Threat Actors Target Global Retailers with Cloud-Based Gift Card Campaign 

Posted in Commentary with tags on October 22, 2025 by itnerd

Palo Alto Networks Unit 42 has posted new research called “Jingle Thief“—a campaign in which Morocco-based threat actors are exploiting Microsoft 365 environments to conduct large-scale gift card fraud against global retail enterprises. With the holiday shopping season approaching, these operations are expected to intensify in scale and frequency.

The research details a multi-stage campaign where attackers use phishing and smishing to infiltrate retail organizations, identify and compromise those with gift card administration privileges, and ultimately issue themselves massive quantities of gift cards. These actors employ sophisticated evasion techniques—including configuring inbox rules for silent exfiltration and deletion of sent messages—that have not been publicly detailed until now.

Key insights from the research include:

  • A shift from endpoint-based intrusions to cloud-native, identity-driven attacks that leverage Microsoft 365 services.
  • How these attackers exploit trusted environments such as SharePoint, OneDrive, and Entra ID to execute large-scale gift card fraud, and evade detection for months.
  • Broader context on how financially motivated groups are adopting APT-level tactics, mirroring the persistence and stealth of nation-state actors.

You can read the research here.

Now Available: The Proactive Defenders Guide to Infostealers From Flashpoint

Posted in Commentary with tags on October 22, 2025 by itnerd

We’ve all heard about a new wave of breaches that was sparked by a single stolen employee credential which marked the dawn of a new era in cyber risk: the rise of information-stealing malware (“infostealers”). This year alone, Flashpoint has identified over 1.8 billion stolen credentials circulating across illicit marketplaces, fueling identity-based attacks at an incredible and still growing scale.

To help organizations fight back, Flashpoint is releasing The Proactive Defender’s Guide to Infostealers—a practical resource for IT, Threat Intelligence, and Fraud teams. The 22-page guide provides:

  • A breakdown of the most prolific infostealers and their role in modern attack chains – Learn which strains are the most popular, how they incorporate tactics such as vulnerability exploits and ransomware, and how you can better defend against them. 
  • Strategies for managing the identity attack surface – Understand how threat actors weaponize stolen identities, and how your team can monitor, prioritize, and respond before damage is done. 
  • Guidance on operationalizing infostealer intelligence for proactive defense – Leverage Flashpoint’s comprehensive infostealer intelligence to reverse-engineer data dumps, understand infection trends, and address potential security gaps before threat actors exploit them.

 The report can be here, and a blog post about the report is here.

TP-Link Achieves Breakthrough With First WiFi 8 Connection

Posted in Commentary with tags on October 21, 2025 by itnerd

Geez. I haven’t even rolled out WiFi 7 yet.

 TP-Link today announced it has successfully demonstrated Wi-Fi 8 connectivity, transmitting data with a prototype device developed through a joint industry partnership. This achievement represents a major step toward defining the next generation of wireless technology.

The test successfully validated both the Wi-Fi 8 beacon and data throughput, confirming the viability of the technology and marking a critical milestone in Wi-Fi 8 development. This technology is poised to deliver the ultra-reliable wireless performance that the industry will require as more devices and bandwidth-intensive applications come online.

Through ongoing collaboration with ecosystem partners, TP-Link is dedicated to advancing the technologies that will shape the next era of connectivity, offering users unprecedented speed, stability and reliability.

TP-Link has this page on WiFi 8: https://www.tp-link.com/ca/wifi8/.

Rogers Gets Hit With Class Action Lawsuit Over 2021 Outage

Posted in Commentary with tags on October 21, 2025 by itnerd

Back in April 2021, Rogers had a massive outage. Not as big as the outage that they had a year later. But it was really big. Cell phones stopped working and Interac was down.

Fast forward to today and a class action lawsuit has been approved in a Quebec court that is related to this outage:

The Plaintiffs were ascribed the status of representative to act on behalf of all Class Members in Canada.  They allege in their action that the Class Members suffered damages as of result of the service interruption to the Rogers, Fido and Chatr networks which began on April 19, 2021.

Now Rogers threw Ericsson under the bus for this outage. But clearly this court didn’t buy that and here we are talking about it. Thus it will be interesting to see how Rogers responds to it. Will they defend themselves? Will they simply settle out of court to make this go away? This should be fun to see what route they go with this.

GlassWorm self-propagating malware hits the streets

Posted in Commentary with tags on October 21, 2025 by itnerd

GlassWorm, a highly sophisticated self-propagating malware campaign targeting Visual Studio Code developers via the OpenVSX marketplace, has been discovered by Koi Security. The worm steals credentials from NPM, GitHub, and Git, drains cryptocurrency extensions, deploys hidden VNC and SOCKS proxies, and spreads through compromised extensions using stolen credentials. Notably, GlassWorm hides its payload with invisible Unicode variation selectors, rendering it invisible to human reviewers and many static analysis tools. Its command-and-control leverages the Solana blockchain for persistence and anonymity, with Google Calendar as backup infrastructure. Over 35,800 installations have been affected, with at least 10 extensions still active as of this weekend.

Dale Hoak, CISO, RegScale had this comment:

     “The GlassWorm campaign underscores the growing compliance and regulatory risks inherent in today’s open-source and developer ecosystems. Software supply chain attacks no longer target only the end product—they exploit the very tools and dependencies developers trust most. Organizations must move beyond periodic control reviews and adopt continuous monitoring and automation across their build pipelines to detect drift, compromise, or unauthorized changes in real time. Compliance controls governing software supply chain integrity should be codified and enforced as part of the CI/CD process, ensuring that when vulnerabilities like this surface, evidence of continuous validation, provenance tracking, and rapid remediation is already embedded in the operational fabric. This event is another reminder that compliance cannot be static documentation—it must be a living control system that evolves with every dependency update and build cycle.”

Will Baxter, Field CISO, Team Cymru follows with this:

      “The GlassWorm campaign marks a fundamental shift in the developer-ecosystem threat model: a self-propagating worm hidden inside VS Code extensions that leverages invisible Unicode, blockchain-based C2 (Solana) and legitimate infrastructure (Google Calendar) to resist coordinated takedown. By harvesting NPM, GitHub and OpenVSX tokens, hijacking crypto-wallet extensions and converting developer machines into SOCKS proxies and hidden VNC nodes, the attackers move far beyond standard supply-chain compromises. This isn’t just a supply-chain problem—it’s a new infrastructure layer merging cyber-crime tooling, blockchain resilience and developer-tooling pivoting. Intelligence sharing between registry operators, threat researchers and blockchain-monitoring partners must work together if we’re to see these hybrid attacks flagged and disrupted before developer systems become massive proxy networks.”

Gunter Ollmann, CTO, Cobalt adds this:

     “This campaign underscores how adversaries are evolving their tradecraft to weaponize the software supply chain at its roots. Developers have become high-value targets because compromising their toolchains can cascade across entire ecosystems. The use of blockchain and invisible Unicode payloads shows how detection and takedown are becoming increasingly difficult and require coordination across a growing number of stakeholders. Botnets and bot agents like GlassWorm are precisely the kind of technologies leveraged by state actors in preparation for cyberwarfare, where persistence and resilience to disruption are core tactical advantages. Frequent testing of defenses, SOC playbooks, and offensive security readiness is essential to expose weaknesses before attackers do.”

Even in a moment in time where there’s a new campaign every week from the forces of evil, this one is pretty bad. I am hoping that the result of this campaign is not as devastating and I think it will be. Though I will not be shocked if it is.

CISA Adds Vulnerabilities To The KEV Catalog

Posted in Commentary with tags on October 21, 2025 by itnerd

The CISA has added three newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog: one in Windows SMB Client and two in Kentico Xperience CMS. The Windows flaw (CVE-2025-33073, CVSS 8.8) allows privilege escalation via improper access control and has been exploitable since June, when proof-of-concept code was released. The Kentico vulnerabilities (CVE-2025-2746 and CVE-2025-2747, CVSS 9.6) are authentication bypass issues that could enable full administrative takeover when chained with remote code execution. CISA also confirmed exploitation of a 2022 Apple arbitrary code execution bug (CVE-2022-48503). Federal agencies now have three weeks to patch affected systems under Binding Operational Directive 22-01.

Will Baxter, Field CISO, Team Cymru had this to say:

     “The inclusion of both recent and legacy vulnerabilities in CISA’s KEV catalog underscores how threat actors mix newly developed exploits with long-lived flaws to sustain access and expand operational reach. Even when patches are available, adversaries rely on delayed remediation and incomplete asset visibility — the very gaps KEV aims to close. Active monitoring of external infrastructure and intelligence sharing across organizations remain essential to identify when known vulnerabilities are being re-weaponized in the wild.”

Andrew Obadiaru, CISO, Cobalt follows with this:

     “This is a reminder that patching and vulnerability scanning aren’t the same as true resilience. The lag between disclosure and exploitation is shrinking, and adversaries are quick to capitalize on unpatched systems even within well-defended networks. Continuous offensive testing—validating exploitability in real-world conditions—remains one of the most effective ways to ensure critical exposures are prioritized and remediated before attackers strike.

This is why I recommend that people patch all the things when patches appear or soon after they appear. The bad guys will not waste any time in terms of reverse engineering the flaws that these patches fix and using those to launch attacks.

Retail giant Muji halts online sales after ransomware attack on supplier

Posted in Commentary with tags on October 21, 2025 by itnerd

Japanese retail giant Muji has taken offline its store due to a logistics outage caused by a ransomware attack at its delivery partner, Askul. 

Rebecca Moody, Head of Data Research at Comparitech

“This is another prime example of how far-reaching the consequences of a ransomware attack can be and highlights why sectors like retail and manufacturing remain a key focus for hackers. 

So far this year, we’ve recorded nearly 400 claims from ransomware groups on retailers across the world with 40 of these having been confirmed by the entity involved. While we don’t yet know which gang is responsible for the attack on Askul, you can bet your bottom dollar we’ll find out soon if ransom negotiations fail. It’s also likely that the hackers will have stolen data in the process of their attack, and with the size of Askul and the number of companies it deals with, this could be significant.”

Martin Jartelius, AI Product Director at Outpost24:

“This is a different form of supply chain attack – the company is affected because a core service provider was compromised, rather than its own IT systems. It’s encouraging to see that Muji is taking preventive actions and already has contingency and communication plans in motion. This is the best way to fight ransomware: be prepared, recover quickly, work around disruptions, and avoid paying the groups behind them.

For the organization that suffered the direct breach, it’s still too soon to draw broader conclusions. Neither the perpetrator nor the ransomware strain has been confirmed, and while there have been other major regional incidents recently, any link at this stage would be purely speculative.”

Javvad Malik, Lead CISO Advisor at KnowBe4

“The reality of interconnected ecosystems is that you can have spotless internal controls and still be taken offline by a partner’s ransomware. Customers don’t care whose network was hit, they only see that the service or product they need is unavailable and that impacts trust. It’s why it’s important to map critical dependencies beyond IT to logistics and fulfilment, set minimum security baselines in contracts, and practice “supplier outage” playbooks. Monitor for brand impersonation during downtime, and pre‑agree data‑sharing for rapid joint incident response. Ultimately, resilience must extend past your perimeter to the partners that support your operations.”

You’re only as secure as the people that you work with. Thus my recommendation is that you work with your partners to assure your mutual security. After all, these days your mutual security is a requirement and not an option.

Agentiiv and the CMA debut $5M AI accelerator to power Canada’s innovation ecosystem

Posted in Commentary with tags on October 21, 2025 by itnerd

As small- to medium-sized businesses (SMBs) and nonprofits face growing costs and pressures to modernize, Agentiiv, in partnership with the Canadian Marketing Association (CMA), Ownr, Staples and the CCNDR, has launched a $5-million accelerator program to help organizations adopt and use artificial intelligence (AI) more effectively. 

Helping organizations build capacity through AI 

The You.Scaled. Accelerator program will provide 350 grants for SMBs and 150 for nonprofits across Canada. The program is designed for organizations that often lack the resources to adopt new technologies, offering in-kind grants through Agentiiv platform subscriptions, training from the CMA and integration support from partners. By reducing costs and providing practical training and services, the program will help businesses and nonprofits improve operations, strengthen customer and supporter experiences and grow with confidence.  

Closing the gap in AI adoption 

Despite growing awareness of the potential of generative AI, adoption among Canadian organizations remains low. There are 1.2 million SMBs nationwide yet, according to Statistics Canada, only 12.2 per cent of Canadian businesses currently use AI technology. Meanwhile, 73 per cent of SMBs have yet to consider implementing AI, according to the Canadian Chamber of Commerce

To help bridge this gap, You.Scaled. will provide step-by-step support to guide organizations through AI adoption in a structured, practical way. Each recipient will receive tailored onboarding, mentorship and access to learning sessions that help translate training into measurable outcomes such as improving efficiency, enhancing customer or supporter experiences and identifying new opportunities for growth. 

Eligibility and selection 

The You.Scaled. Accelerator Program is open to registered Canadian SMBs with up to 40 employees and registered Canadian nonprofits. Applicants will be evaluated on three criteria: AI readiness to adopt, the quality of their implementation plan and their potential for positive economic and social impact. 

Grants will be distributed across Canada, ensuring representation from urban, rural and remote communities. The program also includes a commitment to equitable access for organizations led by women, Indigenous Peoples, visible minorities and members of the 2SLGBTQIA+ community. 

Chosen recipients will gain access to membership benefits, services and discounts through key partners. They will also receive free access to the CMA’s generative AI On-Demand training course and a reduced one-year CMA membership to help integrate AI more effectively into their operations.   

Apply now 

Applications for the You.Scaled. Accelerator Program are open until November 15.  

Learn more here: www.youscaled.com/ (EN) and www.vousamplifié.com (FR).  

Kyndryl Readiness Report: AI Delivers Early Returns, Pushing Enterprises to a Tipping Point

Posted in Commentary with tags on October 21, 2025 by itnerd

Kyndryl today released its second annual Kyndryl Readiness Report, drawing on responses from 3,700 senior leaders across 21 countries. The data reveals an instance of momentum and reflection ? as businesses report growing returns from AI investments while facing mounting pressure to modernize infrastructure, scale innovation efforts, reskill workforces and manage risk in an increasingly fragmented regulatory landscape.

Last year’s report revealed a critical gap between perception and preparedness: while 90% of business leaders believed their IT infrastructure was best in class, only 39% felt it was ready for future disruption. While there has been momentum ? that tension remains. This year:

  • ROI on the rise, but AI stuck in experimentation phase: While 54% of organizations reported seeing positive returns on AI investments ? an increase of 12 points from 2024 ? 62% still haven’t advanced their AI projects beyond the pilot stage.
  • Confidence continues to outweigh capability: While 90% say their tools and processes allow them to rapidly test and scale new ideas, more than half say their foundational technology stack holds back innovation.
  • AI driving workforce transformation, but skills gaps remain: 87% say AI will “completely” transform jobs at their organizations within 12 months, even though many say their employees are not using AI frequently today and few have the technical skills necessary.
  • Geopolitical pressures forcing a data pivot: While reporting clear benefits from cloud adoption, organizations are now reevaluating where and how their data is stored, processed, accessed and secured amid an increasingly fragmented regulatory landscape. Businesses are also balancing legacy infrastructure challenges, with 70% of CEOs saying they reached their cloud setup “by accident rather than design.”

AI spending rises along with ROI expectations ? with cyber resilience top of mind

Business leaders across all industries and countries say their company’s AI spending jumped 33% on average since last year, with 68% investing “heavily” in at least one form of AI. As AI investments rise, so does the pressure to show value ? and protect it. Three in five leaders say they feel more pressure this year to deliver ROI from AI than last. Their top use case? Cybersecurity.

Cloud is under pressure as geopolitical and regulatory disruption drive change

Many organizations are also revisiting their cloud infrastructure, prompted by new global regulations and growing concerns about data sovereignty. Three in four leaders report concerns about the geopolitical risks associated with storing and managing data in global cloud environments, and 65% have adjusted their cloud strategies in response ? by investing in data repatriation, reassessing vendors, and shifting toward private cloud models.

Talent and Culture ? the next readiness frontier

As leaders look to scale innovation, people readiness is emerging as a key barrier ? and a key opportunity. While nearly 9 in 10 believe AI will completely reshape jobs in the next year, only 29% feel their workforce is ready to successfully leverage the technology and concerns remain around the skills needed to succeed in this era. Many organizations are also battling cultural barriers ? with nearly half of CEOs reporting their organization stifles innovation (48%) and moves too slowly in decision-making (45%). Those pulling ahead ? dubbed “Pacesetters” in the report ? aren’t just investing in innovation. They’re uniquely prioritizing culture, upskilling and leadership alignment.

Compared to organizations who are lagging in these areas, Pacesetters are:

  • 32 points less likely to cite their tech stack as a barrier
  • 30 points more likely to say their cloud can adapt to new regulations
  • 20 points less likely to report a cyber-related outage in the past year

To read the report, visit Kyndryl’s Readiness Report.

Methodology

The 2025 Kyndryl Readiness Report combines survey data from 3,700 senior leaders and decision-makers across 21 countries with insights from Kyndryl Bridge, the company’s AI-powered, open integration digital business platform. The Report uncovers the drivers, barriers and trade-offs that can make or break the ability of organizations to protect, sustain and accelerate their performance and future-proof their mission-critical processes.

Expert panel report examines security risk and resilience in Canada’s research enterprise

Posted in Commentary with tags , on October 21, 2025 by itnerd

In a moment defined by shifting geopolitics, intense global competition for talent and technology, and rapid investments in national infrastructure critical to sovereignty, Canada must protect sensitive research and the benefits it creates—without closing the doors on the relationships that make Canadian science thrive. A new report from the Council of Canadian Academies (CCA), Balancing Research Security and Open Science, offers an independent assessment of national and foreign efforts to promote research security, highlighting potential strategies to safeguard national interests while preserving the openness that drives discovery, innovation, and prosperity.

Balancing Research Security and Open Science was commissioned by Defence Research and Development Canada and the Public Health Agency of Canada, with support from other government departments and agencies. The report explores measures for identifying and safeguarding sensitive research of concern and highlights the need for their continuous application and reassessment throughout the research process, fostering a modern research mindset. It also describes the importance of:

  • Increased training and capacity-building, especially for smaller universities, colleges, and polytechnics with limited research-security resources;
  • Greater integration of the private sector, which plays a critical role in Canada’s research ecosystem but frequently lacks oversight; and
  • Recognition of First Nations, Inuit, and Métis Peoples’ right to govern research about them and their lands.

Balancing Research Security and Open Science recognizes the critical importance of coordinated, collaborative research security efforts. The consequences for misuse of sensitive research can be severe, imperiling national and economic security, health, and well-being. With adequate training, resources, and capacity, Canada can encourage a modern research mindset, strengthening the research community and encouraging ethical and open science against an uncertain future.

Balancing Research Security and Open Science is available at cca-reports.ca.