radar-rss
Two major hacking groups are teaming up for dangerous new ransomware attacks
There appears to be a new ransomware player in the game.
Researchers spotted a brand new Ymir ransomwareThis new strain teamed up with a group deploying infostealersThere is a chance that the entire operation was done by a single actor
Two hacking groups have been recently observed working together to infect a victim – one to establish initial persistence and steal information, and one to encrypt the systems and demand a ransomware payment.
Researchers from Kaspersky recently investigated one such incident in Colombia, where the unnamed company first got infected by RustyStealer, an infostealing malware capable of grabbing login credentials, sensitive files, and more.
This part of the attack was likely conducted by one set of criminals who, once their part was done, handed the access over to a second group.
Single actor?
The second group first made sure its encryptor doesn’t trigger any antivirus or antimalware alarms. To that end, they installed different tools, such as Process Hacker and AdvancedIP Scanner. “Eventually, after reducing system security, the adversary ran Ymir to achieve their goals,” the researchers conclude.
Ymir is the name of both the encryptor and the threat actor behind it, and is also a relatively new entrant in the ransomware space. The malware is quite unique, too, in that it operates entirely from memory, taking advantage of different functions such as ‘malloc’, ‘memove’, and ‘memcmp’ to prevent being detected.
While teamwork is not a foreign word in the world of cybercrime, there is also a slight possibility that this entire operation was done by a single actor. In that case, it would mark an entirely different approach to ransomware attacks, and possibly a notable shift in how ransomware attacks are conducted.
“If the brokers are indeed the same actors who deployed the ransomware, this could signal a new trend, creating additional hijacking options without relying on traditional Ransomware-as-a-Service (RaaS) groups,” Kaspersky researcher Cristian Souza said.
In any case, it is possible that Ymir will grow into a formidable threat actor, infecting more companies in the months to come.
Via The Hacker News
You might also like
Halliburton hit by cyberattack disrupting operationsHere’s a list of the best firewalls todayThese are the best endpoint protection tools right now
Millions of jobseekers could be at risk after private data leaked online by recruitment firm
Job seeker data belonging to Alltech Consulting Services left exposed in online database.
Over 200,000 records of jobseekers were left exposed in a databaseThe records included sensitive PII that could be used in scams and fraudIt isn’t known how long the database was left exposed, or who accessed it
Over two million records belonging to Alltech Consulting Services have been discovered by cybersecurity researcher Jeremiah Fowler in a non-password protected database.
Included within the exposed data is the personally identifiable information of over 216,000 job seekers, including names, phone numbers, email addresses, the last four digits of their SSN, passport numbers, and work authorization visa status.
Alltech Consulting Services work with over 1,000 organizations to source employees in the IT and engineering industries.
Tons of data exposed
The database has since had public access removed, but employer details were also contained within the database such as names, company names, email addresses, and phone numbers, along with applicant data including salary expectations, employment history, and if they were willing to relocate for the job.
Considering the general salary weighting for senior IT and engineering roles, many of those who have had their data leaked from the database would be prime targets for cybercriminals looking to extort victims in spear phishing campaigns or commit fraud and identity theft using their details.
The details contained within the database could also be used to target individuals with fake job offers, with Fowler pointing out that $737 million was lost to fake job offers between 2019 and 2023, with fake job scams rising by as much as 110% between 2022 and 2023.
“Although the records indicated the files belonged to Alltech, it is not known if they managed the unencrypted database or if it was managed by a third party,” Fowler also stated in his writeup.
“It is also unknown how long the records were exposed or if anyone else accessed them, as only an internal forensic audit can identify that information.”
The FBI recently released a warning about a series of job offers that scam victims out of cryptocurrency, and web developers have been targeted with malware hidden in Python packages by North Korean hackers.
You might also like
These are the best people search findersAmazon confirms employee data stolen after third-party MOVEit breachTake a look at the best malware removal software
X is testing a free version of its Grok AI chatbot that doesn’t need a blue-tick subscription
It looks like X is in the process of adding a free tier to its Grok AI chatbot.
Over the weekend various users of X noticed that they were being offered a free-tier version of Grok, X’s AI chatbot, to try. The free version comes with some limitations, however.
So far Grok has only been available on subscription, an approach that’s markedly different from other AI generators like OpenAI’s ChatGPT, Meta’s MetaAI and Google Gemini, which offer a free tier that has fewer features than the paid-for version. Similarly, Apple Intelligence is still yet to roll out completely, but will remain free for its first few years at least.
X user @lohansimpson posted a screenshot of the Grok invite and wrote, “Free Grok is coming(With limits)! It will be limited locations at first”.
BREAKING: Free Grok is coming(With limits)👀! It will be limited locations at first pic.twitter.com/V8tbV8QkQtNovember 10, 2024
Screenshots of the invitation to try Grok contain the text, “A free tier of Grok is now available in your region. Chat, generate images and analyze photos. Limits apply.”
According to a researcher on X who has the user name swak, users on the Grok free tier will be limited to 10 Grok 2 questions every two hours and 20 Grok 2 mini questions every two hours. Grok 2 and Grok 2 mini are different LLMs that X offers. You will also be restricted to analyzing up to three images a day.
It’s not all good news for X users, because if those are the limitations on the free tier of Grok then it will be much more restricted than its competitors, like MetaAI.
(Image credit: Lance Ulanoff/X)
Unrestricted images
Grok raised a lot of eyebrows, and quite a few questions, when Grok 2 was released in August this year containing the Flux image generator which had very few restrictions on its image-generation capabilities compared to other AI image generators.
While most AI image generators will stop short of letting you create images of politicians, celebrities, and copyrighted characters, like Superman or Iron Man, Grok seemed to be happy to let you create these type of images with abandon.
It’s not clear if the free version of Grok will have the same unrestricted access to the Flux image generator as the subscription service X currently offers, but a move to offer Grok to the wider X user base for free could dramatically increase the number of Grok users almost overnight, turning it into a real competitor to ChatGPT, Meta AI and Google Gemini.
You might also like…
Grok-2 arrives on X with AI image creation, precious few guardrails, and lots of questionsGrok gets glasses to see what you’re talking aboutX is now using your posts (and more) to train its Grok AI, but there’s something you can do about it
Maximizing cybersecurity ROI: Best practices for CISOs today
CISOs can optimize security ROI by consolidating tools, addressing top risks, and communicating cybersecurity value to the board.
CISOs face the always challenging task of ensuring their cybersecurity investments yield maximum returns. With limited budgets, an influx of new security tools, complex third-party relationships, and ever-changing regulatory requirements, it’s essential to adopt best practices that optimize security spending while effectively mitigating risks.
To help CISOs get the most out of their cybersecurity investments, it’s essential they can focus on maximizing upfront spending, prioritizing risks, and establishing clear communication with the board. Having the right security capabilities can ease this process. By putting cybersecurity at the center of business operations, CISOs can serve as the point of connection between both.
Maximize upfront security investments
One of the foundational steps to maximizing cybersecurity ROI is to leverage an integrated security approach by consolidating multiple security tools into an integrated framework. This not only reduces the complexity of managing disparate tools but also enhances the efficiency of security operations. For example, adopting an integrated security platform can streamline monitoring, detection, and response processes, providing a comprehensive view of the threat landscape and supporting faster mitigations and incident resolutions.
As one example, Application Security Posture Management (ASPM) platforms are a key way to maximize cybersecurity ROI across Product and Software security as they streamline security processes, providing comprehensive visibility across applications and security gaps. ASPM platforms help organizations break down security silos, facilitating a unified approach to threat detection, risk management, and compliance.
In addition, tools that help with automation play a critical role in maximizing the value of security investments. Automated systems can offer continuous monitoring and real-time threat detection, capabilities that human teams alone cannot sustain. By handling routine tasks such as log analysis, compliance reporting, and initial threat triage, automation frees up time for security teams to focus on strategic activities. This not only enhances operational efficiency but also reduces the risk of human error and fatigue. The level of automation is critical; it must optimize operations without introducing new complexities or risks.
Address the highest risks first
Prioritizing risks is crucial for achieving the highest ROI from security investments. Given the sheer volume of potential threats, organizations must focus on the most impactful vulnerabilities first. Advanced analytics and AI can provide clear, actionable insights, allowing security teams to identify and address the highest risks first.
One practical approach is to use threat intelligence to inform risk management strategies. Threat intelligence involves collecting and analyzing data on current threats, including indicators of compromise (IoCs), tactics, techniques, and procedures (TTPs) of threat actors, and profiles of cybercriminal groups. This information enables organizations to anticipate and mitigate threats proactively, reducing the likelihood of successful attacks and minimizing potential damage.
In reviewing the ideal approach to application security and ASPM, it is crucial to adopt a three-dimensional perspective on threat management. First, organizations should consider the severity of potential vulnerabilities (CVEs), ensuring to prioritize those that pose the greatest risk. Second, it is vital to assess whether these vulnerabilities are being actively exploited, which adds urgency to remediation efforts. Finally, security responses must be aligned to the unique business context of each threat and its potential damage. This nuanced understanding helps to assess and prioritize the risks that matter most to each organization while saving time and resources by avoiding taking unnecessary actions.
As a part of that final step, conducting regular security audits can also help identify and prioritize vulnerabilities. Audits involve comprehensive evaluations of an organization’s cybersecurity policies, procedures, and systems to ensure they are effective and compliant with regulatory requirements. Key elements of a security audit include risk assessments, policy reviews, penetration testing, and vulnerability scans. These activities provide a roadmap for enhancing an organization’s security posture and addressing critical risks.
Enhance communication with the board
Effective communication with the board is essential for aligning cybersecurity initiatives with broader business goals. CISOs must translate complex security data into easy-to-understand metrics and visualizations that highlight the value of a security investment. This involves identifying key performance indicators (KPIs) that resonate with board members and demonstrate how cybersecurity efforts contribute to an organization’s overall success and risk management posture.
One strategy is to present metrics that reflect the financial impact of security measures, such as more seamless product rollouts, heightened customer experiences from frictionless access, above and beyond cost savings from avoided breaches or other efficiencies gained through automation. Additionally, highlighting how security initiatives support compliance with regulatory requirements can underscore the importance of an organization’s legal and financial standing.
Using storytelling techniques can also enhance board communication. By framing security updates within the context of real-world incidents and potential business impacts, CISOs can make the information more relatable and compelling. This approach helps board members understand the significance of cybersecurity and the need for ongoing investments in this area.
Bridging future security and business goals
To truly maximize the ROI of cybersecurity investments, organizations must adopt a forward-looking approach that anticipates future threats and business needs. This means investing in technologies that provide scalability and flexibility—comprehensive solutions that take into account cloud-based security and AI-driven threat detection systems, which can adapt to changing business environments and evolving threats.
The path to maximizing cybersecurity returns takes ongoing focus. It demands a dedication to integrating state-of-the-art technology, fine-tuning risk management strategies, and improving communication with key stakeholders. By taking these steps, organizations will feel empowered to safeguard their assets and bolster their business growth—and resilience—for the years to come. Looking ahead, it’s no mystery that the need to unify security approaches with business goals will grow even more important, placing the CISO role at the center of business success.
We’ve featured the best encryption software.
This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
My favorite Netflix docuseries America’s Sweethearts: Dallas Cowboys Cheerleaders has been renewed for season 2 and I’m already high kicking with joy
Netflix renews my favorite docuseries America’s Sweethearts: Dallas Cowboys Cheerleaders for a second season and it has 100% on Rotten Tomatoes.
Netflix has renewed America’s Sweethearts: Dallas Cowboys Cheerleaders It reached the Netflix global top 10 list and has 100% on Rotten TomatoesSeason 2 will follow the Dallas Cowboys Cheerleaders through the 2024-25 season
Netflix has renewed one of my favorite docuseries America’s Sweethearts: Dallas Cowboys Cheerleaders for a second season, so BRB, just going to blast their pre-game routine song (Thunderstruck by ACDC) through my speakers right now.
America’s Sweethearts: Dallas Cowboys Cheerleaders spent four weeks in the Netflix global top 10 list when it was released in June and earned a stellar 100% Rotten Tomatoes score, making it one of the best Netflix shows.
The best streaming service announced that the DC cheerleaders would be back for more sass and splits in 2025 with a video of the squad performing a cheer routine in their iconic blue and white uniforms.
DCC SEASON TWO WOO! The cheerleaders and the routine that captivated the world are coming back for Season 2! AMERICA’S SWEETHEARTS: Dallas Cowboys Cheerleaders returns in 2025. pic.twitter.com/H2DqDyn2DiNovember 11, 2024
What can we expect in America’s Sweethearts: Dallas Cowboys Cheerleaders season 2?
Netflix Tudum has revealed that America’s Sweethearts: Dallas Cowboys Cheerleaders season 2 “will chronicle the Dallas Cowboys Cheerleaders from nerve-wracking auditions and grueling training camp all the way through the high-energy NFL 2024–25 season”.
If it’s anything like season 1, we can expect high kicks and high emotions as the cheerleaders navigate their careers and personal lives while committing themselves to the cheerleading squad. It looks like we’ll be seeing some of our fan-favorites return for season 2 and we could potentially see some former faces come back and audition once again to become a member of the team.
While America’s Sweethearts: Dallas Cowboys Cheerleaders delves into the competitive world of the legendary cheerleading team, it also exposes the young womens’ struggles and emotional battles as they fight for their dream of securing a coveted spot on the squad.
The best Netflix documentary left me amazed at the utter dedication, physical stamina and technical skills needed to become a DC cheerleader. Having to learn 50 routines while juggling a personal and professional life is definitely something I would struggle with, but that’s just a regular day for the Dallas Cowboys Cheerleaders. Bring on 2025!
You might also like
Arcane season 2 finally gave us the huge Caitlyn and Vi moment we’ve been waiting for Virgin River season 7 will start filming in 2025 and I can’t wait for the Netflix show to returnScavengers Reign co-creator says the hit Netflix show with 100% Rotten Tomatoes has been canceled and fans are heartbroken
AI-enhanced ransomware attacks in the UK necessitate ERP security
Ransomware is evolving with AI, targeting ERP systems—learn how companies can defend against it.
In today’s digital age, it’s becoming more common to hear phrases like “Our systems are down,” whether you’re at a school, doctor’s office, or company office. This isn’t just a technical glitch, it’s often a symptom of the rising wave of cyberattacks, particularly ransomware. These disruptions aren’t just inconvenient. They can lead to significant financial and operational losses. Despite efforts by government regulators to address these concerns, ransomware attacks are becoming more sophisticated, especially as attackers leverage artificial intelligence to amplify their tactics.
To better gauge the fallout of these attacks, we surveyed 500 senior cybersecurity professionals across the UK and found that 83% of organizations had experienced ransomware attacks in the last year, with 46% reporting four or more incidents. Furthermore, 61% of businesses affected by ransomware reported being offline for at least 24 hours. For large enterprises, this level of downtime can translate to losses in the millions of pounds.
The data underscores the urgency of addressing these threats with more effective, comprehensive cybersecurity strategies.
ERP systems are a blind spot
One of the most concerning findings from the research is the vulnerability of enterprise resource planning (ERP) software to ransomware attacks. ERP systems are critical to modern business operations, managing everything from financial data and human resources to supply chains and customer relationships. Unfortunately, 89% of organizations that experienced ransomware attacks reported that their ERP systems were targeted. Given that ERP systems house a company’s most sensitive and essential data, this vulnerability represents a significant blind spot in many organizations’ cybersecurity defenses.
The challenge is compounded by the fact that ERP systems are often managed separately from other IT infrastructure, which can lead to gaps in protection. Cybersecurity teams may focus on securing a broader network, while ERP administrators concentrate on ensuring system performance and uptime. This lack of coordination can create vulnerabilities that cybercriminals are eager to exploit
AI multiplies attack impact
As ransomware becomes more prevalent, attackers are increasingly leveraging AI to enhance the sophistication of their attacks. AI allows cybercriminals to automate and scale their operations, targeting specific systems like ERP with precision. For example, cybercriminal organizations are using AI-driven phishing tactics to target high-level government officials and businesses to bypass traditional defenses, using cloud platforms such as Dropbox and Google Drive to deliver malicious payloads.
The use of AI in cyberattacks also opens the door to more complex manipulations, including the creation of deepfakes and highly personalized phishing emails. These tactics deceive even experienced cybersecurity professionals, highlighting the need for more advanced defensive measures. The traditional approaches to cybersecurity, which often focus on perimeter defenses, access controls, and identity management, are no longer sufficient.
Businesses investing in new solutions
Survey data indicates that just over half of companies are enhancing their security postures: 57% are investing in new solutions, 54% are prioritizing employee training, 53% have added more cybersecurity staff internally, and around 36% have hired external threat research firms. While these measures represent a positive shift, they are only part of the solution. To fully address the growing complexity of cyberattacks, companies must move beyond general cybersecurity measures and incorporate ERP-specific threat detection and response into their broader strategies.
Traditionally, many organizations have viewed ERP security as secondary to more visible components like network or endpoint security. This mindset needs to evolve. ERP systems are built on top of very complex technology, that if not managed properly can be just as vulnerable, if not more, than other components of the IT landscape, due to the sensitive nature of the data these business critical applications store. Continuous monitoring for vulnerabilities is essential, as is the use of AI-driven tools to detect suspicious behaviors before they escalate into more severe threats. A comprehensive ERP security strategy must also include advanced threat intelligence to stay informed of emerging risks and respond to them swiftly.
A critical aspect of defending ERP systems involves better alignment between cybersecurity teams and ERP administrators. These groups must collaborate closely to identify and close security gaps that attackers often exploit. Given the integral role ERP systems play in a company’s overall operations, ensuring that these two teams work together to monitor and defend these systems is vital for minimizing risks and preventing potential breaches.
The path forward: Using AI to fight AI
As the threat landscape evolves, solution providers in the cybersecurity space are offering increasingly advanced AI-driven tools that can help organizations safeguard their ERP systems. These tools can automate the detection of vulnerabilities, offer real-time threat intelligence, and provide pre-emptive patching solutions. Additionally, AI-enabled security solutions can help organizations detect patterns and behaviors that indicate cyberattack, allowing them to respond more quickly and effectively. This is particularly important in ERP environments, where a delay in response could lead to massive operational downtime and data loss.
While technology will undoubtedly play a key role in defending against AI-enhanced ransomware, it’s equally important for organizations to foster a culture of cybersecurity awareness. Employees should be trained to recognize the signs of phishing and social engineering attacks, as many ransomware incidents begin with seemingly innocuous emails or links. By combining advanced technological solutions with continuous employee education, organizations can better protect themselves from evolving threats.
Looking ahead, AI will play a dual role in cybersecurity, both as a tool for cybercriminals and as a key part of the defense strategy. To protect critical systems and sensitive data, businesses must adopt advanced, multi-layered security solutions that can detect, prevent, and respond to AI-enhanced threats. By taking a proactive approach, organizations can not only safeguard their operations but also ensure long-term resilience in an increasingly hostile cyber environment.
We’ve featured the best business VPN.
This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Major breach at American debt services firm exposes data of over a million customers
The data is yet to pop up on the black market.
Set Forth confirms suffering a data breach in May 2023Roughly 1.5 million people were affected by the incidentSet Forth offers 12 months of identity theft protection
American debt services company Set Forth has confirmed suffering a data breach incident in which sensitive information on more than a million people was stolen.
In a data breach notification letter sent to affected customers, the company said it identified “suspicious activity” on its systems on May 21 2024.
After implementing its incident response protocols, and engaging third-party forensic experts which investigated the incidents, the company determined that some personal information from its customers, as well as their spouses, co-applicants, or dependents, was stolen.
Defending the premises
The data stolen in the attack includes people’s names, postal addresses, birth dates, and social security numbers. In a subsequent filing with the Office of the Maine Attorney General, Set Forth confirmed that 1.5 million people were affected by this breach.
At press time, there was no information on who might have stolen the archives. No threat actors have yet assumed responsibility for the break-in.
To prevent similar incidents from happening in the future, Set Forth outlined a number of implementations, including enhanced endpoint monitoring, a global password reset, and additional security controls. Furthermore, the company is now offering identity theft protection services for affected individuals for 12 months, through Cyberscout.
“Again, at this time, there is no evidence that your information has been misused. However, we encourage you to take full advantage of this service offering,” Set Forth concluded in its letter.
In the meantime, multiple law firms have started looking into the matter, to see if there is grounds for a class-action lawsuit.
Via Cybernews
You might also like
Halliburton hit by cyberattack disrupting operationsHere’s a list of the best firewalls todayThese are the best endpoint protection tools right now
How to watch MAFS UK Reunion online and for free – stream 2024 Married at First Sight season 9 final episodes from anywhere
A measly four of 11 couples limped their way to the final decision, and here’s how to watch the 2024 MAFS UK Reunion online and for free.
How to watch MAFS UK Reunion 2024 online
The Married at First Sight UK reunion airs over two nights this week – Weds and Thurs – and is a chance for the group to look back on their time in the experiment. Season 9 has been explosive, and you won’t be surprised that two of the participants refused to take part in MAFS UK: The Reunion. Here’s where to watch MAFS UK Reunion 2024 online for free.
Part 1 of the The Reunion will feature a dinner party; part 2 will consist of a classic ‘sofa sit down’.
Just four of 11 couples limped their way to the final decision: Nathan and Lacey, Ross and Sacha, Adam and Polly, and Amy and Luke. Rumor has it that one or two finishers weren’t much longer destined for this world. One brand new couple, meanwhile, will have a lot to answer for.
The sheer crushing – in this case, misery – of the experiment means we rarely get a full complement at the reunion dinner and subsequent ceremony, and it sounds as though Mr Wife-Swap himself, Alex Henry, is among those refusing to show his face.
Read on as we explain how to watch MAFS UK season 9 Reunion from anywhere.
Can I watch the MAFS UK: The Reunion for free?
Yes. Both episodes of the MAFS UK Reunion will be available to stream on the FREE Channel 4 streaming service in the UK.
They will also air on the FREE 9Now platform in Australia at a slightly later date.
Don’t forget you can use a VPN to watch MAFS UK Reunion on your usual streaming service from abroad.
Unblock any stream with a VPN
If you’re keen to watch the MAFS UK Reunion 2024 but you’re away from home and access to the show is geo-blocked, then you could always use a VPN to access it (assuming you’re not breaching any broadcaster T&Cs, of course). You may be surprised by how simple it is to do.
Use a VPN to watch MAFS UK Reunion from anywhere:
NordVPN – get the world’s best VPN
We regularly review all the biggest and best VPN providers and NordVPN is our #1 choice. It unblocked every streaming service in testing and it’s very straightforward to use. Speed, security and 24/7 support available if you need – it’s got it all.
The best value plan is the two-year deal which sets the price at $3.69 per month, and includes an extra 3 months absolutely FREE. There’s also an all-important 30-day no-quibble refund if you decide it’s not for you.
Can you watch the MAFS UK reunion in the US?
At the time of writing, any plans to make MAFS UK season 9 available to watch in the US are yet to be announced, so two-part reunion is unlikely to be available either.
Brits currently away from home can use a VPN to watch MAFS UK Reunion on Channel 4 from abroad.
How to watch MAFS UK Reunion for FREE in the UK
The MAFS UK Reunion is a double-header, with the first part airing at 9pm GMT on Wednesday, November 13, and the second at 9pm on Thursday, November 14.
Like Married at First Sight season 9, the episodes will be available to stream on the FREE Channel 4 streaming service after broadcast.
Outside the UK? To access Channel 4 from abroad, you’ll need to download a good VPN, as detailed below.
Can you watch MAFS UK reunion in Canada?
As with the US, there’s no word as to when or if MAFS UK season 9 – or The Reunion specials – will air in Canada.
However, UK nationals currently traveling in Canada can use a VPN to unblock Channel 4 and watch the show from anywhere in the world. We recommend NordVPN.
How to watch MAFS UK Reunion in Australia
The 2024 MAFS UK Reunion episodes will be available to watch for free on 9Now in Australia, but with the series airing on a slight delay, it’s difficult to put a finger on any specific date.
For guidance, the reunion episodes are episodes 35 and 36 of the season.
For now, Brits away from home can use a VPN to watch MAFS UK Reunion on Channel 4 from abroad.
MAFS UK couples 2024
Nathan & LaceyRoss & SachaAdam & PollyAmy & LukeCaspar & Emma*Kieran & Kristina*Eve & Charlie*Alex & Holly*Richelle & Orson*Hannah & Stephen*Sionainn & Ryan*
* Couple left the experiment
Tottenham Hotspur announces partnership with ExpressVPN – but will it really solidify their defense?
After a recent shock defeat, fans are less than convinced by Spurs’ latest partnership
Tottenham Hotspur has today announced a new Digital Privacy Partner, ExpressVPN, in a two-year strategic deal. Calling fans to “dare to do more”, the announcement comes alongside an exclusive ExpressVPN offer for Spurs fans – though fans of other clubs should probably also take advantage given it boasts six months extra added to the plan.
Furthering innovation
Speaking on the partnership, Ankit Khemka, Chief Marketing Officer at ExpressVPN, said the club was a “true innovator in the sporting industry”, which aligned with ExpressVPN’s aim of “being innovators in digital privacy and security”.
ExpressVPN’s aims are backed by its results, which we frequently test. It continues to chart among the very best VPNs currently available and ranks top in terms of the most secure VPN you can buy. However, I should apologize to Spurs’ fans, as our testing doesn’t extend to set-piece defense and injury prevention quite yet!
Mixed responses
The timing of the Spurs announcement has been widely called into question by fans, with the club experiencing an unexpected Premier League defeat to newly-promoted Ipswich Town at the weekend.
At the time of writing, the announcement post on X, formerly Twitter, has over 300 likes, but over 340 comments, most of which aren’t best pleased. Many fans see this as yet another instance of business over football for the club, who are still yet to achieve major success in recent years.
Introducing @ExpressVPN – the Club’s Official Digital Privacy Partner 🤝November 12, 2024
Football and VPNs – is there a point?
The partnership between ExpressVPN and Tottenham Hotspur marks ExpressVPN’s first global partnership in football, but VPNs haven’t been a completely silent market in the sport.
NordVPN, our top-ranked VPN provider, has sponsored a number of clubs over the years, including Liverpool in 2018, Rangers in 2021, Ipswich Town in 2023 – so the club got an early lead on Spurs here, too – and Cardiff, Southend United, and Reading in 2024. Surfshark also entered the market in recent years, partnering with Swedish club AIK.
While direct links between the popular sport and cybersecurity may seem slim, there are a number of key reasons why the Spurs and ExpressVPN partnership makes sense. European away days can be made more secure when relying to public Wi-Fi in foreign countries, purchasing tickets is less risky for your personal data, and, most importantly, you can watch the Spurs go marching in whether you’re in the UK or on holiday abroad.
Why choose ExpressVPN?
Football fans, of Spurs and other varieties, will be glad to know the current offering from ExpressVPN is seriously strong. Firstly, the provider has been a firm fixture in our best VPN rankings for years now, secondly, ExpressVPN recently dropped its prices for the first time in fifteen years, and finally, the deal is impressively good. So good, in fact, it potentially even beats NordVPN.
ExpressVPN – from $4.99 per month + 6 months extra
ExpressVPN’s latest offer sees the best VPN for beginners (and most secure VPN) offer its cheapest ever price! at $4.99 per month with 6 months extra coverage included, you get a whopping 30 months of online security. Whether it’s high speeds you need using ExpressVPN’s Lightway protocol, effective unblocking of geo-restricted content, or even simply the most secure online experience possible, ExpressVPN has to tools to stop your online defenses falling apart.View Deal
Apple gets burned by the EU again – this time for geo-blocking you from some apps and movies
As the long saga of Apple-EU tensions continues, regulators have warned Apple to stop its practice of geo-blocking media content.
The EU has warned Apple to stop blocking media content based on where the user lives.The App Store, iTunes Store, Music, Apple Arcade, Books, and Podcasts are all named in the report.Apple has one month to reply with suggestions on how to improve.
The European Commission – the executive arm of the European Union – has warned Apple to desist from geo-blocking activities that it calls “discriminatory”.
In a press release posted to the official European Commission website, the Commission warned Apple to discontinue its practice of blocking Apple Media Services content based on where a user lives.
Apple Media Services comprises Apple’s digital storefronts and streaming services, and includes the App Store, Apple Arcade, Music, the iTunes Store, Books, and Podcasts.
It’s no secret that Apple tailors and restricts the content delivered through these services to specific national and regional markets, but this is rarely considered a form of discrimination.
However, the European Commission and the EU’s Consumer Protection Network have now notified Apple that these actions could contravene two EU regulations.
The EU’s Geo-blocking regulation forbids “unjustified discrimination” against an EU customer based on nationality, residence, or place of establishment when providing goods or services to customers in a different member state.
The Services Directive contains similar protections that forbid discriminatory provisions based on a customer’s nationality or place of residence.
Apple is, seemingly, generally loathe to cooperate with authorities if it can avoid doing so – see the company’s long history with the FBI – but the EU has managed to twist the arm of the world’s erstwhile most valuable company before.
It’s generally accepted that pressure from the EU was the main reason Apple switched to USB-C from the proprietary Lightning port. Though the rest of the mobile industry had long-since switched to USB-C, the Lightning port served as a valuable source of revenue for Apple through first-party sales and the “Made for iPhone” licensing scheme.
However, the EU announced regulation in 2022 forcing all device makers to adopt USB-C by the end of 2024, to reduce e-waste – Apple complied with the iPhone 15 lineup in 2023. Furthermore, the EU has successfully forced Apple to enable sideloading of apps and third-party App stores on iPhones sold in Europe.
We’ll probably see Apple fall in line with these regulations again, though there could be some consequences down the road – Apple Intelligence is still missing from EU iPhones, and Apple could continue to withhold features as retaliation for strong regulations. This is mostly conjecture at this point, though.
Apple has been given one month to reply to the European Commission, with suggestions on how to alleviate its own geo-blocking practices. Until then, be sure to keep up with our iPhone coverage for the latest updates.
You might also like
The Pixel 9 Pro Fold’s repair pricing shows the most dangerous thing about owning a foldableThis iPhone 14 Pro prototype has a haptic volume key, showing what could have been – and what still might comeAndroid 15 is going to make it easier for you to navigate indoors – here’s how