My Future On Twitter Is Uncertain…. And That’s Because Of Elon Musk

Posted in Commentary with tags on November 6, 2022 by itnerd

I joined Twitter in 2013 to amplify the reach of my blog. And to be frank, I have been able to do with a decent degree of success. I’ve met and interacted with people that I might not have if I wasn’t on Twitter. Plus I got the attention of some brands who I got to chance to work with over the years which helped to increase the visibility of this blog.

But along the way, Twitter started to become toxic. And eventually Twitter became very toxic. I found myself having to block people and report people for using racial slurs towards me. Because at some point over the years, people have found it perfectly fine to degrade, bully, and intimidate people online. Something that I am pretty sure that 98% of them would not do in real life. Still, I continued on with Twitter.

Now we have Elon Musk taking over Twitter. And his desire to make Twitter a town square where people can say and do what ever they want with few if any restrictions is downright frightening. I can see a scenario where every racist, sexist and homophobe among other low life scumbags appearing and making Twitter even more toxic than it already is. Sure Musk is saying that he’ll have a moderation council to make the call in terms of someone crossing the line. And that council will have “diverse viewpoints”. But I really don’t see that being effective, or even happening at all. Because Elon Musk isn’t going to turn Twitter into a town square because he has two big issues right now that need immediate attention. His first goal is making sure that advertisers, which is Twitter’s primary source of income, don’t flee the platform en masse. Which is apparently happening as I type this. The second is to figure out how to pay back the massive amount of money that he borrowed to buy Twitter. Yes he’s slashing jobs. But that’s only going to get him so far. And yes he wants to revamp Twitter Blue to be $8 a month and include verification as part of the deal. But that’s a half baked idea that is facing a large amount of backlash. Largely because part of this scheme allows anyone to be verified. As in literally anyone. The problem with that is that if everyone is verified, then nobody is verified. Plus it’s not as if some rouge nation who wants to use social media to influence elections and politics in another country won’t spend some cash to get a bunch of bots onto Twitter Blue and amplify their message that way.

And Musk is clearly too desperate to make as much money as quickly as possible to see that.

The fact is, that anything and everything he does is being driven by the fact that he wanted to buy Twitter, then tried to get out of buying Twitter, and then was basically forced to do so when it was clear that Twitter who sued him for trying to back out of the deal was going to win that lawsuit. Thus leaving him wondering what is he going to do having massively overpaid for Twitter with money he doesn’t have.

Cue the panic.

And that panic will affect every Twitter user in a negative way. Everyone from the woman who follows Oprah, someone like me who is simply trying to amplify my voice, to politicians or celebrities, and the like. And while he is in full panic mode and making random decisions because of that, Twitter is only going to take a steep decent into being the hellscape that he claims doesn’t want it to be.

And stuff like this from Musk doesn’t help the situation:

And why does Musk do stuff like this when people ask him legitimate questions?:

Then there’s situations like this one which are becoming increasingly common since Musk took over:

Ditto for revelations like this post Musk’s massive layoffs:

There’s also news that Twitter’s Trust And Safety team has been downsized by 15% ahead of the US mid-term elections. I mean, what could possible go wrong in terms of fighting misinformation during a major election in the US when Musk does that?

In other words, Elon Musk’s panic driven decision making will kill Twitter. Assuming that his erratic and bizarre behaviour doesn’t kill it first. Because what you see above is only a taste of things to come with Musk at the helm of Twitter on what seems to be a suicide mission. Which means that I need to be someplace else. Now it is entirely possible that Musk will pull some sort of rabbit out of the hat and turn Twitter into an ATM machine, and also make it less toxic than it is at present. But to be completely frank, I don’t see either of those things happening under Musk’s leadership.

Now where I will be going after I make what seems to be at this point the inevitable decision to leave Twitter, I have no clue at the moment. But I am considering my options. And you’ll be among the first to find out when I make my decision as to where on social media I go to. The bottom line is that Twitter was in trouble and a toxic environment before Elon Musk. But he’s hasn’t got the capability to fix it, which means that Elon Musk will be the one who writes Twitter’s epitaph. Which is bad news for everyone on Twitter.

Lock Bit Pwned Continental Tires

Posted in Commentary with tags on November 5, 2022 by itnerd

Continental is one of, if not the largest tire company in the world. I’ve had their tires on my bikes and a couple of cars that I’ve owned. Too bad for them that Lock Bit claims to have pwned them in a ransomware attack:

The LockBit ransomware gang has claimed responsibility for a cyberattack against the German multinational automotive group Continental.

LockBit also allegedly stole some data from Continental’s systems, and they are threatening to publish it on their data leak site if the company doesn’t give in to their demands within the next 22 hours.

The gang has yet to make any details available regarding what data it exfiltrated from Continental’s network or when the breach occurred.

It is possible that this is linked to a security breach in early August. But that’s hard to say. The 22 hours should be up at any time so I guess we’ll find out what Lock Bit has access to. But this illustrates the current nature of ransomware gangs. Get in, steal data, and threaten to leak it if one doesn’t pay up. Thus companies need to be ready to ideally prevent being victims of this sort of activity.

Software AG Government Solutions Partners with DH2i 

Posted in Commentary with tags on November 4, 2022 by itnerd

DH2i® the leading provider of always-secure and always-on IT infrastructure solutions, and Software AG Government Solutions, today announced they have entered into a partnership. A trusted provider of FedRAMP solutions, Software AG Government Solutions, will integrate DH2i’s DxEnterprise (DxE) Smart High Availability Clustering software into its FedRAMP authorized cloud to achieve near-zero downtime within its own SQL Server Availability Group (AG) Kubernetes cluster. Software AG Government Solutions will offer the combined solution to its U.S. federal, state, and local government customers, as well as its aerospace and defense industry clients.

The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP empowers agencies to use modern cloud technologies, with emphasis on security and protection of federal information, and helps accelerate the adoption of secure, cloud solutions.

DxEnterprise enables an enterprise’s true digital transformation (DX) by speeding the adoption of highly available stateful containers and providing SQL Server Availability Group (AG) support for SQL Server containers in Kubernetes clusters.

DxEnterprise Smart High Availability Clustering Software Features & Benefits:

  • HA for SQL Server Availability Groups in Kubernetes—with automatic failover, an industry first. This enables customers to deploy stateful containers to create new and innovative applications.
  • Near-zero recovery time objective (RTO) failover for instances and containers at the database-level– enables operations to deliver better products and services more efficiently and resiliently at a lower cost to the business.
  • Distributed Kubernetes AG clusters across availability zones/regions, hybrid cloud and multi-cloud environments—with built-in secure multi-subnet Zero Trust Network Access (ZTNA) tunnel technology. This enables customers to rapidly adapt to changes in market conditions and consumer preferences.
  • Intelligent health & performance QoS monitoring with alerts for SLA assurance and simplified system management.
  • Mix and match support for Windows and Linux; bare-metal, virtual, cloud servers – maximizes IT budget ROI.

For those attending the upcoming 2022 PASS Data Community Summit, taking place at the Seattle Convention Center, November 15-18, please join Jeff Estes, Senior Director, Systems Engineering, Software AG Government Solutions for his presentation:

Deploying SQL Server AGs in EKS for Secure Federal Government Cloud Services

November 16, 6:45 am – 7:55 am; Room 608-609

The use of containers in the Federal Government is exploding as it looks for better ways to improve the performance, scalability, and portability of their applications in secure cloud environments. Despite the promise of containers, deploying SQL Server AGs in Kubernetes remains a hurdle that organizations struggle to overcome. Join Jeff Estes of Software AG Government Solutions for breakfast to learn how he used DH2i’s DxEnterprise to jump the hurdle and deploy highly available SQL Server Availability Groups (AGs) in EKS certified for FedRAMP. (Reserve your spot here: https://www.eventbrite.com/e/deploy-ha-sql-server-ags-in-eks-certified-for-fedramp-tickets-439683534287)

Mass Layoffs Begin At Twitter As Twitter Gets Sued

Posted in Commentary with tags on November 4, 2022 by itnerd

This is going to be an interesting day. And not in a good way.

So it appears that the layoffs have begun at Twitter. And here’s the rather brutal details:

“It’s going East to West,” one person said. People working for Twitter in London were first to find out, then New York, then people working remotely in the Midwest. California, Twitter’s biggest hub, came last, multiple employees said.

“My entire team is gone,” one person affected by the layoffs in New York said. They worked on a team of 30-plus people. Another person estimated that 90% of their team was cut.

Meanwhile, Musk ignored the layoffs publicly, tweeting “Why is small talk even legal” as his employees were being let go. 

By closer to 11 pm PT, more than 1,000 people at Twitter had lost their jobs, according to employees and messages seen by Insider. The cuts went across the company, from Singapore to the U.K. to Fan Francisco, hitting every department. Content moderation and health, advertising, data storage, product, legal, program management, all were hit with layoffs. Cuts were deep in most areas, but some were so drastic one person said they “don’t know how we keep things going in some areas.” 

Hundreds of Twitter workers began posting to Twitter about losing their jobs, too. Many wrote of gratitude for the years they spent working at the platform and for their colleagues. “Best job I ever had,” one person said. “So it ends,” another wrote.

Musk may be ignoring the carnage that he’s causing, but he can’t ignore this lawsuit that’s been filed that will make his life miserable:

The suit filed in U.S. District Court in San Francisco names five current or former workers as plaintiffs, one of whom was told he was terminated effective Tuesday, according to the lawsuit. It names Twitter as the defendant.

Three other staff members have been locked out of their Twitter accounts as of Thursday with no formal notice of a layoff, which they interpret to mean they will lose their jobs, according to the lawsuit.

“Twitter is now engaged in conducting mass layoffs without providing the required notice under the federal WARN Act,” the lawsuit says, referring to the Worker Adjustment and Retraining Notification Act that requires 60-day notice for certain plant closings or mass layoffs.

As it typical for Musk, he didn’t think these layoffs through and now he’s likely to get owned in court. But I am a computer nerd, not a lawyer. I say that because the Worker Adjustment and Retraining Notification Act isn’t something that he can ignore. But knowing how he thinks, he will try. And there are similar laws in states including California where Twitter has its HQ. Thus I can see more lawsuits like this coming. Especially in California who I am pretty sure aren’t fans of Musk after he bashed them over taxes and regulation and moved Tesla’s HQ to Texas as a result. It might be payback time for that state.

Musk may have just made life a lot more complicated for himself. And a lot of people will enjoy seeing his squirm.

TELUS Q3 Numbers Are Out And They Show Growth On The Wireless Side Of Things…. Not So Much On The Internet Side Of Things

Posted in Commentary with tags on November 4, 2022 by itnerd

In my attempt to see how the great Rogers outage in July affected the Canadian telco landscape, I’ve been tracking the Q3 results of the “big three” telcos here in Canada. Yesterday Bell released their Q3 numbers and they showed “best-ever” growth in Q3. Today TELUS released their numbers and I’ll let TELUS CEO Darren Entwistle give you the highlights:

“In the third quarter, the TELUS team once again demonstrated continued execution excellence, characterized by the potent combination of industry-leading customer growth, resulting in strong operational and financial results across our business,” said Darren Entwistle, President and CEO. “Our robust performance reflects the chemistry of our globally leading broadband networks and customer-centric culture, which enabled our strongest quarter on record, with total customer net additions of 347,000, up more than 8 per cent, year-over-year. This included strong mobile phone net additions of 150,000, up 11 per cent over last year and the best quarterly result since the third quarter of 2010; record high connected device net additions of 124,000; and industry-leading total fixed net additions of 73,000. Our leading customer growth is underpinned by our consistent, industry-best client loyalty across our mobile and fixed product lines. Notably, again this quarter, blended mobile phone, PureFibre internet, security and voice churn were all at or below one per cent. Moreover, our industry-leading postpaid mobile phone churn of 0.76 per cent represents the eighth quarter out of the last 11 below 0.80 per cent.”

So to recap, TELUS added 347,000 new customers. And 150,000 of the new customers are mobile customers, representing “the best quarterly results since the third quarter of 2010” and an 11 percent increase year over year. The other thing that I notice is their churn rate, or people who leave TELUS continues to be low. Thus these are good numbers for TELUS. The only thing that might be a negative is this:

Internet net additions were 36,000 in the third quarter of 2022, a decrease of 10,000, due to modestly higher churn compared to relatively low churn rates during heightened pandemic restrictions in the prior year, in addition to macroeconomic pressures impacting consumer purchasing decisions. This was partly offset by our success in driving strong gross additions through bundled product offerings, including the TELUS Whole Home bundle and our bundling of mobility and home services.

TELUS only has its Internet offerings in Western Canada, so they don’t have the same opportunity to steal customers from Rogers that Bell has. Though if anyone from TELUS is reading this message, if you come east to Ontario, Quebec and beyond, I am certain that you can grab your share of customers from both Rogers and Bell.

So with two of the “big three” reporting. And both showing growth with low amounts of churn, that leaves Rogers to report. That’s going to happen on the 9th of November, and it will be interesting to see how bad Rogers churn numbers are, and what the rest of their results look like.

French Threat Group Steals $11M

Posted in Commentary with tags on November 3, 2022 by itnerd

New research from Group-IB on OPERA1ER shows the threat group has stolen at least $11 million from banks and telecommunication services providers. The OPERA1ER obtained initial access via phishing emails and would spend 3 to 12 months inside compromised networks, performing lateral phishing attacks and studying internal documentation to understand money transfers.

Mike Fleck, Senior Director of Sales Engineering at Cyren:

     “Combining phishing, malware, and account takeover is a common attack chain. What seems to differ is the motivation of the attackers. A bad actor doing a “spray and pray” campaign will grab whatever data is available once they’ve takeover an account (e.g. recent GitHub account compromise at Dropbox). However, it’s the determined and targeted attacks that pivot off the initial access to launch a more profitable/damaging follow on. Regardless, phishing remains an unsolved issue and a precursor for data breaches and financial losses.”

Clearly OPERA1ER is a dangerous group that needs to be monitored as I can see them evolving to be even more dangerous over time. In the meantime, the report is very much worth your time to read.

UPDATE: Dr. Darren Williams, CEO and Founder, BlackFog had this comment:

     “The Ransomware as a Service model is alive and well and is now the defacto standard for cybercriminals. This gives hackers the ability to leverage the best tools available at any moment in time for a percentage of the takings. This latest attack with gains of $11m just proves how viable this model really is. It also clearly demonstrates that existing EDR based solutions offer too little, too late to really protect the organizations key asset, its data. As we can see from these attacks, once a hacker has gained access to the network, lateral movement and data exfiltration plays a key role in the success of the attack. Organizations should be focused not only on defensive approaches, but also on anti data exfiltration to protect any possible lateral movement or data loss to prevent any attempt of data extortion.”

EdTech Cyber Expert Comments On Governments Hyper Focused K-12 & HigherEd Cyber Response And Reporting Activity/Efforts

Posted in Commentary with tags on November 3, 2022 by itnerd

There’s been a lot of activity this week on education cybersecurity. Starting with the federal student aid CISO begging the government to make cyber incident reporting for higher education institutions to be at the same standard as K-12 institutions, and a recent report from the GAO criticizing the U.S. Department of Education for not sufficiently coordinating communication between school districts and the feds on cybersecurity.

Stan Golubchik, Co-Founder and CEO, ContraForce, works directly with K-12 and higher education institutions to detect attacks and incidents. In response to Educause’s annual conference, specifically the education department and federal student aid office CISO on cyber incident reporting, Stan says: 


“While there are over 9,000 EdTech tools in the K12 space, it is unknown how many tools are actually used in Higher Education (HigherEd institutions are not held to the same standards of reporting as K12). This is precisely why the government is begging HigherEd to report on cyber attacks— because today, there is no reason for private colleges to report anything to anyone.”

“With the proliferation of remote education and SaaS applications, colleges struggle with knowing when incidents occur due to the distributed educational footprint. They lack visibility to security threats when they occur, and lack effective incident response plans and systems. With loose regulations on what should be reported in times of a breach, colleges will struggle to not only gather the information needed for reporting a breach but to understand what information is needed and how to communicate it.”

It’s pretty clear that cybersecurity within education needs to be a key focus as this is where threat actors will focus as the education sector tends not to have the same resources available for cybersecurity versus other organization. Effectively making them soft targets. Any sort of soft target needs to be eliminated so that everyone is safer as a result.

Report Claims That Elon Musk Will Be Chopping 50% Of Twitter Staff

Posted in Commentary with tags on November 3, 2022 by itnerd

A reader surfaced a Bloomberg report to me that outlines the following:

Elon Musk plans to eliminate about 3,700 jobs at Twitter Inc., or half of the social media company’s workforce, in a bid to drive down costs following his $44 billion acquisition, according to people with knowledge of the matter.

Twitter’s new owner aims to inform affected staffers Friday, said the people, who requested anonymity discussing non-public plans. Musk also intends to reverse the company’s existing work-from-anywhere policy, asking remaining employees to report to offices — though some exceptions could be made, the people said.

Musk and a team of advisers have been weighing a range of scenarios for job cuts and other policy changes at San Francisco-based Twitter, the people said, adding that the terms of the headcount reduction could still change. In one scenario being considered, laid off workers will be offered 60 days’ worth of severance pay, two of the people said.

After the layoffs were sorted, Twitter Chief Accounting Officer Robert Kaiden left the company, becoming one of the last pre-Musk C-suite executives to depart, according to people familiar with the matter.

A spokesperson for Twitter didn’t immediately respond to a request for comment.

Musk is really under the gun to find a way to get Twitter to a point that it will not only make money, but he doesn’t look like someone who talks the talk but can’t walk the walk. Even though he has a history of not being able to walk the walk. And this is the sort of stuff that will send those who survive this coin flip shot at keeping their jobs at Twitter to the exit door faster than Barry Allen trying to save the day. Because as the person who brought this to my attention said, it’s no fun working for a dictator. I would agree with that, but I would also add that it’s no fun working for a dictator who is desperate and don’t have a clue.

Those who work for Twitter, those who use Twitter, and most importantly, those who were dumb enough to lend Musk money to buy Twitter should brace for impact as this is not going to end well for anyone.

New Threat Intelligence Research Says That Illegal Dark Web Pharmaceutical Sales Drop 80%, Significantly Decline

Posted in Commentary on November 3, 2022 by itnerd

Today, Cybersixgill published new threat intelligence research finding that authorities have shut down dedicated underground pharmaceutical drug markets in big numbers over the last three years, but many are still active.

The number of posts for prescription drugs on underground forums dropped by 79% from 2020 to 2021 and did not go back up in 2022. Cybersixgill’s researchers attribute the initial decline to the Covid-19 pandemic and major law enforcement operations, including a Europol dark web drug bust resulting in arrests.

You can get further details on this research here.

NIST Asks For Feedback In Terms Of Cybersecurity For The Water And Wastewater Utilities Sector

Posted in Commentary with tags on November 3, 2022 by itnerd

Yesterday, NIST put out a draft white paper asking for feedback from stakeholders in the water and wastewater utilities sector as to how best to secure this sector.

Here’s the abstract from the draft white paper.

The U.S. Water and Wastewater Systems (WWS) sector has been undergoing a digital transformation. Many sector stakeholders are utilizing data-enabled capabilities to improve utility management, operations, and service delivery. The ongoing adoption of automation, sensors, data collection, network devices, and analytic software may also increase cybersecurity-related vulnerabilities and associated risks.

The NCCoE has undertaken a program to determine common scenarios for cybersecurity risks among WWS utilities. This project will profile several areas, including asset management, data integrity, remote access, and network segmentation. The NCCoE will also explore the utilization of existing commercially available products to mitigate and manage these risks. The findings can be used as a starting point by WWS utilities in mitigating cybersecurity risks for their specific production environment. This project will result in a freely available NIST Cybersecurity Practice Guide.

You can read the draft white paper here. Chris Warner, OT Cybersecurity Consultant, GuidePoint Security adds this commentary:

“Water systems are unique and challenging to secure because many systems are over 50 years old, and it will take tremendous financial and human resources to replace or upgrade to stay in compliance with regulatory entities. Water SCADA systems have numerous physical sites that are diverse in architecture and challenging to ensure integrity and security for water treatment basins, distribution centers, storage towers/level management, drinking water distribution networks, real-time decentralized industrial wastewater treatment centers, and real-time flood control system monitoring. 

Now, the AWWA mandates over 180 standards of practice for water utilities, and many US States have their own regulations. Some states are now encouraging water utilities to align to the NIST CSF. The NIST CSF mainly focuses on the business, IT, and a limited amount of OT. Creating an overlay of the NIST 800-82 with the CSF specifically addresses SCADA systems.”

I’ll be keeping an eye on this as there needs to be change in this sector to address the threat landscape that we find ourselves in at present.