Public
Frustration Mounts Online After Verdance Cyberattack Freezes Payroll and Business Transfers
As systems at Verdance Financial began to recover from a crippling ransomware attack that halted back-office payment operations earlier this month, frustration across social media showed no signs of easing.
From missed paycheques and delayed rent to shops unable to pay suppliers, Canadians took to X and Facebook to voice their anger over the multi-day outage â and what many described as âvagueâ communication from the credit union during the disruption.
âSo @Verdance employee payroll is locked up from that cyberattack and now my rent is going to be late,â posted user @leahdubois. âThis is so messed up itâs not even funny.â
Another user, @justincarr, whose profile identifies him as a small business owner in Quebec, expressed similar concerns under the hashtag #VerdanceHack.
âWhen is Verdance going to give us a straight answer on how long this mess will last and when we can get paid?? I canât keep operating my shop with suppliers on hold and bills piling up.â
On Facebook, users echoed the sentiment.
âCurrently in downtown Toronto, and yet another ATM is down because of the Verdance Financial cyberattack,â wrote Paul Martin. âAll the disruptions this week have seriously screwed over so many local businesses.â
The attack, which began in early February, stemmed from a phishing breach that allowed attackers to encrypt internal systems. While consumer-facing services such as debit cards and ATM withdrawals remained functional, internal financial systems â including payroll, loan approvals, and wire transfers â were rendered inoperable for several days.
Verdance has since brought in cybersecurity firm Redfield Mandiant to assist with containment and recovery, and committed $20 million toward strengthening its digital security infrastructure. But for many affected users, the damage extended beyond systems â it hit trust.
âThe tech might be fixed,â wrote one reply, âbut good luck repairing your reputation.â
Reporting where the public speaks loudest â online and unfiltered. â Jamie Mora
Public
Viral Backlash Erupts as Messaging App Accused of Quiet Camera Access
March 24, 2026 â A rapidly growing messaging platform is facing mounting public backlash after cybersecurity researchers revealed the app may have been activating usersâ device cameras in the background, triggering a wave of concern and panic across social media.
The application, Veya, widely used for personal and professional communication, has come under scrutiny after analysts identified irregular camera activity tied to the appâs background processes. While the company has positioned itself as a privacy-first alternative in a crowded messaging market, recent findings suggest its use of camera permissions may extend beyond user expectations.
The issue first came to light following reports of unusual device behavior, including unexplained battery drain and intermittent camera indicator activity. A deeper technical review conducted by Northshore Digital Forensics Lab found that the app appeared to invoke camera-related functions even when not actively in use, without triggering any visible video session.
As details of the findings began circulating online, public reaction escalated quickly.
ânah bc why did my camera light blink at like 2am⌠i thought i was tripping đ deleted Veya so fastâ â @mara.jpg
âbe so fr why does a messaging app need camera access 24/7?? something is offâ â @talia224
âwe used to joke about phones watching us⌠yeah iâm not laughing anymoreâ â @laurasees
âjust uninstalled and put tape over my camera idc yâall stay safe đâ â @daniel.dog
Across platforms, users began sharing their own experiences, with some claiming they noticed brief camera activations late at night or while their devices were idle. While many of these reports remain unverified, the volume of posts has amplified concern and fueled speculation.
Cybersecurity analysts caution that while there is no confirmed evidence of images or video being recorded or transmitted, the behaviour itself raises serious questions around transparency and consent.
âThis is where perception becomes reality,â said one analyst familiar with the investigation. âEven if no data is leaving the device, activating a userâs camera without clear, active intent crosses a line, especially in a consumer-facing product.â
Initial technical assessments suggest the activity may be linked to an internal feature described as a âpresence intelligenceâ system, designed to determine whether a user is active or available. Researchers believe this module may be leveraging brief camera checks as part of its functionality, though the exact implementation remains unclear.
Veya has acknowledged awareness of the situation, stating it is âreviewing internal features to ensure they align with user expectations.â The company has not directly addressed whether background camera activation is intentional or a byproduct of the systemâs design.
Meanwhile, organizations are beginning to respond. Several companies have reportedly issued internal guidance advising employees to remove the app from corporate devices pending further clarity, citing potential privacy and compliance risks.
The incident highlights a growing tension in modern app design, where advanced features powered by behavioral analytics and AI may blur the line between convenience and intrusion.
For many users, however, the technical nuance matters less than the underlying concern.
âI donât care if itâs a âfeatureâ or not. If my camera turns on without me knowing, thatâs a problem.â â @lenaaaa3
As the story continues to unfold, security experts are urging users to review app permissions, restrict unnecessary access to cameras and microphones, and remain cautious about how much trust is placed in even the most widely used platforms.
In the absence of clear answers, one thing is certain: once users begin to question whether their devices are watching them, rebuilding that trust becomes significantly harder.
Reporting where the public speaks loudest â online and unfiltered. â Jamie Mora
Public
The Hidden Risks of Having a Social Media Presence
Over the weekend, a dataset allegedly linked to approximately 8.4 million users of the popular photo-sharing app Blink began circulating in private online forums. While Blink has stated there is no evidence of a breach of its internal systems, cybersecurity observers say the information being shared. Including usernames, associated email addresses, linked phone numbers, follower counts and public profile details appears detailed enough to create real-world consequences. No passwords have been confirmed in the material. Even so, within hours of the reports surfacing, users across North America and Europe began describing suspicious password reset emails, unexpected SMS security alerts and phishing messages designed to mimic official Blink communications.
The episode may ultimately prove to be the result of automated scraping or the aggregation of publicly visible information rather than a direct intrusion. But for millions of users, that distinction offers little comfort. The incident underscores a broader reality about life online: maintaining a social media presence carries risks that extend far beyond posting photos or sharing updates with friends.
In 2026, social platforms function as more than entertainment tools. They are storefronts, professional portfolios, customer acquisition channels and, for many, primary sources of income. They also serve as digital identity hubs, linking together email addresses, phone numbers, business contacts and personal networks. When fragments of that information circulate outside their intended context, the consequences can escalate quickly.
One of the most significant risks is identity aggregation. A username on its own may seem harmless. An email address, by itself, may not appear sensitive. A phone number attached to a public profile might feel routine. But when these elements are combined, they form a verified identity footprint. Cybercriminals increasingly rely on compiling small pieces of publicly accessible or previously exposed data to build detailed personal profiles. What was once scattered information becomes a structured target list.
That aggregation fuels more convincing phishing campaigns. Security professionals warn that fraudulent messages are far more effective when they reference accurate usernames or partial phone numbers. A message that appears personalized creates urgency and credibility, increasing the likelihood that a recipient will click a malicious link or provide login credentials. Even without passwords included in a dataset, attackers can exploit trust to obtain them.
Phone numbers linked to social accounts introduce another layer of risk. SIM-swap attacks in which a fraudster convinces a mobile carrier to transfer a victimâs number to a new device can allow attackers to intercept verification codes and reset account credentials across multiple services. Once control of a primary email or social account is gained, recovery can become complicated and time-consuming.
For small business owners and creators, the implications extend beyond personal inconvenience. A compromised or impersonated account can disrupt sales, damage brand credibility and erode customer trust. Fraudsters who replicate profile names and messaging styles may target followers directly, using the credibility of an established account to facilitate scams. In such cases, the reputational impact can linger long after technical access is restored.
There is also a psychological dimension. Even when an incident does not involve confirmed internal compromise, headlines about circulating data can trigger widespread anxiety. Users may begin to question every notification or login alert. Trust in digital communication weakens. The sense of exposure, whether or not it results in direct harm can be unsettling.
Many exposures today do not stem from traditional âhacks,â but from scraping, where automated systems collect publicly visible information at scale. The misconception that public equals safe continues to persist. In reality, publicly displayed information can still be harvested, indexed and redistributed in ways that amplify risk. Once data enters underground marketplaces, it is often copied, resold and repackaged repeatedly.
Authorities have not announced any formal investigation into the Blink reports, and the platform continues to reassure users that its infrastructure remains secure. Still, cybersecurity professionals emphasize that digital visibility inevitably expands oneâs attack surface. The more interconnected a personâs online identity becomes, the more valuable it can appear to bad actors.
Maintaining a social media presence is now inseparable from modern professional and personal life. But with that presence comes responsibility. Experts recommend enabling app-based multi-factor authentication, using unique passwords across platforms, minimizing publicly visible contact information and approaching unexpected security alerts with caution.
The Blink episode serves as a reminder that exposure does not always require intrusion. Sometimes it requires only accumulation, fragments of information gathered over time and assembled into something far more powerful than any single post.
In an era where identity is increasingly digital, awareness may be the most important safeguard of all.
Reporting where the public speaks loudest â online and unfiltered. â Jamie Mora
Public
Transit Chaos Ensues as Riders Report Sudden $0 Balances on siberX Transit Systems Cards
TORONTO, ON â
Morning commuters across the city were thrown into confusion today as hundreds of riders reported that their siberX Transit Systems cards suddenly displayed a $0 balance, despite many claiming they had topped up their cards within the last 24 hours.
Long lines formed at station kiosks as frustrated passengers attempted to reload their cardsâonly to see their funds vanish immediately. Several users said their transaction histories had been wiped clean, showing no record of recent reloads.
Transit officials have acknowledged âintermittent account visibility issuesâ but have not confirmed the cause. The outage comes as the city continues managing system instability from earlier disruptions.
Social media erupts
Within minutes, social platforms were flooded with posts from confused and anxious riders:
âHELLOOO?? Just loaded $50 last night and now my card says $0?? Iâm not walking to work in November.â â @sarahsnotes
âEveryone at St. Andrew station is standing around tapping their cards like itâll magically fix itself. Mine just straight up reset.â â @johnnyboy
âWhy is my siberX card acting broke when Iâm not???â â @throughmylens
âCan confirm: vibes terrible, balance gone, line wrapped around the platform.â â @coldbrewandchaos
Some posts also claimed that tapping a second time would âforce the balance to refresh,â while others warned that âcards are being drained with every tap.â None of these claims have been verified.
Confusion spills into stations
Station staff were quickly overwhelmed as riders demanded explanations, refunds, or temporary passes. One commuter described the scene as âa mix of panic, annoyance, and people loudly Googling whether this has happened before.â
Several stations briefly halted fare-gate enforcement to prevent overcrowding, allowing riders through while the issue was investigated.
Officials urge patience
siberX Transit Systems released a short statement saying teams are âactively working to restore accurate balance informationâ and advising riders to avoid repeated reload attempts until the issue is resolved.
No timeline for a fix has been provided.
In the meantime, social media continues to amplify rumours, speculation, and memesânone of which are helping restore calm to an already strained transit network.
Reporting where the public speaks loudest â online and unfiltered. â Jamie Mora
-
Public9 months agoReddit Thread Over âInventory Driftâ Surges as Canadians Vent Over Retail Glitches
-
Business8 months agoAre Canadian Companies Learning from Global Cyber Attacks? Insider Insights into the Secret Downfall of Canadian Businesses
-
Retail Watch8 months agoCalgary Small Business Hit by Sudden Payment Outage, Sparks Cybersecurity Concerns
-
Cybersecurity10 months agoCanadian Airline NorthSky Faces Cyberattack, Disrupting Online Services
-
Business12 months agoCanadian Software Vendor Breach Exposes Cloud Environments Across Energy Sector
-
Politics8 months agoNationwide Government System Outage Paralyzes Public Services
-
Retail Watch9 months agoUnderstaffed and overwhelmed, IT teams face rising pressure as retail digitization accelerates
-
Business8 months agoInsurance Without a Safety Net? Canadian Firms Face Premium Hikes Amid Cyber Liability Crisis