TCP/IP Inventor Vinton Cerf Featured in New National Inventors Hall of Fame Video

Posted in Commentary with tags on October 1, 2025 by itnerd

Vinton G. Cerf, a National Inventors Hall of Fame® Inductee and renowned inventor of transmission control protocol/internet protocol (TCP/IP), is being featured in a long-form video about his inspiring innovations, life and legacy produced by the Hall of Fame in partnership with the United States Patent and Trademark Office.

The video is now available to view here:

Cerf was inducted into the Hall of Fame in 2006 for his co-invention (with Robert Kahn) of the architecture of the internet and the software known as the transmission control protocol/internet protocol, or TCP/IP, that allows supercomputers and our everyday devices to share the internet.

Major Retailers, Gift Card Networks, and Law Enforcement Unite for 2025 Holiday Gift Card Fraud Awareness Campaign

Posted in Commentary with tags , on October 1, 2025 by itnerd

As the 2025 holiday shopping season approaches, an alliance of leading retailers, card networks, and law enforcement agencies is launching a nationwide social media campaign to combat the alarming surge in gift card fraud. The campaign, led by the Gift Card Fraud Prevention Alliance (GCFPA), aims to educate, empower, and protect consumers during the busiest shopping time of the year.

From October 1 through December 25, holiday shoppers will see daily tips and information on the latest scams on LinkedIn and Instagram platforms, spotlighting the tactics scammers use and steps every consumer can take to avoid falling victim. This collaborative effort marks a landmark partnership among industry giants, national and state retail associations, and public safety organizations, all dedicated to protecting the public from gift card-related crimes.

Gift Card Fraud on the Rise: A United Response

According to recent reports, gift card fraud costs consumers millions of dollars annually, with incidents peaking during the holiday season. Scammers frequently target unsuspecting shoppers, tricking them into purchasing gift cards as payment for a fake debt or tampering with cards in stores and draining card funds as soon as the cards are purchased.

Recognizing the urgent need for greater awareness, retailers—including national chain stores, grocery outlets, and specialty merchants—are joining forces with major gift card networks, state retail associations, and local, state, and federal law enforcement agencies to spread vital information.

Empowering Shoppers with Knowledge and Action

The campaign’s social media posts will focus on these essential warnings:

  • Legitimate organizations will never ask you to pay fees or debts with gift cards.
  • Never buy gift cards to pay a debt or to bail someone out of jail.
  • Inspect gift cards carefully before purchasing. If a card looks altered, report it and choose another.
  • Check Gift Card Balances Safely! Scammers set up fake websites and buy Google ads to trick you into entering your gift card details. Always use the official retailer’s site to check your card balance.
  • Report gift card scams to local police, state attorneys general, and the FTC. Every report matters.

By sharing clear, actionable guidance and real-world examples, partner organizations hope to reduce   fraud and ensure shoppers enjoy a safe, stress-free and joy-filled holiday season.

A Shared Commitment to Consumer Protection

This collaborative campaign represents a shared commitment by retailers, gift card issuers, and law enforcement to stand together against fraud. Gift card fraud isn’t just a small-time scam—it’s often the work of organized retail crime rings. These groups use sophisticated tactics to target consumers. The GCFPA is working with a diverse group of stakeholders to keep gift cards safe.

How to Get Involved

Consumers are encouraged to follow the RILA Communities Foundation on LinkedIn and @ProtectMyGiftCard on Instagram for daily tips and updates throughout the campaign. For more information or to report a scam, contact local law enforcement, state attorney general’s offices, or visit the Federal Trade Commission’s website.

Auto dealership software company notifies 767,000 people of data breach

Posted in Commentary with tags on October 1, 2025 by itnerd

Comparitech today reported that auto dealership software company Motility Software Solutions this week notified 766,670 people of an August 2025 data breach that compromised names, SSNs, phone numbers, email addresses, DOBs, and driver’s license numbers. 

Rebecca Moody, Head of Data Research at Comparitech, provided the following commentary:

“This ransomware attack becomes the ninth largest this year so far (based on records affected) and is the second-largest breach on a technology company.

It’s also yet another attack on a software company that’s used by multiple organizations. In recent months, we’ve seen a number of disruptive attacks like these which have had far-reaching consequences either in the large quantities of data breached and/or the disruption of encrypted systems. Other examples include the attack on Collins Aerospace which caused chaos across European airports and the attack on a Swedish technology company, Miljödata, which impacted over 200 municipalities with system downtime and has seen a breach of at least 1 million records.

As hackers continue to evolve and look for the most disruptive ways to have an impact, attacks on companies like Motility Software Solutions offer great appeal because of how many entities can be targeted through one company. While this attack on Motility Software Solutions doesn’t appear to have caused a lot of disruption to car dealers (like the attack on CDK did back in June 2024), it has resulted in a significant data breach.”

Victims of this breach should be prepared for secondary attacks as you know those will be inbound. Thus it highlights the fact that organizations should make every effort to keep the bad guys out at all costs.

59% of employees use unapproved AI tools at work – most of them also share sensitive data with them

Posted in Commentary with tags on October 1, 2025 by itnerd

Cybernews conducted a survey on employees in the US to figure out how they use AI tools at work. The research revealed that the vast majority of respondents used AI tools that were not approved by their employers.

Here are the key findings:

  • 59% of employees use AI tools that their employer has not approved.
  • Out of those using unapproved tools, 57% claim that their direct managers are OK with it and support it, and 16% claim their direct manager doesn’t care.
  • 75% of those who use unapproved AI tools at work admit to sharing sensitive data with them.
  • Executives and senior managers are most likely to use unapproved AI tools at work.

For more information, here’s the full report: https://cybernews.com/ai-news/59-of-employees-use-unapproved-ai-tools-at-work-most-of-them-also-share-sensitive-data-with-them/

OVHcloud announces members of new blockchain and Web3 startup / scaleup accelerator

Posted in Commentary with tags on October 1, 2025 by itnerd

OVHcloud today announces the members of its new startup / scaleup accelerator. The Fast Forward Blockchain & Web3 Accelerator runs from September 17 to November 20 and includes sixteen startups. The accelerator provides cohort members with business and technical support, turbocharging their growth trajectories through mentoring, workshops, infrastructure credits and technical support.

Empowering the next generation of blockchain startups

All of the accelerator startups are focused on developing efficient solutions that run on more optimized mechanisms like Proof of Stake, continuing to build blockchain as a highly sustainable and enterprise-ready industry. 

The accelerator is supported by OVHcloud and six ecosystem partners: Alchemy, Degen House, CryptoMondays London, Super Team Solana, Fintech District and Dysnix. The startups include:

  1. ARZE, an AI-powered ERP suite composed of three integrated tools: payroll, invoicing, and back office business intelligence.
  2. Kavodax Inc, a blockchain-powered B2B cross-border payment platform.
  3. Kross Blockchain, Africa’s first smart contract layer 1 chain and Nigeria’s first blockchain.
  4. Mira Network AG, a Swiss-based blockchain ecosystem revolutionizing how communities fund, earn from, and participate in real-world businesses.
  5. KALICERTIF, a blockchain-based certification platform for digital assets and identity verification.
  6. tokenforge GmbH, a white-label platform for tokenizing real-world assets in a fully compliant and scalable.
  7. Insurechain SL, offering a modular and interoperable infrastructure designed to simplify and accelerate the adoption of blockchain technology across industries.
  8. AzurSafe, providing advanced transactional analytics solutions for enterprises and financial institutions to help them fight fraud.
  9. Credshields technologies, a Web3 cybersecurity tooling company.
  10. CryptoMate, a blockchain-based platform for effortless global transactions.
  11. Huralya, a blockchain-based platform for anonymous sign-ins and crypto payments for easy subscriptions.
  12. Pirichain Technology, a blockchain-based data ecosystem designed for secure data storage, management, and analysis.
  13. Sollpay, a next-generation non-custodial wallet and payment platform.
  14. Vizyon France, a decentralized teleradiology platform.
  15. AYUMIA, a blockchain-based platform for secure and transparent food tracking and tracing.
  16. Epoch Protocol, a coordination layer for intent solvers – tools designed to analyze and understand the intent behind smart contract code or blockchain transactions.

A transformative accelerator designed for maximum impact

The program includes three phases, supporting startups in fine-tuning their go-to-market strategy before coaching them in infrastructure optimization strategies and finally helping them to establish scalable growth and prepare for investor engagement. The program comes during the tenth anniversary of OVHcloud’s Startup Program and follows its highly successful AI Accelerator. The Blockchain & Web3 Accelerator will culminate with a Showcase event at the OVHcloud Partner Network Summit on 20 November 2025.

The 10-week program also offers:

  • €50k in free cloud credits to use on OVHcloud Public Cloud solutions, in addition to existing Startup Program credits
  • 1-on-1 mentoring from external and OVHcloud experts
  • Engagement with corporates and partners for possible POCs
  • Engagement with Venture Capitalists (VCs) for possible funding

KnowBe4 Is a Proud Participant in the Microsoft Security Store Partner Ecosystem

Posted in Commentary with tags on October 1, 2025 by itnerd

KnowBe4, the world-renowned platform that comprehensively addresses human and agentic AI risk management, today announced its inclusion in the Microsoft Security Store Partner Ecosystem. KnowBe4 was selected based on their proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting edge functionality, and close relationship with Microsoft.

KnowBe4 is collaborating with Microsoft to help shape the development of the Microsoft Security Store, providing feedback on new features, integration experiences, and customer needs. By publishing certified offerings and AI agents that integrate seamlessly with Microsoft Security products, KnowBe4 is making it easier for organizations to discover, purchase, and deploy trusted security technologies. Through the Security Store, KnowBe4 is helping customers accelerate their security outcomes and simplify operations with products that are vetted, easy to deploy, and designed to work together.

The Microsoft Security Store is setting a new benchmark for cybersecurity procurement and deployment. By centralizing a wide range of security solutions and AI agents—organizations can now streamline how they discover, acquire, and operationalize advanced security technologies. With features like industry framework alignment, simplified billing, and guided deployment, the Security Store helps security teams reduce complexity, accelerate adoption, and maximize the value of their security investment.

VMware Related Zero Day Has Been Exploited By Threat Actors For A Year…. Wow!

Posted in Commentary with tags on October 1, 2025 by itnerd

Broadcom has patched a high-severity VMware vulnerability (CVE-2025-41244, CVSS 7.8) that had been exploited as a zero-day for nearly a year. The flaw, impacting VMware Aria Operations and VMware Tools (including open-vm-tools on Linux), allows privilege escalation to root on VMs. Security researchers at NVISO Labs reported that a Chinese state-sponsored threat group, UNC5174, has been actively exploiting the bug, including by staging malicious binaries in writable directories like /tmp/httpd.  Patches are now available across VMware Cloud Foundation, vSphere, Aria Operations, Telco Cloud Platform, VMware Tools, and open-vm-tools (to be distributed by Linux vendors). Detection requires monitoring for uncommon child processes or leftover collector scripts.

You can find more details here: https://blog.nviso.eu/2025/09/29/you-name-it-vmware-elevates-it-cve-2025-41244/

Gunter Ollmann, CTO, Cobalt had this comment:

“Zero-days that persist in widely used infrastructure for nearly a year highlight the growing mismatch between vendor disclosures and adversary realities. In this case, the triviality of the exploit means it likely fell into the hands of multiple threat actors, not just those with nation-state capabilities. When exploitation is both simple and widespread, leaving customers unaware is an unforced error that adds unnecessary risk. The industry needs more candor around zero-day exploitation so defenders can calibrate their urgency. In the long run, trust in security advisories will matter as much as the patches themselves.”

Dale Hoak, CISO, RegScale adds this:

“An unpatched or undisclosed zero-day undermines the very foundation of compliance programs, which rely on accurate risk data. If customers don’t know an exploit is active, they can’t prioritize remediation, leaving regulators and auditors working from a false baseline of assurance. This is why it’s critical to operationalize risk in the larger context of patching—moving beyond a checklist exercise to a process that connects advisories, vulnerability data, and remediation actions in real time. Continuous controls monitoring enables that connection, ensuring that controls are validated against live threats, not just documented in static reports. Real assurance comes when organizations can align compliance, risk, and patching as a single operational discipline.”

While I am a big believer in patching all the things, you also have to have an approach to security that mitigates the potential effects of zero days. That’s not easy to do, but it has become a requirement given how quickly threat actors evolve and shift tactics.

I should also mention that the fact that this was out there for a year is bad. Extraordinarily bad. But you knew that already.

UPDATE: Adrian Culley, Senior Sales Engineer at SafeBreach adds this comment:

“Broadcom has released fixes for CVE-2025-41244 and related issues affecting VMware Aria Operations and VMware Tools. In certain configurations, VMs with VMware Tools managed by Aria Operations with SDMP enabled local privilege escalation to root. NVISO reports the bug was exploited in the wild since mid-October 2024 by a China-nexus actor assessed as UNC5174. Teams should patch Aria Operations/Tools immediately and ensure Linux hosts receive updated open-vm-tools from their distributors. Hunt for exploitation by looking for mimicked system binaries (e.g., httpd) in writable paths like /tmp/httpd and for unusual child processes from discovery collectors. After patching, continuously validate that privilege-escalation, credential harvesting, and lateral-movement paths are closed—don’t just assume they are.”

Fewer than half of enterprises are fully successful with network observability tools: BlueCat

Posted in Commentary with tags on October 1, 2025 by itnerd

BlueCat today announced the findings of a new report developed in collaboration with Enterprise Management Associates (EMA), The Network Observability Maturity Model: How to Plan for NetOps Excellence. An independent study of 252 IT leaders found that despite investing heavily in observability tools, most enterprises struggle to manage their networks effectively. Fewer than half (46%) consider themselves fully successful with network observability tools, underscoring the urgent need for a more unified and intelligent approach.

The report highlights the top challenges currently plaguing network operations teams: tool sprawl, limited visibility, poor data quality, and excessive alert noise. These gaps increase operational risk, delay troubleshooting, and expose enterprises to performance problems, security vulnerabilities, and costly downtime.

Key report findings include:

  • Tool sprawl is pervasive: 87% of NetOps teams use multiple observability tools, creating inefficiencies and fragmented insights.
  • Alert noise wastes resources: Only 29% of alerts are actionable, slowing incident response.
  • Cloud and SD-WAN create blind spots: Teams lacking visibility into modern environments are far less successful.
  • Data quality and telemetry matter: Real-time streaming data collection and accurate telemetry improve AI-driven analytics and proactive response.
  • Dashboards enable alignment: Unified, customizable dashboards allow NetOps, SecOps, and CloudOps teams to share a single source of truth.
  • AI-driven automation is the differentiator: Organizations advancing to solutions that are intelligent, automated, optimized, and AI-driven gain faster troubleshooting, predictive optimization, and capacity planning.

To help IT leaders resolve these challenges and maximize the value of their toolset, EMA and BlueCat developed the Network Observability Maturity Model, a five-stage framework that shows IT leaders what they can gain if they consolidate tools, expand visibility across hybrid environments, and embrace AI-driven automation. Ultimately, the framework helps IT stakeholders understand how they can optimize their toolsets to become a best-in-class NetOps practice.

The model also highlights how AI-driven automation can accelerate response times and problem resolution, a sign of the highest level of maturity. EMA’s research shows organizations advancing to “Intelligent and Automated” or “Optimized and AI-Driven” stages along this maturity curve are far more successful in preventing and rapidly resolving issues.

BlueCat’s network observability and intelligence solutions, including LiveNX, LiveWire, and LiveAssurance, help enterprises consolidate fragmented monitoring stacks and extend visibility across hybrid and multicloud networks. These solutions keep the network running without interruption by proactively ensuring its performance, security, and reliability. By pairing flow and packet data with customizable dashboards and AI-driven insights and root cause analysis from LiveAssist, BlueCat helps IT teams prevent downtime, surface issues before they impact the network, and ensure policy enforcement across distributed environments.

The full report is available here: https://www.liveaction.com/observability-report-2025/.

WestJet Hack Exposed PII Of Customers…. Yikes!

Posted in Commentary with tags on October 1, 2025 by itnerd

Canadian airline WestJet has alerted customers that a June cybersecurity incident compromised their personal information including passports and ID documents. This isn’t good for reasons that I will get into shortly. In the meantime, Erich Kron, CISO Advisor at KnowBe4, provided the following comments:

“It is very unfortunate that WestJet became a victim of yet another ransomware attack in the aviation space. For victims who had their data stolen, this could be a significant problem as modern air travel requires that people provide a lot of information to airlines as required by various governments. The information stolen, such as passport information or government identification, along with the other personal information such as more typical addresses and date of birth, can be enough to facilitate some significant identity theft. The fact that accommodations were among the list of information stolen can also have a more significant impact both by attackers scamming the victims, and for WestJet if the leakage of medical information violates any regulatory rules.

“A number of recent attacks such as this use social engineering, telephone calls specifically, to get help desk employees to reset passwords or multi-factor authentication information for accounts, such as employee accounts, that attackers are targeting. Once they’ve gained access to a legitimate account, it can be used to perpetuate other attacks against others within the organization, or to impact systems that can be used to steal information or spread malware such as ransomware.

“Organizations of every size and across every industry need to ensure that they are taking precautions to manage human risk, especially for those that are outward facing or in roles such as customer service employees. A good human risk management (HRM) program should address these types of attacks along with those sent through email or text messages and look at ways to manage other types of human risk such as accidental errors as well.”

This is going to be a huge problem for anyone who is affected by this hack. Those affected are going to be prime targets for identity theft and the like. Thus those affected should be on guard for secondary attacks on them.

UPDATE: Paul Bischoff, Consumer Privacy Advocate at Comparitech, provided the following comment:

“Most of the data exposed in this attack does not pose a direct threat to WestJet customers, but it could be used to craft personalized and convincing phishing messages. Be on the lookout for phishing emails and text messages from scammers posing as WestJet or a related company. Never click on links or attachments in unsolicited emails.

Affected customers should also keep an eye on their frequent flyer accounts. Hackers could try to steal your air miles or hijack your frequent flyer account and sell it on the dark web. (https://www.comparitech.com/blog/information-security/how-much-are-stolen-frequent-flyer-miles-worth-on-the-dark-web/).”

CIRA introduces Cyber Stack

Posted in Commentary with tags on October 1, 2025 by itnerd

Today CIRA announced the launch of CIRA Cyber Stack, a new streamlined portfolio bringing together its suite of cybersecurity solutions under one unified name. Cyber Stack consolidates CIRA’s trusted services, CIRA XDR, CIRA Cybersecurity Awareness Training, CIRA Anycast DNS and CIRA DNS Firewall into a single, integrated portfolio designed to help organizations build digital resilience against a fast-evolving threat landscape.

What began as a single cybersecurity solution with CIRA Anycast DNS has steadily evolved into a layered, integrated portfolio that organizations across Canada can trust. Cyber Stack simplifies how IT professionals working alone or in teams integrate and deploy new solutions into existing technology stacks for layered protection. Rooted in Canadian identity, the new portfolio works as an integrated shield and evokes the layered strength of stacked logs, as a sturdy, long-lasting, homegrown protection.

Cyber Stack will debut today at SecTor 2025 (booth #1011) and Canadians Connected in Toronto, and will roll out across customer platforms in the coming days. Although the suite is built for combined strength, each CIRA cybersecurity product will continue to be available individually. Learn more at cira.ca/cyberstack.