A Cybersecurity Specialist’s Survival Guide for the Holiday Season From Outpost24

Posted in Commentary with tags on December 18, 2025 by itnerd

With the holidays right around the corner, and cybercriminals’ activity increasing during business downtime, it is more important than ever for organizations and individuals both to take practical steps to protect themselves from potential cyber-attacks. 

Noé Mantel, Cybersecurity Specialist at Outpost24, has shared the following tips for how to do just that:

Tip #1: Check the reliability of your backups 

Before going on holiday, it is essential to ensure that critical backups are up to date, functional, and stored offline. Organizations should systematically test their data recovery procedures and ensure that no backups are stored on the same network as production systems to prevent ransomware from encrypting or deleting them. 

Tip #2: Apply updates and patches before the holidays 

The end of the year is an ideal time to deploy pending patches and update obsolete software. Regular vulnerability analysis allows you to prioritize risks and fix systems exposed to the internet or close to critical assets first. A centralized patch management system, based on risk assessment, is an essential pillar of effective security. 

Tip #3: Strengthen your network security 

Multi-layered segmentation limits an attacker’s lateral movement in the event of an intrusion. Filtering malicious IP addresses, using URL whitelists, and closing unnecessary ports are simple actions that greatly reduce the attack surface. Regular traffic analysis also helps identify potential anomalies. 

Tip #4: Closely monitor the most exposed services 

Remote access such as RDP and VPNs must be protected by automatic locking mechanisms and monitored via connection logs. It is also recommended to disable all unused ports and to check the security practices of third-party service providers and employees working remotely. 

Tip #5: Avoid public USB ports when travelling 

Juice jacking remains an emerging and little-known threat. Companies must educate their teams never to use public charging ports in train stations, hotels or airports. A personal mains charger or external battery is the safest alternative. 

Tip #6: Adopt rigorous identity and access management 

Identity control is central to protecting infrastructure. IAM provides complete visibility into users, their permissions and their login behavior. Contextual analysis and artificial intelligence make it easier to detect anomalies without imposing overly restrictive rules. 

Tip #7: Strengthen your passwords and MFA 

The implementation of unique, sufficiently complex and regularly renewed passwords remains a fundamental aspect of cybersecurity. The use of password managers and the systematic adoption of multi-factor authentication significantly reduce the risk of compromise. Tools that block compromised passwords further strengthen this essential barrier. 

Telehouse Canada Partners with Megaport to Deliver Advanced Cloud Connectivity Solutions

Posted in Commentary on December 18, 2025 by itnerd

Telehouse Canada has announced a strategic partnership with Megaport, a global leader in Network as a Service (NaaS). The partnership will bring advanced cloud connectivity options to Telehouse Canada data centres, enabling Telehouse Canada’s customers to access Megaport’s extensive global network ecosystem of more than 280 cloud on-ramps and over 300 service providers, delivering flexible, scalable connectivity to leading cloud platforms and global IT services.

Organizations within Telehouse Canada’s ecosystem can now easily build flexible, high-performance network architectures that support a range of workloads, including hybrid and multi-cloud environments. The Megaport Portal is accessible from all Telehouse Canada data centres, allowing businesses to establish private connections to global locations across the regions where Megaport operates.

Through Megaport’s global platform, the integration simplifies cloud networking by enabling on-demand scalability and improving operational efficiency. Organizations can access a broad range of connectivity services, including Megaport Cloud Routers for direct data transfer between multiple clouds, while API integration automates the deployment and management of scalable services.

Organizations can also access Megaport’s AI Exchange (AIx) advanced ecosystem, designed to enhance connectivity for AI-driven organizations. This intuitive global platform enables seamless integration and instant access to leading GPUaaS providers, neoclouds, third-party AI models, storage and compute. AIx empowers organizations to seamlessly interconnect with AI resources while ensuring the rapid and reliable delivery of all global AI capabilities.

Telehouse Canada and Megaport are committed to advancing their collaboration, working together to strengthen the digital foundations that support Canadian organizations. Together, they aim to help shape the future of secure, high-performance connectivity in Canada and beyond.

Hypori Launches New Global Partner Program

Posted in Commentary with tags on December 18, 2025 by itnerd

Hypori today announced the launch of the Hypori Partner Program, enabling resellers, managed service providers (MSPs), system integrators (SIs), and technology partners to unlock new revenue opportunities by delivering secure mobile access — without data ever touching the device.

The program formalizes Hypori’s rapidly increasing partner momentum across commercial and public sector markets, following successful collaborations with Carahsoft, Amazon Web Services (AWS), Zscaler, and Summit 7. With dedicated enablement resources, deal registration, incentives, and co-marketing support, Hypori is deepening channel investment and expanding its ecosystem to capture part of the global BYOD market that industry analysts predict to have strong growth. In fact, Data Bridge Market Research estimates that the sector will experience a CAGR of 9.2% and is expected to reach $188.3 billion in market size.

As organizations eliminate second-device programs and embrace BYOD with zero-trust requirements, demand for VMI is surging. Hypori enables secure access to enterprise and government resources — without data ever residing on the personal device — helping customers cut device spend, reduce compliance risk, and protect data across a number of security standards – such as Cybersecurity Maturity Model Certification (CMMC), Health Insurance Portability and Accountability Act (HIPAA), Federal Risk and Authorization Management Program (FedRAMP) High, General Data Protection Regulation (GDPR), Commercial Solutions for Classified (CSfC), and more.

Hypori’s program gives partners a strong foundation to capture the growing demand for BYOD — delivering a virtual workspace at up to 50% lower cost than corporate device programs, securing enterprise data by keeping it off endpoints entirely, and expanding market opportunities across federal, healthcare, financial, and enterprise mobility sectors.

The Hypori Partner Program delivers the tools and support needed to accelerate growth, including deal registration, co-marketing opportunities, sales playbooks, enablement content, and competitive incentive structures. With flexible deployment options across SaaS and on-prem, partners can build profitable, repeatable revenue streams and bring secure BYOD mobility to customers faster than ever.

To learn more about Hypori’s Partner Program or to become a trusted partner, visit https://www.hypori.com/partners.

Richmond, VA mental health service notifies 113,000+ people of data breach

Posted in Commentary with tags on December 17, 2025 by itnerd

Comparitech has reported that The Richmond Behavioral Health Authority in Virginia has notified 113,232 people of a September 2025 data breach, according to the US Department of Health and Human Services.

Rebecca Moody, Head of Data Research at Comparitech, commented: 

“While ransomware attacks have increased by 27 percent this year (rising from 2,865 in 2024 to 3,637 in 2025 to date), US healthcare providers haven’t seen the same influx. In fact, as it stands, it looks as though attacks in 2025 (280 noted so far) will be similar to 2024’s level (294 noted in total). Average ransom demands on this sector have also declined, dropping from $881,500 across the 294 noted in 2024 to $452,900 across the 280 noted so far this year.

Nevertheless, this latest breach notification from Richmond Behavioral Health Authority serves as a reminder that, even though the healthcare sector may be getting a small reprieve from ransomware gangs, the effects of these attacks when they do happen are no less significant. It also highlights how gangs are increasingly focused on data theft as part of their attacks. Qilin alone is responsible for 10 known data breaches following ransomware attacks on US healthcare providers this year with over 409,000 records breached in total.”

Once again, health care is the victim of a ransomware attack. The madness needs to stop with this sector. Though I could copy and paste that for education and government who are equally as vulnerable.

700Credit Data Breach Analysis By Outpost24

Posted in Commentary with tags on December 17, 2025 by itnerd

Researchers at Outpost24 have published a new analysis on the recent 700Credit breach. This analysis dives into the origin of this breach and the database’s appearance on the darkweb.  I covered this news previously here.

Here’s the link to the analysis: https://outpost24.com/blog/700credit-data-breach/

Understanding React2Shell: Critical Remote Code Execution in React Server Components and Next.js

Posted in Commentary with tags on December 17, 2025 by itnerd

It is being reported that a ransomware gang is exploiting the critical React2Shell vulnerability (CVE-2025-55182) to gain initial access to corporate networks and deploy the file-encrypting malware less than a minute later.

Outpost24 researchers just recently published an in-depth look at the React2Shell vulnerability, diving into what exactly the vulnerability is, how the exploit works, its exploitation characteristics, as well as practical detection, remediation tips, and risk management implications. 

The team commented, “The RSC model is designed to let servers return rendered UI fragments to clients efficiently. Behind this capability is a serialization and deserialization protocol, often called the Flight protocol that encodes component data and function calls for transport between client and server.

The React2Shell vulnerabilities arise because the deserialization logic in the Flight protocol does not validate untrusted data fully. When a server receives a maliciously crafted Request payload, the decoder may incorporate attacker-controlled values into internal objects and execution paths. This missing validation allows an attacker to control execution flow and trigger arbitrary code execution in the server process context.

Since Next.js builds on the same underlying React RSC infrastructure, applications that include RSC support (especially with the App Router) are also affected unless they have been updated to include the patched React implementation.”

For full details, the analysis can be found here: https://outpost24.com/blog/react2shell-cve-2025-55182-react-vulnerability/

New survey shows majority of Canadians and Americans think about data privacy before shopping with a company  

Posted in Commentary with tags on December 17, 2025 by itnerd

This holiday season, while shoppers search for the perfect gifts and best deals, they’re also navigating countless requests for their personal information. An email address for the receipt? A phone number for delivery updates? According to the latest TELUS Data Trust Survey, Canadian and American shoppers are increasingly pausing to consider their privacy: What am I getting in return? What are you doing with my data? This shift toward intentional data sharing means retailers must demonstrate clear benefits – convenience, savings, or better service – and respect for customers’ data privacy in order to build the trust required for customers to hand over their information and do business with them.

The survey reveals that 78% of Canadians and 80% of Americans are more likely to buy from companies they trust. In fact, 70% of Canadians and 72% of Americans actively consider respect for their data privacy when deciding whether to trust a company. Yet confidence in organizations remains low. Only 39% of Canadians believe Canadian organizations respect data privacy – and just 19% say the same about American organizations. Americans share similar concerns, with only 37% believing that U.S. organizations respect data privacy and 31% saying they believe Canadian organizations respect data privacy. For the two-thirds of consumers who prioritize data privacy and trust over convenience (66% of Canadians and 71% of Americans), trust has become a deal-breaker.

As shoppers navigate deals and digital offers this season, they’re paying close attention to how companies handle their personal information. Here are some questions they can consider before they buy:

Clarity matters

  • Is the privacy policy understandable? 85% of Canadians and 86% of Americans want privacy policies presented in a user-friendly way. Consumers want to clearly understand how a company uses their data.
  • Is the company transparent about what it does with customer information? 90% of Canadians and 91% of Americans want to know how their personal information is used. Shoppers should look for companies that spell it out clearly.

Safety first

  • How does the company handle security? 89% of Canadians and 90% of Americans want companies actively looking for ways to improve data security. Shoppers should look for companies that talk openly about their data practices.
  • What happens if something goes wrong? 91% in both countries want honesty and openness in the event of a data breach. Has the company been transparent about past issues?

Built-in trust

  • Does the company have a data ethics program? 86% of Canadians and 87% of Americans say having data ethics experts on the team makes them more willing to trust a company. Companies serious about privacy make it part of their values and operations.
  • Is the company committed to responsible AI? 85% of Canadians and 86% of Americans want companies to commit to responsible AI use—especially important as AI becomes commonplace.
  • Does the company invest in training its employees? 60% of Canadians and 65% of Americans trust companies that provide data literacy training to their staff more than those that don’t.

Consumers have the power to choose companies that deserve their trust. By asking the right questions about privacy and data practices, shoppers can ensure their personal information is treated with the same respect as their hard-earned money.

Learn about TELUS’ commitment to data and trust by visiting: telus.com/trust.

About the survey

The statistics found in this release are taken from our 2025 AI & Data Trust research study. This study polled 5,487 Canadian members and 6,109 American members of Leger’s online panel from September 2 to 28, 2025. These numbers includes a sample of the population of Canada and America that matches the census in terms of age, gender, and region, with boosts in demographic groups including women, youth (12–18 years old), Indigenous Peoples, Black women, LGBTQ2S+, individuals with disabilities, low-income individuals, seniors, immigrant populations (past five years), and racialized groups historically underrepresented in Canada (e.g., South Asian, Chinese, Black).

Guest Post – Keepit predictions for 2026: From hype-check to hard truths — real protection, real risk, real demand

Posted in Commentary with tags on December 17, 2025 by itnerd

Last year, Keepit predicted that 2025 would be the year SaaS data protection stops being optional and becomes a must-have — as data volume increases, API strain grows, and practical AI solutions start to win over hype.

Now, as we look ahead to 2026, our view sharpens. The growing complexity across cloud, hybrid, compliance and threat landscapes forces us to confront three truths: first, protecting cloud data must become non-negotiable; second, AI should be used deliberately to defend, not just to automate; third, compliance and regulatory pressure are reshaping how and where data lives.

Here are four hard-edged predictions from Keepit’s expert voices — each built on real trends and a clear roadmap, not marketing fluff.

  • AI offense evolves faster than defense — unless leaders demand transparency

Kim Larsen, Chief Information Security Officer

AI-driven attacks will become highly adaptive. By 2026, adversaries will use AI systems that map entire infrastructures in seconds, identify weak links deep in the supply chain, and shift tactics in real time to bypass defenses. Hybrid warfare will amplify this trend as hostile actors blend geopolitical intent with AI-enabled automation at scale.

Defenders will match this only if they adopt AI with intention and transparency. Security teams will use AI to understand exposure, strengthen detection, and model where risk concentrates. But success will depend on knowing how an AI system works, what data it relies on, and how decisions are made. CISOs will demand clarity, control, and accountability. The organizations that win will be those that use AI to enhance—not replace—human judgment.

  • Hybrid is back—and so is the race for skills

Jakob Østergaard, Chief Technology Officer

Hybrid environments will grow faster than anyone expected. After years of cloud-first narratives, companies are re-evaluating what belongs where. Political instability, rising sovereignty requirements, and cost pressures are pushing critical workloads back on-premise. Servers, storage systems, and licensed software are seeing a resurgence because organizations want balance, not absolutism.

This shift exposes the growing skills gap. Demand for deep technical expertise in networking, Linux, and systems engineering is accelerating while talent inflow is shrinking. By 2026, this shortage will influence everything from innovation speed to resilience planning.

Meanwhile, quantum and AI will face a public reckoning. The promise of crypto-breaking quantum machines and near-term AGI will give way to more realistic timelines. Investments will continue, but the narrative will mature as enterprises look for practical, defensible value rather than speculative breakthroughs.

  • AI stays practical in 2026, while modernization remains the real priority

Niels van Ingen, SVP Business Development and Strategy

AI adoption in 2026 will feel familiar. Most enterprises will continue using agentic AI to automate repeatable tasks and augment existing processes, not reinvent them. Only one in 5 organizations report getting meaningful value from their AI tools at the current time with key adoptions challenges being cost and lack of control mechanisms in context of the desired outcomes. Autonomous business intelligence will remain niche because the foundations including infrastructure required are simply not ready: data quality, governance maturity, and organizational skills still lag far behind the ambition.

Modernization efforts will remain the primary focus. Companies will keep working through the practical realities and motions to replace platforms like VMware and Citrix, while using SaaS to accelerate outcomes where it makes sense. At the same time, compliance and regulatory pressure will intensify. Leaders will need a clear understanding of sovereignty requirements, new operating models, and the talent divide between “old way” and “new way” practitioners.

In 2026, CIOs will be planning for what IT must look like in 2030. The problems they solve today will not be the ones they face next and there is a lot of pressure on the IT suite to ensure companies are ready and competitive as the AI  transformation gains momentum.

  • Compliance goes default: NIS2 and DORA will reshape every SaaS RFP

Jan Ursi, VP Global Channels

By 2026, compliance expectations will become embedded in nearly every SaaS data protection RFP. Requirements tied to NIS2 and DORA will shift from “requested” to “assumed,” especially in finance, energy, healthcare, and the public sector. Organizations will insist on local digital sovereignty: data stored in-region, zero sub-processors, and guaranteed access even if the original SaaS platform is unavailable.

Because many companies are still in the early stages of meeting these regulations, demand will rise sharply as deadlines tighten. Local partners will play an essential role. They understand national sovereignty rules, infrastructure constraints, and the operational realities of regulated industries. As a result, the channel will become a core enabler of compliant SaaS adoption, not an afterthought.

About Keepit

Keepit provides a next-level SaaS data protection platform purpose-built for the cloud. Securing data in a vendor-independent cloud safeguards , boosts cyber resilience, and future-proofs data protection. Unique, separate, and immutable data storage with no sub-processors ensures compliance with local regulations and mitigates the impact of ransomware while guaranteeing continuous data access, business continuity, and fast and effective disaster recovery. Headquartered in Copenhagen with offices and data centers worldwide, over 20,000 companies trust Keepit for its ease of use and effortless backup and recovery of cloud data.

Outpost24 Secures New Investment to Scale its Exposure Management and Identity Security Solutions

Posted in Commentary with tags on December 17, 2025 by itnerd

Outpost24 today announced a new investment from Vitruvian Partners to fuel its next phase of global growth. This significant new funding will accelerate innovation across the company’s platform, with a focus on integrating AI capabilities to optimize how security teams identify and neutralize critical vulnerabilities.

The only European vendor recognized as an overall leader in the 2025 KuppingerCole Leadership Compass Report for Attack Surface Management, Outpost24 delivers a distinct approach to cyber defence that empowers security teams to gain a complete understanding of their digital and human risk landscape.

Last week, Outpost24 announced the acquisition of Infinipoint, a specialist in device identity, posture validation, and secure workforce access. The acquisition marks the company’s entry into the Zero Trust Workforce Access market and lays the foundation for its identity security division, Specops, to offer a unified approach that evaluates both the user and the device before access is granted. Through the strategic integration of its solutions — spanning external risk, identity, and device trust — Outpost24 is setting a new standard for cybersecurity. The company’s roadmap is focused on next-generation AI capabilities to catapult businesses forward, enabling them to prioritize the most critical threats and secure their assets.

The recent acquisition followed by today’s funding announcement mark the conclusion of a stellar year for Outpost24. Earlier this year, the company launched CyberFlex, a flexible, next-generation solution that integrates External Attack Surface Management and Penetration Testing as a Service (PTaaS) to help organizations efficiently manage and secure external-facing applications. Built on a pay-as-you-go credit model, CyberFlex embodies the shift toward consumable cybersecurity — giving customers the flexibility to dynamically allocate testing resources, scale coverage, and control costs as their security priorities evolve.

With over two decades of expertise, a strong European foundation, and thousands of customers worldwide, Outpost24 is expertly positioned to help organizations stay ahead of evolving cyber threats. By combining its leading Attack Surface Management platform with Specops’ specialized identity and password security, and the newly added strength of device identity and secure workforce access, Outpost24 delivers a truly comprehensive security picture that moves beyond conventional scanning methods. This empowers security teams to instantly identify, prioritize, and remediate the most critical risks, fundamentally strengthening resilience across both digital and human attack surfaces.

From 2025 to 2026: Identity Security Insights and Priorities 

Posted in Commentary with tags on December 17, 2025 by itnerd

Specops Software analysts have published an analysis on the evolution of identity and password security in 2025, and the outlook for 2026. 

The piece highlights several major shifts seen over the past year:

  • Identity and access management is now being treated as an organization-wide business risk, not just an IT issue
  • Third-party access and supply-chain relationships have emerged as one of the most significant identity threat vectors
  • Regulatory pressure is increasing around MFA and supplier security, particularly in data-heavy sectors like healthcare
  • Passwordless authentication is advancing, but operational realities mean passwords are unlikely to disappear in 2026
  • Cybersecurity culture and user training are increasingly critical as AI-driven social engineering accelerates

For full details, please see the analysis here: https://specopssoft.com/blog/identity-security-insights-priorities-2026/