Safe Software Partners with Vancouver Canucks

Posted in Commentary with tags on October 7, 2025 by itnerd

Safe Software, the creator of FME, the only All-Data, Any-AI enterprise integration platform with true support for spatial data, is now a Proud Partner for the 2025-2026 NHL season. The data integration leader has entered a new partnership with Canucks Sports & Entertainment (CSE) and the Canucks for Kids Fund (CFKF).

As part of the partnership, Safe Software is donating $25,000 to the CFKF. The donation will support vital programs across British Columbia that help to improve the lives of children and families through education, health, and wellness initiatives and programming.

The partnership unites two organizations deeply rooted in BC and committed to making a positive impact in their community. Beyond the donation, this collaboration will encourage fans to learn about how FME leverages data and AI into actionable insights for organizations around the world.

Qilin Claims Asahi Group Holdings Breach

Posted in Commentary with tags on October 7, 2025 by itnerd

Comparitech is reporting that ransomware gang Qilin today took credit for a data breach at Asahi Group Holdings that forced the company to suspend orders, shipments, and customer service.

Rebecca Moody, Head of Data Research at Comparitech, provided the following comment: 

“As the most prolific ransomware gang of 2025 (it’s claimed 578 victims this year already), the odds that the attack on Asahi had been carried out by Qilin were relatively high. While the amount of data allegedly stolen by Qilin (27 GB), is quite low compared to some of Qilin’s other claims (e.g. 9.7 TB from Yooshin Engineering Corporation in South Korea), that’s not to say that the data involved isn’t highly sensitive. Qilin actually alleges that it includes financial documents and employee data and has provided screenshots to prove these claims.”

“Asahi now needs to respond to Qilin’s allegations and confirm what data could have been impacted so those affected can be on high alert for any potential phishing campaigns or suspicious account activity. This attack becomes the 19th confirmed attack on a food and beverage manufacturer this year so far.”

Qilin is really on a tear with victims all over the place. Thus proving that in this day and age, you need to be doing everything possible to not be a victim of them or some other ransomware gang.

Samsung’s Top Amazon Tech Deals (Oct 7–10): Up to 30% Off Ahead of Prime Day

Posted in Commentary with tags on October 7, 2025 by itnerd

With Amazon’s Fall Sale running October 7–10, many shoppers are already hunting for Prime Day-style savings—and Samsung has several strong offers for people looking for a deal on Samsung products.

Here are a few standout picks worth considering: 

  • Samsung Galaxy Book4 Edge – Save 30%, now $699.99 (regularly $999.99): Samsung’s next-generation AI laptop designed for seamless productivity and portability.
    • Copilot+ AI features with on-device processing for faster performance 
    • AMOLED display, long-lasting battery, ultra-thin design 
    • Perfect for students, creators and remote professionals 
  • Samsung Galaxy Tab S10 Lite (128GB) – Save 24%, now $379.99 (regularly $499.99): A bright, versatile tablet built for entertainment, creativity, and everyday use.
    • 10.9″ AMOLED display for streaming and video calls 
    • Lightweight and portable for work or on-the-go 
    • Available in Gray, Silver and Coral Red 
  • Samsung Galaxy Watch8 (40mm, Bluetooth) – Save 15%, now $424.99 (regularly $499.99):A sleek and powerful smartwatch that helps you stay connected and in control of your wellness goals.
    • Advanced BioActive Sensor for heart-rate, sleep & stress tracking 
    • Refined design with enhanced battery life 
    • Available in Gray and Silver 
ProductOriginal PriceSale Price% Off
Galaxy Watch8 (some variants) $499.99 $424.99 15.0% 
Galaxy Book4 Edge $999.99 $699.99 30.0% 
Galaxy Tab S10 Lite (128GB, any color) $499.99 $379.99 24.0% 

Sumo Logic Academy Expands Certification Program to Improve Critical Skills for Security and Operations Teams

Posted in Commentary with tags on October 7, 2025 by itnerd

 Sumo Logic today announced a new era for its popular educational training program, now called Sumo Logic Academy. The academy is designed to help Security, Operations, and Development teams validate critical skills, build on and enhance industry expertise and maximize the value of Sumo Logic’s platform to drive security, reliability, and operational efficiency, allowing participants to demonstrate their professional abilities.

Building on a commitment to education, Sumo Logic Academy includes a new role-based Sumo Logic Certified program that introduces a refined course catalog with in-depth training, live remote exam proctoring, and industry-recognized digital credentials. This structured certification path helps ensure that technology professionals gain specialized knowledge, earn verified credentials, and follow an industry-aligned learning journey—all while showcasing their proficiency with confidence.

Validated expertise with industry-recognized certifications

The new Sumo Logic Certified program offers a skills-based assessment that validates a user’s ability to effectively and proficiently leverage Sumo Logic products within their organization. With live, remote exam proctoring through its testing partner, Kryterion, candidates benefit from a certification process that is secure, fair, and reflective of the latest industry standards and Sumo Logic solutions. After completing the exam, learners will earn a digital badge issued through Credly, allowing them to share and promote their verified expertise with their professional network.

Flexible and accessible learning for every user

Sumo Logic remains committed to democratizing access to knowledge by ensuring that certain hands-on live instructor-led, virtual training classes and workshops, as well as self-paced learning, remain free for any user. In addition to the new certifications, organizations can also access custom and private training options tailored to their specific needs for a fee. New workshops include automation service, API and Terraform, and best practices for query efficiency to help users at every stage in their maturity.

Additional Resources

  • Discover the full catalog of Sumo Logic skill-based assessments
  • Learn more about Sumo Logic’s private training
  • Read the new Sumo Academy blog

FurtherAI announces $25M Series A from Andreessen Horowitz to transform insurance workflows with AI, automating busywork

Posted in Commentary with tags on October 7, 2025 by itnerd

The people who keep insurance running are overwhelmed. They’re doing trillion-dollar work with outdated tools – buried in PDFs and Excels, juggling manual reviews, and navigating disconnected systems. FurtherAI, the leading AI for insurance, is changing that. Today, the company announced a $25 million Series A led by Andreessen Horowitz – one of the largest Series A ever raised in insurance AI.

The raise comes just six months after its $5M seed round, underscoring the industry’s rapid embrace of domain-specific AI. The round also included Nexus Venture Partners, Y Combinator, amongst others bringing their total funding to $30 million.

With this new funding, FurtherAI will expand its library of  insurance-specific workflows, deepen integrations with carrier and broker systems, and scale its go to market teams to meet surging demand. The goal is simple: help insurers with its long awaited technology transformation by automating workflows like submissions processing, underwriting audits, claims handling, and policy comparisons through AI so professionals can focus on risk, clients, and growth.

Insurance is under pressure on every front – talent is scarce, climate risk is rising, and regulators demand more transparency. Many insurers have already experimented with AI, but the results fall short: generic tools miss the nuances of complex insurance documents, while point solutions only solve a slice of the problem. FurtherAI offers a third path – an insurance-native workspace that lets insurance teams start with one workflow and expand across many, all while ensuring accuracy, auditability, and scale.

Today, FurtherAI processes billions in premiums each year — powering submissions, policy comparisons, claims intake, and compliance checks for leading insurers like Accelerant, MSI, and Leavitt Group.

The impact is clear: teams are doubling productivity, improving submission-to-quote ratios by 15%, reaching over 95% accuracy in policy comparisons, and generating proposals 10x faster.

This raise cements FurtherAI as the AI workspace powering the future of insurance. “FurtherAI is redefining how insurance gets done,” said Joe Schmidt, Partner at Andreessen Horowitz. “Aman and Sashank are technical founders whose customers see them as true AI partners, not just AI tools. Their early traction signals a generational opportunity to transform insurance.”

Oracle Pretty Much Confirms That They Got Pwned By Cl0p

Posted in Commentary with tags , on October 7, 2025 by itnerd

Oracle has warned of a critical zero-day vulnerability, with a CVSS base score of 9.8, in its E-Business Suite (CVE-2025-61882) that is remotely exploitable without authentication. If successfully exploited, this vulnerability may result in remote code execution. Chances are that this is how the Cl0p ransomware gang was able to launch their latest campaign.

Ensar Seker, CISO at SOCRadar, commented:

“The exploitation of CVE-2025-61882 by the Clop ransomware group reinforces a hard truth security leaders continue to wrestle with: legacy enterprise software with sprawling configurations like Oracle E-Business Suite (EBS) remains a ripe target for modern ransomware operators. This vulnerability, rated 9.8 CVSS, allows unauthenticated remote code execution and is being actively exploited in the wild, making it one of the most dangerous types of flaws we see in enterprise environments. What makes this case particularly alarming is that the attack chain appears to span multiple vulnerabilities across different patch cycles, including one disclosed only days ago. Clop is clearly operating with a highly proactive exploitation model, monitoring Oracle patches and working quickly to reverse-engineer the flaws for immediate weaponization.

“The fact that proof-of-concept (PoC) code was circulating on Telegram and used in real-world data exfiltration attacks just weeks after patch release underscores how rapidly threat actors are moving to capitalize on enterprise inertia. This incident also highlights a serious procedural gap in many organizations: the critical patches for Oracle EBS can only be applied if the previous quarterly update (in this case, October 2023) is already in place. That creates an unintended but dangerous bottleneck where even security-conscious teams can find themselves exposed simply because they’re one patch cycle behind.

“Clop’s focus on Oracle EBS is no accident. These systems often house sensitive financial, HR, and operational data, and because they’re deeply integrated into business workflows, they’re notoriously difficult to update without risking downtime. That’s exactly the kind of environment threat actors love: high-value, low-change.

“Security teams should act immediately to verify patch levels and apply the latest fixes, but this needs to go beyond a break-fix mindset. Organizations must rethink their patch readiness processes for ERP-class systems, including pre-staging test environments, reducing configuration drift, and tightening external access to legacy interfaces like BI Publisher and Concurrent Processing.

“In parallel, defenders should hunt for indicators of compromise shared by Oracle and Mandiant and conduct forensic reviews of EBS systems for unusual BI Publisher activity, unauthorized concurrent jobs, or unexplained external network connections.

This is another case where visibility and segmentation matter. Oracle EBS should never be directly internet-exposed, and authentication should be enforced at all layers, even where Oracle’s native security falls short.

“Ultimately, the Clop campaign against Oracle EBS is a wake-up call that ransomware actors are not just opportunistic. They are increasingly strategic, surgical, and tuned into vendor ecosystems. Defenders must be equally proactive in hardening the software foundations that underpin their critical operations.”

SOCRadar posted a really good analysis of this here and it is totally worth your time to read. In the meantime, this is not a good look for Oracle. I wonder what they have to say about it?

UPDATE:  Adrian Culley, Senior Sales Engineer at SafeBreach adds this insight:

“The Cl0p extortion gang is combined under ‘The Com,’ which is a loose collective of hackers that includes individuals from Lapsus$ and Scattered Spider. The Com—short for ‘The Community’—is a fluid, international collective of mostly young, English-speaking individuals. Crucially, they’re not motivated by politics or ideology—their drivers appear to be purely money and ego. They thrive on notoriety, loudly bragging about their exploits on platforms like Telegram, which pushes members toward more brazen, high-profile attacks. While they are clearly very skilled, their precociousness leaves them highly vulnerable to nation state infiltration and manipulation.

The group’s roots begin with LAPSUS$ in 2021 and 2022, when they demonstrated just how devastating social engineering could be against giants like Microsoft, Nvidia, and Okta. But their work was somewhat erratic, and they often focused on chaos and notoriety.

Scattered Spider took that playbook and professionalized it, moving from chaotic data theft to financially devastating ransomware campaigns. They have been able to master the initial access problem with their native English skills and mastery of social engineering.

The Com, which has evolved out of these two groups, relies heavily on voice phishing as their most effective TTP to get past multi-factor authentication. The group uses highly ephemeral IOCs. The phishing domains they use are often active for less than seven days. This means that organizations relying on a purely reactive security posture—for example, blocklisting known IPs or domains—are often behind the curve.

The latest threat that has come to light with the Oracle e-business suite is a critical, 9.8-rated CVE. Organizations should patch immediately and then begin to shift from testing code to testing policy and procedure. BAS and AEV tools can help organizations focus on validating the Human Firewall.

BAS can simulate the reconnaissance phase, testing whether employees overshare PII online that an attacker could use to build a convincing persona. It can also continuously push bomb an organization’s MFA solution to measure the Mean Time to Detect and block the attack before a frustrated user approves the request.

An AEV platform can help confirm that an organization’s help desk is uncompromisable. Are they enforcing policies like a vocal password or two-employee approval for privileged account resets, even when the supposed caller provides all the PII they should know? Finally, AEV must continuously test an organization’s IAM posture, ensuring they can detect and immediately flag actions like a compromised admin creating malicious cloud instances or forging SAML tokens for persistence.”

Cobalt Augments Human-Led Pentesting with New AI-Powered Innovations

Posted in Commentary with tags on October 7, 2025 by itnerd

Cobalt today announced new human-led, AI-powered enhancements to its Cobalt Offensive Security Platform, designed to enrich capabilities for both the Cobalt Core pentesting community and its customers. These advancements merge the efficiency of automated intelligence with the creativity and expertise of skilled security professionals. This strategic approach enables organizations to maintain their defensive edge against evolving and complex threats. 

The future of Cobalt encompasses a human-led, AI-powered approach to optimize traditional pentesting workflows. These AI-powered solutions provide streamlined data enrichment, remediation guidance, and improve overall efficiency and output. The new capabilities include:

  • AI-Powered Scoping: Prioritizes the right assets and accurately identifies the environment and pentest needs.
  • AI Pentest Assistant: Summarizes prior findings and pentest-related content, and suggests potential actions based on findings
  • AI-Powered Reconnaissance (available Q4 2025): Streamlines the reconnaissance phase so pentests can start faster and testers can focus on finding exploits. 
  • AI Assistant for Findings and Reports: Suggests draft text for certain findings and reports sections.
  • AI-Driven Insights and Benchmarking: Provides industry peer comparisons with key metrics and recommendations.

The first iteration of Cobalt AI enhancements address a critical challenge in modern cybersecurity: the overwhelming volume of data that can obscure genuine threats. Cobalt AI models are trained on over a decade of real pentesting data, versus synthetic data or bug bounties, resulting in one the richest datasets in the industry. By eliminating tedious reconnaissance tasks and filtering signals from noise, Cobalt empowers penetration testers to focus on what they do best—identifying sophisticated attack vectors and developing innovative exploits that strengthen customer defenses.

Approov Launches Next Generation Attestation to Secure Mobile Apps Against Threats from AI and Meet New EU Regulations

Posted in Commentary with tags on October 7, 2025 by itnerd

Approov, the leader in mobile API security, today announced the launch of Approov 3.5, a significant platform update designed to protect businesses and their customers from a new wave of mobile threats. The release directly addresses security challenges posed by regulations like the EU’s Digital Markets Act (DMA) and the rise of sophisticated AI-driven attacks.

The mobile landscape is changing dramatically. New rules are opening up app distribution beyond traditional app stores, while automated threats are making it easier than ever for bad actors to clone legitimate apps, steal data, and commit fraud. These attacks increasingly devastate users financially and can cause irreparable damage to a brand’s reputation, and are increasingly impactful now that mobile traffic accounts for fully 64% of all website traffic.

Approov protects the critical connection between a mobile app and a company’s backend servers, or APIs. It acts as the digital gatekeeper, verifying that every request comes from a legitimate, untampered app running in a secure environment. This blocks automated bots, modified apps, and other threats before they can access sensitive data or services – a crucial security step that app stores alone cannot provide.

Key advancements in the Approov 3.5 platform include:

  • Ready for the DMA and Open App Stores: With the DMA mandating support for third-party app stores, the risk of fraudulent apps increases. Approov’s cloud-based verification ensures that only genuine app instances – regardless of their source – can access a company’s APIs.
  • Advanced Security Against Modern Threats:
    • Hardware-Backed Security (Android): Cryptographic keys are now stored in a secure, isolated “vault” on the device’s hardware, making it virtually impossible to clone an app’s identity.
    • Immutable App Signature: Approov creates a unique fingerprint for the app upon installation, continuously verifying its integrity to ensure it has not been tampered with or repackaged with malware.
    • Memory Dump Detection: A new defense that actively blocks attempts by attackers to scrape sensitive information, like AI secrets or user credentials, directly from the device’s memory.
  • Threat Analytics to Defend Against AI-Powered Attacks: The cloud-native platform provides a real-time view of attack patterns, allowing security teams to dynamically issue over-the-air (OTA) updates to policies that can block emerging AI threats without needing to issue an app update.
  • Unmatched Performance and User Experience: Cross-platform security checks for iOS, Android and HarmonyOS are now an order of magnitude faster at app startup than basic checks from Google, Apple or Huawei. A new background token fetch ensures the app remains fast and responsive, providing comprehensive security without slowing down the user.

Approov continues its global expansion by integrating Cloudflare’s Argo Smart Routing™ across its patented cloud-based attestation network, reducing latency and ensuring the fastest, most reliable performance for its customers worldwide.

Oracle E-Business Suite Exploit by Cl0p: Who is affected and what organizations should look for

Posted in Commentary with tags on October 6, 2025 by itnerd

Today, SOCRadar published an analysis on the Oracle E-Business Suite vulnerability. The flaw, already exploited in the wild, has been used in data theft and extortion attacks attributed to the Cl0p ransomware gang. As Oracle rushed out an emergency fix, the situation revealed a wider ecosystem of threat actors and exploit leaks that organizations must urgently address.

The analysis dives into what exactly this vulnerability is, who is impacted and how severe the risk is, who is behind the exploit — Cl0p — and what indicators of comprise organizations should look for. 

For full details, the analysis can be found here: https://socradar.io/cve-2025-61882-oracle-e-business-suite-exploited/

KnowBe4 Earns Triple Recognition in Q3 2025 with Industry Awards for Human Risk Management, Sustainability Leadership and Corporate Responsibility

Posted in Commentary with tags on October 6, 2025 by itnerd

KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human and AI agent risk management, today announced it has received three prestigious industry awards in Q3 2025. KnowBe4 was named to the Constellation ShortList™ for Human Risk Management Solutions for Q3 2025, honored with the 2025 Sustainability Leadership Award from the Business Intelligence Group, and earned the TrustRadius Tech Cares 2025 award for the sixth consecutive year. These recognitions underscore KnowBe4’s commitment to driving positive environmental and social impact while delivering an innovative cybersecurity platform that helps organizations manage risk.

Innovation in Human Risk Management

The technology vendors and service providers included in the Constellation ShortList™ for Human Risk Management Solutions for Q3 2025 deliver critical transformation initiative requirements for early adopters and fast-follower organizations.

Sustainability Leadership Recognition

The Sustainability Awards honor companies, products, projects and individuals proving that purpose-driven strategy can fuel growth. Winners are selected by a panel of business-leader judges who evaluate performance, innovation and quantifiable outcomes across environmental, social and governance (ESG) pillars.

Corporate Social Responsibility Excellence

The TrustRadius Tech Cares 2025 awards recognize B2B technology companies that have gone above and beyond to support employees and communities in the last year.

For more information on KnowBe4, visit www.knowbe4.com