizations to design, connect, and manage the workplace as a unified, intelligent environment.

Ricoh continues to make investments globally to deliver enhanced meeting experiences and hybrid work solutions for organizations worldwide, including the acquisitions of Presentation Products, Inc. (PPI) and Cenero (United States); DataVision, Pure AV, and AVC (EMEA); and Videocorp and Go2neXt (Latin America).

Panera Bread Pwned… Sigh

Posted in Commentary with tags on February 2, 2026 by itnerd

It appears that Panera Bread has had a data breach. Initial reports have said that 14 million people have been affected. Which is bad. Especially given that they had a data leak in 2018. Well, news has surfaced that the Panera Bread data breach has affected 5.1 million accounts, not 14 million customers as previously reported.

Ensar Seker, CISO at SOCRadar:

“The distinction matters, but it doesn’t materially reduce the risk. Accounts are what attackers monetize, credentials, contact data, and reuse potential, not abstract “customers.” From a defender’s perspective, 5.1 million compromised accounts still represents a massive downstream risk for credential stuffing, phishing, and identity-based attacks well beyond Panera itself.


This incident reinforces a clear trend: attackers are no longer “breaking in,” they’re logging in. Vishing-driven SSO compromise bypasses many traditional security controls because authentication flows are trusted by design. If identity becomes the new perimeter, then SSO misconfiguration, MFA fatigue, and help-desk social engineering are now tier-one attack vectors.

What’s notable here is scale and repeatability. Targeting identity providers allows attackers to industrialize access across hundreds of organizations with similar playbooks. This isn’t about Panera specifically, it’s about systemic weaknesses in identity assurance, employee verification, and SSO recovery workflows.

Companies need to treat identity telemetry with the same rigor as endpoint or network signals. That means stricter SSO enrollment controls, hardened help-desk verification, phishing-resistant MFA, and continuous monitoring for anomalous authentication behavior, especially for admin and customer-facing identity systems.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech

“It’s reasonable to ask whether ShinyHunters or Panera Bread is lying about how many people were compromised in this attack. I would defer to Panera. ShinyHunters estimated the number of customers in the database based on the total number of records, but it didn’t account for duplicates and other outliers. According to breach disclosure laws, Panera Bread combed through the data and found contact information to notify every person affected. Therefore, Panera’s investigation is much more thorough and it’s legally obligated to tell the truth.”

Chris Hauk, Consumer Privacy Champion at Pixel Privacy:

“As always in breaches like this, Panera needs to be upfront with their customers and employees as to how bad the breach is and what the company is doing to protect their data and to guard against future attacks such as this. Employees and customers both should take advantage of any free credit and identity monitoring services that Panera will surely offer.

Unfortunately, this breach exposes the flaws in single sign-on (SSO) services such as those offered by Google, Microsoft, and others. Such services are susceptible to social engineered phishing schemes that trick employees and customers into entering their SSO credentials into fake company portal sites. Once that information is harvested, any site or service that uses those credentials could likely be accessed.”

While a lower number is good. It doesn’t change the fact that Panera got pwned. Whether this is one or one million people who got affected, pwnage is bad. The universe has to get to a place where pwnage isn’t a thing so that nobody has to worry about being affected.

Forcepoint X-Labs Researcher Reveals Sophisticated Dropbox PDF Phishing Campaign 

Posted in Commentary with tags on February 2, 2026 by itnerd

a new research blog post published today by Forcepoint’s X-Labs threat research team that uncovers a highly evasive phishing campaign abusing trusted cloud storage and PDF files to harvest user credentials.

In the blog post — “Fake Dropbox Phishing Campaign via PDF and Cloud Storage” — X-Labs Sr. Security Researcher Prashant Kumar details how attackers are now using multi-stage delivery techniques that evade traditional email, content and link scanning by:

  • Sending a seemingly benign PDF attachment via a business-themed email that bypasses standard filters.
  • Hosting a secondary PDF on a legitimate cloud infrastructure to exploit trust in “safe” services.
  • Redirecting users to a spoofed Dropbox login page designed to steal credentials and deliver them to attacker-controlled infrastructure.

This research highlights how trusted file types and cloud platforms are being weaponized to bypass security controls — a significant shift from traditional phishing vectors and an emerging concern for enterprises and users alike.

You can read the research here: Dropbox PDF Phishing Abuse of Trusted Cloud Storage

Cybernews researchers analyze leaked Bumble data and finds sensitive company documents and user-related identifiers

Posted in Commentary with tags on February 2, 2026 by itnerd

Cybernews researchers analyzed a data sample allegedly stolen from dating app Bumble after the ShinyHunters cybercrime group claimed responsibility for a breach involving internal company systems.

ShinyHunters added Bumble to its dark web leak site on January 29, claiming it exfiltrated approximately 30GB of data from the company’s Google Drive and Slack channels. According to the attackers, the data was obtained by compromising a contractor’s account through phishing. The gang claims to possess “thousands of internal documents” belonging to the company.

Bumble confirmed to Cybernews that a contractor’s account with limited privileges was compromised in a phishing incident. The company stated that the intrusion was detected and contained quickly.

“Our InfoSec team rapidly eliminated the access, and the incident is contained. We have engaged external cybersecurity experts and notified law enforcement. Importantly, there was no access to our member database, member accounts, the Bumble application, or member direct messages or profiles,” a Bumble spokesperson told Cybernews.

Bumble is a widely used dating platform with over 40 million active users and hundreds of millions of downloads globally. The app is operated by Bumble Inc., which also owns Badoo and Bumble For Friends (BFF).

Following the attackers’ claims, the Cybernews research team analyzed the data sample attached to the ShinyHunters dark web post. Researchers say the exposed files appear legitimate, but the dataset shared by the attackers is limited, making it unclear whether it represents the full scope of the allegedly stolen data or only a partial sample.

Based on the analysis, the majority of the exposed material consists of internal corporate information rather than user-facing data. The files include internal company documents such as contracts with partner companies, invoices, policy reviews, onboarding guides, internal reports, and CVs containing candidate employment history and personally identifiable information (PII).

While Bumble stated that no user accounts or messages were accessed, the Cybernews team noted that the sample contains some technical data, including user IDs, session IDs, and authentication cookies. In theory, such data could be abused by sophisticated attackers to attempt account takeover via session hijacking, although no evidence suggests this has occurred.

The dataset also includes information related to a limited number of Bumble in-app groups, known as Hives. While no group members were exposed, some group names, descriptions, welcome messages, rules, and change logs were present in the sample.

ShinyHunters is currently running a broader campaign targeting dating platforms and technology companies. Last week, Cybernews researchers analyzed a leaked Hinge data sample and found it contains user dating profile information, such as names and bios, as well as Hinge subscription data, including transaction IDs and amounts paid.

Cybernews continues to monitor the situation and analyze new information as it becomes available.

You can find a full technical breakdown of the Bumble data sample, the attackers’ claims, and expert analysis on potential risks in the complete investigation published on the Cybernews website here.  

Top Internet Outages of 2025 Studied By Cisco ThousandEyes

Posted in Commentary with tags on January 30, 2026 by itnerd

The folks at Cisco ThousandEyes have put out a study on the Top Internet Outages of 2025. It highlights the top outages and what happened as well as what to expect going forward. It’s an interesting piece and is worth your time to read.

You can find it here: https://www.thousandeyes.com/blog/the-top-internet-outages-of-2025-analyses-and-takeaways

TELUS CEO Darren Entwistle named Distinguished Entrepreneur of the Year

Posted in Commentary with tags on January 29, 2026 by itnerd

Darren Entwistle, president and chief executive officer (CEO) of TELUS, has been named the University of Victoria (UVic) Peter B. Gustavson School of Business 2026 Distinguished Entrepreneur of the Year Award (DEYA) recipient. 

This recognition highlights exceptional entrepreneurial leadership that has reshaped an entire industry, including:

  • Entwistle is the longest-serving CEO in the global telecommunications industry, leading TELUS since 2000
  • Under his 26-year tenure, he transformed TELUS from a regional Western Canadian telephone company into a global communications and IT leader
  • TELUS now holds a brand value of $12.1 billion — making it Canada’s most valuable telecommunications brand
  • Since 2000, TELUS and its team members have contributed $1.8 billion to communities, including more than 2.5 million days of volunteer service, which is more than any other company in the world. 

For more information, please see the University of Victoria’s media release here.

Quorum Cyber’s 2026 Global Cyber Risk Outlook Reveals Cyber Crime Enters an Industrial Phase

Posted in Commentary with tags on January 29, 2026 by itnerd

Quorum Cyber today reveals the extensive, but alarming findings of its 2026 Global Cyber Risk Outlook report. AI automation and Ransomware-as-a-Service (RaaS) platforms have fundamentally altered the threat landscape, enabling nation-state actors to automate up to 90% of intrusions, and pushing vulnerability disclosures past 35,000 for the first time. Attackers abandon slow-encryption tactics, as evidenced by ransom demands in financial services exploding by 179%. Organizations face a stark reality: detection windows are shrinking, barriers to hacker entry are collapsing, and even modestly skilled criminals now wield capabilities once reserved for elite operators.

Insights from the 2026 Global Cyber Risk Outlook are derived from incidents and investigations observed across over 350 global organizations ranging in staff size from 10 to 10,000 throughout calendar year 2025. Highlighted report findings that need to reshape 2026 cyber risk considerations include: 

  • The number of newly formed ransomware groups increased by 30% in the year to October 2025 
  • Global vulnerability disclosures rose 21%, surpassing 35,000 
  • Early evidence of a nation-state group using AI agents to automate up to 90% of an intrusion 
  • Cybercriminals are increasingly shifting away from encryption toward faster, lower-cost data exfiltration attacks 
  • New white-label RaaS platforms enabling rapid launch of branded criminal operations 
  • Average ransom demands surged across multiple sectors, including 179% in financial services and 97% in manufacturing 
  • Nation-state threat actors associated with Russia, China, and Iran remain the top threats to the public sector, while North Korea-linked actors likely earned over $2 billion from cybercrime in 2025 

Industry Sector Companion Reports

In addition, the 2026 Global Cyber Risk Outlook includes companion reports focused on nine industry sectors, including energy, financial services and insurance, healthcare and pharmaceuticals, higher education, housing and construction, legal and professional services, manufacturing, public sector, and retail. Each companion report outlines sector-specific threat dynamics and practical considerations for strengthening cyber resilience. 

Quorum Cyber Teams With Microsoft

To help organizations interpret these findings and prioritize action, Quorum Cyber will host a live webinar on February 25 featuring Lesley Kipling, Chief Security Advisor at Microsoft, alongside Quorum Cyber’s Threat Intelligence leadership. The session will examine how evolving threat actor tactics intersect with modern cloud, identity, and AI-driven environments — and what security leaders should focus on to strengthen resilience heading into 2026.

The 2026 Global Cyber Risk Outlook reflects Quorum Cyber’s Microsoft-first approach to security, informed by deep visibility into cloud, identity, and AI-driven environments. Founded as a Microsoft-first security services provider, Quorum Cyber is a long-standing member of the Microsoft Intelligent Security Association (MISA) and holds all four Microsoft Security specializations: Cloud Security, Identity and Access Management, Information Protection and Governance, and Threat Protection. 

Palo Alto Networks Completes Chronosphere Acquisition

Posted in Commentary with tags on January 29, 2026 by itnerd

As enterprises increasingly rely on AI to run digital operations, protect assets, and drive growth, success depends on one critical factor: trusted, high-quality, real-time data. Palo Alto Networks® (NASDAQ: PANW), the global cybersecurity leader, today announced it has completed its acquisition of Chronosphere addressing a core challenge of the AI era: the inability to see and secure the massive data volumes running modern businesses.

Chronosphere, a Leader in the 2025 Gartner® Magic Quadrant™ for Observability Platforms,1 was purpose-built to handle this scale. While legacy tools break down in cloud-native environments, Chronosphere gives customers deep visibility across their entire digital estate. With this acquisition, Palo Alto Networks is redefining how organizations run at the speed of AI — by enabling customers to gain deep, real-time visibility into their applications, infrastructure, and AI systems — while maintaining strict control over data cost and value.

The planned integration of Palo Alto Networks Cortex® AgentiX™ with Chronosphere’s cloud-native observability platform will allow customers to apply AI agents that can now find and fix security and IT issues automatically — before they impact the customer or the bottom line. AI security without deep observability is blind; this acquisition delivers the essential context across models, prompts, users, and performance to move from manual guessing to autonomous remediation.

The Chronosphere Telemetry Pipeline remains available as a standalone solution, enabling organizations to eliminate the ‘data tax’ associated with modern security operations. By acting as an intelligent control layer, the pipeline can filter low-value noise to reduce data volumes by 30% or more and has been shown to require 20x less infrastructure than legacy alternatives. This will be key to Palo Alto Networks Cortex XSIAM® strategy, ensuring customers can scale their security posture—not their spending—as they transition to autonomous, AI-driven operations.

Black Kite Introduces ThreatTrace

Posted in Commentary with tags on January 29, 2026 by itnerd

Black Kite, the leader in third-party cyber risk management, today announced the release of ThreatTrace™, its new capability that improves threat detection using NetFlow and DNS telemetry to strengthen an organization’s visibility into third-party cyber risk. Black Kite is the first TPCRM vendor to incorporate this deep level of visibility into third-party cyber risk monitoring and ratings, enabling teams to proactively take targeted action with their vendors.

NetFlow and DNS telemetry have long been valuable data sources in the SecOps world for detecting suspicious activity and deepening cyber investigations. With the release of ThreatTrace™, risk teams can detect new IOCs and anomalies to act faster and stay ahead of third-party threats through: 

  • Stronger cyber intelligence with a new set of controls added under the IP Reputation risk category, informed by NetFlow and DNS telemetry
  • Broader IOC and anomaly detection, including botnet-related activity, reconnaissance/C2 communication, potential data exfiltration, and more
  • Greater supply chain visibility by uncovering new subdomains and connected third-party service providers.

With ThreatTrace™, TPRM teams can now proactively detect new indicators of compromise (IOCs) and anomalies, including:

  • Botnet Infection: Identifies IP addresses that have been blacklisted by multiple threat intelligence sources, indicating that an internal asset, like a server, IoT device, or workstation, is likely compromised and actively participating in malicious activity, such as spamming, DDoS attacks, or C2 operations.
  • Suspicious Outbound Activity: Detects active compromises by correlating DNS queries to high-risk domains (e.g., Tor sites, hacker forums, or C2 servers) with corresponding network traffic from the company’s IPs.
  • Active Threat Actor Targeting: Detects when known malicious IP addresses, such as botnets or C2 servers, are actively interacting with a company’s digital assets, indicating an organization is being targeted for reconnaissance or attack.
  • Traffic Baseline Deviation: Flags significant deviations from established traffic patterns, including unusual data volume spikes, connections to previously unseen high-risk IPs, and the use of abnormal ports, which are potential markers of data exfiltration.
  • Geopolitical and Service Risks: Identifies unauthorized services and suspicious data flows directed toward high-risk or sanctioned countries to detect both potential data leakage and compliance violations.

ThreatTrace™ leverages NetFlow and DNS telemetry to strengthen cyber intelligence, helping teams detect threats earlier and stay ahead of third-party cyber risk. To learn more, visit https://blackkite.com/solution-briefs/black-kite-threattrace.

Sophisticated Fraud Network Drains Canadians Bank Accounts Through Fake Government Sites

Posted in Commentary with tags on January 29, 2026 by itnerd

CloudSEK’s Global Threat Intelligence team has just uncovered a massive, evolving fraud operation targeting Canadian citizens through highly sophisticated impersonations of government services, Canada Post, and Air Canada. This isn’t your typical phishing scam – it’s a coordinated, multi-layered attack that’s exploiting the trust Canadians place in their public institutions.

Here’s what makes this urgent:

  • 70+ fake domains impersonating canada.ca traffic portals discovered on shared infrastructur
  • Threat actors are selling ready-made phishing kits on dark web forums for as little as $200-$300
  • The operation targets every major Canadian province – BC (PayBC), Ontario (ServiceOntario), Quebec, and beyond
  • Victims are losing banking credentials, credit card data, and Interac e-Transfer access
  • The “PayTool” group has evolved from simple scams to mimicking entire government payment ecosystems

What’s particularly alarming is the sophistication: victims aren’t immediately asked for payment. Instead, they are walked through a “validation phase” requesting ticket numbers or booking references – building false trust before harvesting financial data through fake payment gateways that perfectly mimic legitimate processors.

The report reveals how this Phishing-as-a-Service model is democratizing fraud, with underground forums showing threat actors actively selling Ontario driver’s license phishing kits that claim to include “14 bank pages.”

This is a story with real public safety implications. As tax season approaches and travel increases, Canadians need to know how these scams operate and how to protect themselves.

Full technical report available here: https://www.cloudsek.com/blog/pivoting-from-paytool-tracking-various-frauds-and-e-crime-targeting-canada