Oracle E-Business Suite Exploit by Cl0p: Who is affected and what organizations should look for

Posted in Commentary with tags on October 6, 2025 by itnerd

Today, SOCRadar published an analysis on the Oracle E-Business Suite vulnerability. The flaw, already exploited in the wild, has been used in data theft and extortion attacks attributed to the Cl0p ransomware gang. As Oracle rushed out an emergency fix, the situation revealed a wider ecosystem of threat actors and exploit leaks that organizations must urgently address.

The analysis dives into what exactly this vulnerability is, who is impacted and how severe the risk is, who is behind the exploit — Cl0p — and what indicators of comprise organizations should look for. 

For full details, the analysis can be found here: https://socradar.io/cve-2025-61882-oracle-e-business-suite-exploited/

KnowBe4 Earns Triple Recognition in Q3 2025 with Industry Awards for Human Risk Management, Sustainability Leadership and Corporate Responsibility

Posted in Commentary with tags on October 6, 2025 by itnerd

KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human and AI agent risk management, today announced it has received three prestigious industry awards in Q3 2025. KnowBe4 was named to the Constellation ShortList™ for Human Risk Management Solutions for Q3 2025, honored with the 2025 Sustainability Leadership Award from the Business Intelligence Group, and earned the TrustRadius Tech Cares 2025 award for the sixth consecutive year. These recognitions underscore KnowBe4’s commitment to driving positive environmental and social impact while delivering an innovative cybersecurity platform that helps organizations manage risk.

Innovation in Human Risk Management

The technology vendors and service providers included in the Constellation ShortList™ for Human Risk Management Solutions for Q3 2025 deliver critical transformation initiative requirements for early adopters and fast-follower organizations.

Sustainability Leadership Recognition

The Sustainability Awards honor companies, products, projects and individuals proving that purpose-driven strategy can fuel growth. Winners are selected by a panel of business-leader judges who evaluate performance, innovation and quantifiable outcomes across environmental, social and governance (ESG) pillars.

Corporate Social Responsibility Excellence

The TrustRadius Tech Cares 2025 awards recognize B2B technology companies that have gone above and beyond to support employees and communities in the last year.

For more information on KnowBe4, visit www.knowbe4.com

Ricoh partners with Erica Dhawan to spotlight the power of human connection during Customer Service Week

Posted in Commentary with tags on October 6, 2025 by itnerd

Ricoh USA, Inc. today announced a partnership with human connection expert Erica Dhawan for its annual 2025 Customer Service Week celebration. The collaboration underscores Ricoh’s dedication to delivering what customers value most — trustworthy, people-first service and personal experiences in a technology-driven world.

Throughout October, Ricoh and Dhawan will spark conversations on the critical role of human connection in delivering positive, memorable customer experiences. Through expert interviews and social engagement, Dhawan will explore Ricoh’s “People Powered” approach, offering strategic insight and thought leadership. Together, they will reinforce the position that while technology drives efficiency, authentic, person-to-person relationships build trust, inspire loyalty, and create lasting market differentiation.

According to Ricoh’s new study exploring the importance of human connection, 85% of respondents state they are more likely to remain loyal to companies that prioritize genuine human service over automation alone, and 94% say investing in authentic human connection creates long-term competitive advantage. As organizations increasingly rely on digital tools, Ricoh remains steadfast in its belief that people — and the relationships they build — are the foundation of service excellence.

Proxyware Expands Program into Virginia K-12 Schools to Protect Children from Digital Harm

Posted in Commentary with tags on October 6, 2025 by itnerd

 Proxyware, a digital citizen protection company dedicated to safeguarding vulnerable populations, announced today the expansion of its program into Virginia schools to reduce child exploitation and digital harm. Already this calendar year, Proxyware has detected more than 192,000 digital attacks targeting Virginia K-12 school children, underscoring the urgent need for comprehensive protection.

Children across the Commonwealth face relentless digital threats. Research shows that 4 out of 5 children have seen violent material online, while 3 out of 4 report encountering sexual and alcohol-related content online. These attacks are not isolated or accidental, they are systemic targeted attempts to exploit children through ads, cookies, pixels, and user-generated content.

Why Traditional Cybersecurity Tools Fall Short

Traditional cybersecurity tools like firewalls, antivirus software, and website filters are not designed to stop these types of targeted attacks. They focus on whether a website is “good” or “bad,” but the internet is far more complex. A trusted platform can still deliver harmful ads or host predatory content, leaving children vulnerable.

A New Approach: Seeing the Internet Through a Child’s Eyes

Proxyware takes a different approach. By using AI-generated personas that behave like children online, Proxyware detects and disrupts predators and harmful content at the source. This proactive approach prevents threats from ever reaching children.

This protection extends beyond the classroom:

  • At school: Students are protected on classroom devices and while accessing school networks.
  • At home: School-issued devices remain shielded from harmful digital content.
  • On personal devices: By eliminating threats at the source, children benefit from safer experiences wherever they connect.

A Safer Future for Virginia’s Children

The scale of attacks against Virginia students highlights the urgent need for people-first protection. By expanding into Virginia K-12 schools, Proxyware is making a direct investment in the safety of the Commonwealth’s children and giving children the freedom to learn and explore online without fear.

Free Educational Tools Available

In addition to technology and partnerships, Proxyware offers free Cyber Safety Educational and Awareness Assets designed for parents, mentors, and educators. These resources teach safe online habits and provide guidance on how to spot potential dangers before they happen. Materials can be easily shared in schools, libraries, after-school programs, or community centers, helping communities build resilience against online exploitation of children. Download the free resources at https://reportscams.us/protect-children-online-kit.

Canadian organizations seek homegrown cybersecurity solutions amid sovereignty concerns: CIRA

Posted in Commentary with tags on October 6, 2025 by itnerd

As the federal government prioritizes a Canadian sovereign cloud, Canadian cybersecurity professionals are also prioritizing made-in-Canada cybersecurity solutions.

New data from CIRA’s 2025 Cybersecurity Survey reveals that geopolitical risks are shaping vendor selection. Eighty-two per cent of experts say a country of origin has become more important when choosing cybersecurity providers, and just over half (56 per cent) have reconsidered U.S. vendors due to trade and political uncertainty.

The full findings are featured in this year’s survey report.

Key findings

  • Geopolitics reshape vendor choices: 82 per cent now say a country of origin has become more important in selecting vendors, and 56 per cent have already reconsidered their use of U.S.-based providers due to political uncertainty.
  • Training lags while threats escalate: nearly all organizations (98 per cent) conduct cybersecurity awareness training, but the frequency has remained unchanged since 2022-2023 even as threat actors grow more sophisticated and hostile.
  • Paying ransomware is the new norm: one in four Canadian organizations (24 per cent) were victims of ransomware in the past year. Among them, 74 per cent had data exfiltrated and 74 per cent paid a ransom, typically $25,000 or more.
  • Data breaches have surged: 42 per cent of organizations reported a breach of customer or employee data in 2025, up from 29 per cent in 2022.
  • Generative AI is both adopted and feared: almost two-thirds (65 per cent) of organizations have integrated AI tools into workflows and operations (up from 44 per cent in 2023), yet 70 per cent are worried about AI-enabled cyber attacks, privacy breaches, data poisoning and advanced phishing.

Additional resources

Airbus and Ericsson accelerate industrial digitalization with private 5G deployment at Hamburg and Toulouse plants 

Posted in Commentary with tags on October 6, 2025 by itnerd

Airbus and Ericsson have successfully deployed a private 5G solution at the Airbus production site in Hamburg, Germany, with another deployment underway in Toulouse, France. This initiative forms part of Airbus’ ambitious digitalization strategy, aimed at strengthening manufacturing automation, traceability, and operational efficiency, while meeting the sector’s strictest safety and security standards.

The partnership between Ericsson and Airbus leverages Ericsson Private 5G, recognized for its reliability, security, and high performance. The solution’s built-in infrastructure automation enabled rapid deployment across Airbus’ operations, significantly shortening implementation timelines compared to traditional setups. This automation allowed Airbus to scale connectivity quickly and securely across multiple sites. Close collaboration with the Ericsson product team ensured seamless integration, with the solution tailored to Airbus’ IT-tooling and cybersecurity requirements. The design’s modular architecture and API-driven interfaces simplified onboarding into Airbus’s existing systems, accelerating time-to-value and reinforcing robust security controls.

With a fully operational private 5G network now live in Hamburg and deployment at Toulouse underway (to be completed by 2026), this rollout is part of a broader roadmap to extend private 5G across Airbus’ strategic sites in Europe — including further locations in Spain, the United Kingdom, and internationally, with projects in the United States and Canada pending.

This effort reflects Airbus’ commitment to standardizing digital operations and scaling innovation across its global footprint.

Ericsson Private 5G forms the backbone of Airbus’ strategic transformation projects, enabling high-value industrial use cases such as Internet of Things (IoT) integration, intelligent management of critical equipment, real-time quality control, and collaborative robotics. With seamless, full-site coverage with private 5G, machines and operators on the production floor gain true mobility, boosting productivity, process agility, and end-to-end industrial control, all of which are key to realizing the full potential of Industry 4.0.

This new phase underscores Airbus and Ericsson’s commitment to the future of industrial connectivity, featuring advanced 5G Standalone (SA) technology and next-generation deployment models, which are also poised to accelerate 5G usage in office environments. Additionally, joint R&D efforts focus on connected cabins, 6G, and nonterrestrial networks (NTN), enhancing the connectivity ecosystem for aerospace and smart manufacturing applications.

Through this strategic partnership, Airbus and Ericsson are accelerating the digital transformation of the aerospace industry, laying the foundation for the next generation of smart factories — fully connected, scalable, and sharply focused on innovation across Europe and the world.

Pets & Owners’ PII Exposed in Pet Insurance Provider in Data Breach

Posted in Commentary with tags on October 6, 2025 by itnerd

A data breach involving Rainwalk, a South Carolina–based pet insurance provider was discovered and reported to Website Planet by cybersecurity researcher Jeremiah Fowler.

What happened:
A database containing 85,361 files totaling 158 GB was left unsecured. The leaked data included customer names, phone numbers, email and physical addresses, email files, claims files, veterinary bills, and more.

Why it matters:
This type of exposure poses serious risks, such as spear-phishing and social engineering attempts targeting insurance customers using real claims or account data and more.

Read the full report here: https://www.websiteplanet.com/news/rainwalk-pet-insurance-breach-report/

Proof Of Concept Deepfake Tool Targeting iPhones Is Out There

Posted in Commentary with tags on October 6, 2025 by itnerd

A recent report on a deepfake injection tool targeting iPhones has surfaced. Here’s the TL:DR:

Security researchers have found a malicious new tool that can inject deepfake videos straight into iOS devices. The tool presents a major risk for identity theft, so Apple users should be wary.

It works on jailbroken iPhones running iOS 15 or newer versions. Jailbreaking is when somebody removes Apple’s built-in restrictions on an iPhone, and is usually done to install apps or make changes that Apple doesn’t normally allow, such as installing apps outside the App Store. 

Downloading apps from unofficial stores is one of the many possible ways the malicious tool could end up on a user’s phone. 

Once installed, cybercriminals use a special server (RPTM) to link their computer to the iPhone and then hijack the link between the camera and the app. 

That means the app never sees the real camera feed. Instead, it gets an AI-generated deepfake video that looks like live footage. To the user, the phone might look normal – a person could point their camera at a tree and see the same tree on the screen. However, the app on the other end could show a fake face.

Ralph Rodriguez, President & Chief Product Officer for Daon, shares the below commentary in response to this report:

“Reports about a deepfake injection tool targeting iPhones have made headlines, potentially allowing attackers to carry out identity theft. Banking apps are a primary concern, but healthcare data is increasingly one of the most damaging and costly areas. Thankfully, it’s only a proof-of-concept experiment carried out on jailbroken iOS devices rather than a genuine attack, but it does highlight an important distinction that is often overlooked in biometric security – injection attacks versus presentation attacks. 

A presentation attack tries to fool the camera lens with a printed photo, a mask, or a replay on a screen. Injection attacks, on the other hand, bypass the lens entirely by inserting synthetic frames directly into the capture pipeline. That’s what was demonstrated here. While it makes for an alarming headline, it’s worth noting the proof-of-concept relied on ‘jailbroken’ or ‘rooted’ devices – those that have had their built-in software restrictions deliberately removed. That said, attackers themselves can exploit this gap today by using their own rooted phone to pretend to be someone else. Once a phone is jailbroken, its trust boundaries are broken, and the operating system’s integrity checks are removed, opening the door for frameworks to impersonate the camera. Jailbroken phones are only a gateway, however. In practice, robust mobile identity systems should already treat these environments as high risk and either escalate checks or block them outright.

There’s a bigger issue in that injection isn’t just an iPhone story. Variants exist across rooted Android phones, desktop virtual webcams, and ‘man-in-the-app’ attacks, and attackers are motivated to target any environment with weak device integrity. That’s why defenses cannot be reduced to a single ‘liveness’ check. Instead, layered controls are needed: device attestation to detect jailbreaking or rooting, binding capture sessions to the genuine camera sensor, rejecting virtual sources, and analyzing holistic signals such as blink trajectories, rolling-shutter artifacts, and illumination consistency. Standards bodies such as the FIDO Alliance have already started incorporating injection scenarios into their certification programs, which will help buyers demand solutions that address both presentation and injection risks. The headline may sound new, but the lesson is a familiar one: strong identity systems rely on layered defenses that assume attackers will always try to break the pipeline, not just the picture.”

For now this is a proof of concept on jailbroken iPhones. Tomorrow it will be in the wild. Which means now is a great time to learn what you have to do to keep yourself safe so that when the day comes, you’ll be ready.

Oracle Apparently Has Been Pwned And Extortion Emails Have Gone Out To Execs Of Companies Using E-Business Suite

Posted in Commentary with tags , on October 3, 2025 by itnerd

There’s a newly reported extortion campaign, where hackers claim to have stolen sensitive data through Oracle’s E-Business Suite and are now targeting executives directly:

According to Google Threat Intelligence Group (GTIG) and Mandiant, the malicious activity allegedly targeting Oracle EBS appears to have started on or around September 29. The attackers have sent extortion emails to executives at “numerous” companies, claiming to be affiliated with the notorious Cl0p cybercrime group.

GTIG and Mandiant researchers have described the attacks as a high-volume email campaign leveraging hundreds of compromised accounts, including ones previously linked to a profit-driven threat group named FIN11. This long-running cybercrime gang is known to engage in ransomware deployment and extortion.

The researchers also found some evidence indicating a connection to Cl0p. Specifically, the contact information provided by the attackers in the emails sent to targeted organizations matches contact addresses listed on the Cl0p leak website.

Mandiant and GTIG said they are in the early stages of their investigations and could not confirm whether the hackers’ claims are substantiated. 

Dr. Chris Pierson, a former DHS cybersecurity official and CEO/founder of BlackCloak, a digital executive protection firm had this to say:

     “Extortion attempts like this highlight the reality that executives are increasingly being singled out as the soft underbelly of the corporation for cybercriminals. Cybercriminals recognize that targeting the C-suite creates urgency, exposes them to high risk, and instills fear that can lead to other issues. The challenge for organizations is twofold: hardening the systems that store the most sensitive corporate data, and ensuring executives are prepared with the right playbook when extortion attempts land in their inbox. Third-party vendor risks will continue to be a favorite target of cybercriminals, and we’ve seen a marked increase in these systems being targeted because they yield information on not one company, but hundreds or thousands of companies.  The companies that come out ahead are those that treat digital executive protection as part of their overall cybersecurity posture rather than an afterthought.”

Oracle said via a blog post that they believe the threat actors exploited vulnerabilities patched in the July 2025 security updates. But they have said no more than that. Which likely means that this is going to be very, very bad. Oracle looks like it has some explaining to do.

Deepgram Launches Flux – The World’s First Conversational Speech Recognition Model 

Posted in Commentary with tags on October 2, 2025 by itnerd

Deepgram, the world’s most realistic and real-time Voice AI platform, today announced from VapiCon 2025 the launch of Flux, the world’s first conversational speech recognition (CSR) model designed specifically for real-time voice agents. Unlike traditional automatic speech recognition (ASR), which was built for passive transcription use cases like captions or meeting notes, Flux is trained to understand the nuances of dialogue. It doesn’t just capture what was said. It knows when a speaker has finished, when to respond, and how to keep the flow of conversation natural and engaging.

The global voice AI agents market is projected to reach nearly $47.5 billion by 2034, growing at a compound annual rate of about 34.8%. This growth is primarily due to the enterprise shift toward automated customer self-service, smarter agent assist tools, and embedded conversational experiences across industries. But traditional STT systems weren’t designed to participate in live dialogue. To recreate conversational flow, developers have been forced to piece together transcription, voice activity detection, and turn-taking logic — a patchwork that leads to latency, errors, and frustrating user experiences.

Flux eliminates these problems by embedding turn-taking directly into recognition. It transforms speech recognition from a passive recorder into an active conversational partner. This provides developers with the tools to build responsive, human-like voice agents without the complexity of workaround code or endless threshold tuning.

What Flux Delivers:

  • Embedded turn-taking intelligence – Conversation-aware recognition that handles timing inside the model itself, with context-aware turn detection and native barge-in handling for fluid exchanges.
  • Lightning-fast performance – Ultra-low latency where it matters most with ~260ms end-of-turn detection, plus distinct events to support eager response generation before a turn is complete.
  • Simpler development – Turn-complete transcripts and structured conversational cues replace fragile client-side logic, so teams can ship production-ready agents in weeks, not months.
  • Enterprise-ready scalability – Nova-3 level accuracy, GPU-efficient concurrency with 100+ streams per GPU, and predictable costs that avoid the hidden overhead of bolted-on systems.

Who It’s For: 

  • Voice AI builders – Developers, engineering leads, and AI teams creating real-time agents.
  • Enterprise innovators – Leaders modernizing customer experience with agent assist and conversational AI platforms.
  • Ecosystem partners – Platform providers, consultancies, and cloud architects looking to integrate CSR into larger AI stacks.

Flux is generally available (GA) today. Developers can start building with CSR immediately.

To celebrate the launch, Deepgram is announcing OktoberTalk – making Flux FREE to use for the entire month of October. Developers can use Flux to build and test real-time voice agents at no cost, with support for up to 50 concurrent connections. The goal: remove every barrier to experimentation so teams can experience how conversational speech recognition changes what’s possible in voice AI.