Chinese Hackers Plant Digital Sleeper Cells in Telecom Backbone

Posted in Commentary with tags on March 26, 2026 by itnerd

Researchers at Rapid 7 have uncovered evidence of an advanced China-nexus threat actor, Red Menshen, placing stealthy digital sleeper cells in telecommunications networks to carry out high-level espionage, including against government networks.

Rapid 7 has a blog post on this here: https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/

Lieutenant General Ross Coffman (U.S. Army, Ret.) who currently serves as President of Forward Edge-AI, provided the following comment:

“Chinese hackers caught deep in the backbone of telecommunications infrastructure are doing so for high-level espionage.

Anyone that’s surprised by this news should be embarrassed. This is not the end nor the beginning. We’re in a fight to protect our data. PWC technologies that protect data inflight need to be deployed across verticals to protect the US and the free world against China and other malicious actors.”

This shows how far threat actors are willing to go to execute whatever plans that they have. This is crafty and stealthy and dangerous. Defenders should bear that in mind.

AI Infrastructure Emerges as Cyber War Target Says CloudSEK

Posted in Commentary with tags on March 26, 2026 by itnerd

Cybersecurity firm CloudSEK has published research showing that the infrastructure organisations use to train and deploy AI systems is dangerously exposed. The report focuses on MLOps platforms, the operational backbone of modern AI, and finds that leaked credentials and misconfigured deployments are handing adversaries quiet, persistent access to systems that were never designed with security in mind.

The timing matters. After US and Israeli forces struck Iranian nuclear and military sites on February 28, 2026, Iranian APT groups, including MuddyWater, APT34, APT33, and APT35 showed clear signs of heightened activity. But CloudSEK’s analysts note that the footholds these groups hold inside Western defence, financial, and aviation networks were not built in response to that escalation. They were built before it.

What CloudSEK Found

In a 72-hour scan of public GitHub repositories and internet-facing infrastructure, the research team identified:

  • Over 100 exposed credential instances tied to platforms including ClearML, MLflow, Kubeflow, Metaflow, ZenML, and Weights & Biases. Keys were hardcoded directly into source files, configuration scripts, and environment files that were left public.
  • More than 80 MLOps deployments are sitting open on the public internet with weak or no authentication. Basic scanning tools like Shodan and FOFA were enough to find them.
  • Multiple platforms where anyone could create an account, walk into the dashboard, browse active projects, pull model artifacts, and access connected cloud storage credentials with no barriers at all.
     

None of this required exploiting a software vulnerability. It used the same interfaces that engineers use every day.

Why MLOps Platforms Are Worth Targeting

MLOps platforms coordinate everything in an AI operation: training pipelines, model storage, cloud integrations, and execution agents that run around the clock. Getting inside one of these platforms gives an attacker far more than a data breach. It gives them four things:Dataset exfiltration: training data typically contains surveillance feeds, telemetry, and behavioural analytics. Studying it tells an adversary exactly what signals a model trusts and where its blind spots are.

Model theft: downloaded model files can be analysed offline to reverse-engineer the decision logic behind AI systems used in targeting, surveillance, or autonomous operations. Training data poisoning: with write access to a pipeline, adversaries can subtly corrupt retraining inputs. The model degrades over time, with no forensic trace and no security alert. Execution environment abuse: MLOps workers trust instructions from the control plane. Attackers can use that trust to run arbitrary code inside the compute infrastructure connected to sensitive internal networks.

A Multi-Actor Threat Landscape

The MLOps threat does not sit with Iran alone. North Korea’s Lazarus Group and TraderTraitor have spent years hiding malicious packages inside npm and PyPI ecosystems, quietly compromising developer infrastructure at scale. Chinese APT groups have a direct strategic interest in understanding how Western militaries use AI-assisted decision-making. Russia, too, has been watching.

Proxy groups add further complexity. Hamas-affiliated MOLERATS, Hezbollah-linked operators, and Houthi-aligned actors have all been documented running cyber operations in parallel with kinetic activity, often targeting the same organisations their backers have in their sights.

The report’s sharpest point is about intent. These actors do not need to destroy an AI system. They need to make it unreliable. A targeting model whose thresholds shift through poisoned retraining data, an anomaly detector tuned to ignore a specific pattern: that is battlefield sabotage. It leaves no forensic trace, triggers no security alert, and has no obvious point of attribution.

The Security Gap No One Is Talking About

The core problem is not a software bug. It is a maturity gap. CI/CD systems and cloud IAM services have been hardened through more than a decade of real-world attack exposure. Most MLOps platforms have not. They were built to speed up model development, and security was rarely part of the original brief.

One finding stands out. Cloud storage credentials for AWS S3, Google Cloud Storage, and Azure Blob are routinely stored inside MLOps platform interfaces in a form that can simply be retrieved. Anyone who gets into the platform gets the keys to the cloud storage too. One breach becomes two.

What Organisations Should Do Now

CloudSEK lays out four immediate steps:

  • Stop hardcoding credentials. API keys, access tokens, and cloud credentials have no place in source code or config files. Use a dedicated secrets manager and rotate regularly.
  • Take MLOps platforms off the public internet. Enforce authentication, segment networks, and switch off open self-registration on any externally accessible instance.
  • Drop static cloud storage keys in favour of short-lived, role-based credentials. It limits how far a compromise can spread.
  • Treat MLOps like the critical infrastructure it is. Monitor access to datasets, models, and pipelines with the same rigour applied to CI/CD systems and cloud control planes.
     

Note on Responsible Disclosure

This research was conducted using publicly accessible information. All validation was performed passively, with no modifications made to any systems, pipelines, datasets, or models. All sensitive details, including credential values and organizational identifiers, have been redacted.

For More Details, Read The Full Report

Radiant Logic and Badge Enter into an OEM Agreement 

Posted in Commentary with tags on March 26, 2026 by itnerd

Radiant Logic today announced an OEM agreement with Badge Inc. Under the agreement, Badge’s patented zero-knowledge authentication is embedded directly into the RadiantOne platform, enabling enterprises to unify authentication and authorization across unfederated identity domains — including complex Active Directory environments, cloud identity providers, and AI agent ecosystems. 

The Cross-Domain Identity Problem 

Enterprises operating across multiple Active Directory forests, Kerberos realms, and cloud identity providers face one of the most persistent and expensive challenges in IT: enabling secure cross-domain access without rearchitecting their directory infrastructure. This problem intensifies during mergers and acquisitions, healthcare system consolidations, and government agency modernizations, where unfederated domains must coexist for months or years. 

The emergence of AI agents compounds the challenge. Organizations deploying agentic AI have limited visibility into which agents exist across their environment, what permissions they hold, and how they authenticate across domain boundaries. 

RadiantOne with Badge: A Platform-Level Solution 

The RadiantOne platform now combines Radiant Logic’s identity data unification and observability capabilities with Badge’s zero-knowledge, device-independent authentication to solve these challenges end to end: 

Identity Unification and Observability. RadiantOne aggregates and correlates identity data from directories, cloud platforms, databases, and AI systems into a single authoritative view. This provides security teams with real-time visibility into all identities — human, machine, and agent — along with continuous risk detection and governance across the full IAM ecosystem. 

Agent Governance and Cryptographic Binding. Building on this unified view, Badge creates a cryptographic binding to each discovered agent, establishing verifiable identity and appropriately limiting the scope of what each agent can do. Together, this delivers runtime identity governance for AI — ensuring agents operate only within defined boundaries. 

Zero-Knowledge Authentication Across Unfederated Domains. Badge’s patented on-demand key derivation eliminates stored secrets, passwords, and device-bound credentials. Users and agents enroll once and authenticate across any domain — including unfederated AD forests, Kerberos realms, and identity platforms such as Entra ID, CyberArk, Okta, and Ping — without requiring forest trusts or manual federation.  

This is zero trust applied to the identity layer itself: no stored secrets, no implicit trust, continuous verification. By combining Radiant Logic’s identity unification with Badge’s passwordless, deviceless authentication, the partnership bridges a security ecosystem where every identity — human, machine, or agent — is discovered, verified, and governed end to end. 

Cross-Domain Access Without Rearchitecting. The solution issues X.509 certificates that work across unfederated identity domains, enabling secure cross-domain access from day one of a merger, consolidation, or modernization initiative. Organizations integrate additional identity providers incrementally without disruption. 

Availability 

The integrated solution is available immediately as part of the RadiantOne platform, deployed as scalable SaaS or on-premises. For more information, visit https://www.badgeinc.com/badge-radiant-partnership. 

Binalyze Launches Magellan to Bring Investigative e-Discovery to the SOC

Posted in Commentary with tags on March 26, 2026 by itnerd

Binalyze today announced the launch of Magellan, a new capability that brings ‘e-discovery’ of file contents directly into the Security Operations Center (SOC) to help close the ‘content blind spot’ for organizations.

Despite years of investment in detection technologies such as EDR, XDR, and SIEM, most SOCs investigate incidents without direct visibility into file contents. This reliance on metadata such as filenames, hashes, and access logs blinds investigators to crucial context such as what actual data was involved; how it was misused; and what the potential consequences are.

Magellan introduces investigative e-discovery capabilities at the endpoint, allowing teams to go beyond detecting suspicious activity to determine the true potential impact of an incident without affecting the speed of an investigation. In contrast to legacy e-discovery solutions, Magellan removes the need to centrally index and create copies of data that already exists. This enables security teams to search and examine the contents of files across endpoints and hybrid environments in real-time. This results in a clear understanding of what’s in a file, where it’s stored, who has access, and whether it’s being used appropriately.

Embedded within the Binalyze AIR platform, Magellan enables distributed full-text search directly on the device where the data resides. By removing the need to export files or wait for centralized indexing, security teams can quickly examine file contents across large environments, giving a full picture of the extent of a breach and what data is at risk. Moreover, it also helps security teams to proactively spot issues before breaches occur, especially when confidential files are being accessed by users whom wouldn’t usually have authorization to access them.

Closing the Visibility Gap in Cyber Investigations

Magellan addresses a broader shift in cybersecurity priorities. As attacks become more complex and regulatory expectations increase, organizations need deeper investigative capabilities to understand exactly what happened during an incident.

Yet these organizations also have to deal with rapidly growing data volumes across their endpoints – from both cloud services, and remote environments – alongside rising insider threats and accidental data exposure. Security teams can easily study indirect indicators such as metadata or access logs, but deeper inspection requires involvement from forensic specialists, IT teams, or legal workflows. These delays can extend investigations and increase uncertainty around the scope of an incident. 

Magellan gives security teams the capability to search across their entire infrastructure; investigate insider threats and data exposure directly at the source; and provide evidence-based answers to key stakeholders and regulators.

Availability

Magellan is available immediately as a new module within the Binalyze AIR platform.

Hammerspace Data Platform Wins 2026 Artificial Intelligence Excellence Award

Posted in Commentary with tags on March 25, 2026 by itnerd

Hammerspace today announced it has been named a winner in the 2026 Artificial Intelligence Excellence Awards in the Internet and Technology category. Presented by the Business Intelligence Group, the award recognizes organizations, products, teams, and individuals that are applying artificial intelligence in ways that drive real, measurable impact.

At a time when AI infrastructure is constrained less by compute than by data bottlenecks, the Hammerspace Data Platform redefines how unstructured data is accessed, orchestrated, and delivered to GPU-intensive workloads – without requiring proprietary clients, new storage silos or disruptive data migrations.

Hammerspace provides the foundation to activate unstructured data at scale, wherever it lives. Instead of forcing enterprises to copy data into yet another AI storage silo, Hammerspace creates a unified global data environment that orchestrates data across existing infrastructure. The result is less manual effort, fewer unnecessary copies, lower operational drag, and a much faster path to production AI.

Built on standard Linux NFS and pNFS v4.2, and advanced through years of upstream kernel innovation, Hammerspace delivers true parallel performance and linear scalability using the native clients already deployed across most GPU environments. That means high-performance data access without proprietary software, infrastructure lock-in, or the operational drag of introducing another specialized storage stack.

Hammerspace also extends performance further with Tier 0, which turns underutilized NVMe inside GPU servers into a shared, ultra-low-latency data tier. Combined with topology-aware data placement, Hammerspace aligns data with compute automatically – keeping GPUs fed faster, reducing bottlenecks, and increasing the efficiency of existing infrastructure.

Together, these outcomes demonstrate that Hammerspace delivers tangible business value: faster AI pipelines, higher utilization of costly GPU resources, lower infrastructure spend and reduced operational complexity – while maintaining flexibility across on-premises and cloud environments.

The Artificial Intelligence Excellence Awards spotlight organizations advancing AI into practical, accountable deployment. The 2026 program recognized winners across 36 industries and more than 15 countries.

Learn More: Hammerspace Data Platform Overview

SAP Showcases New AI, Integrated Travel and Expense Enhancements, and Global Partnerships at SAP Concur Fusion 2026

Posted in Commentary with tags on March 25, 2026 by itnerd

At SAP Concur Fusion 2026, we’re bringing together finance and travel decision-makers, customers, and partners to explore how AI-enabled innovation is transforming integrated travel, expense, and invoice management.

New innovations and new and expanded partnerships announced at the event reflect our focus on smarter automation that drives efficiency and compliance, deeper visibility that supports better decision-making, and solutions that help organizations control costs while improving employee experiences.


Joule Integration, New Agents and Innovations Streamline Travel and Expense Workflows

Building on the integration between Joule and Microsoft 365 Copilot, SAP Concur is bringing AI-enabled travel and expense management directly into the Microsoft applications employees use every day. Available now, employees can create and submit expense reports, track expense status, ask policy-related questions, upload receipts, book travel, and more without having to leave the application they’re working in to log into Concur solutions. With this enhanced organizational context, Joule introduces greater business intelligence into the flow of work, helping employees complete travel and expense tasks more easily, offering guidance, and reducing manual effort while maintaining compliance. Bringing Concur experiences into the tools employees already use regularly removes friction, streamlines workflows and improves productivity.

Existing Joule Agents from SAP Concur focus on intelligent receipt analysis and expense report validation, automatically enriching expense data, detecting errors, and guiding employees to submit accurate, compliant reports. Now, two new Joule Agents join the SAP Concur lineup to further streamline expense compliance and reporting.

  • Expense Automation Agent: A Joule Agent that acts as a virtual delegate creating the expense report and automatically adding transactions, including populating custom fields based on contextual details and user history. Employees can simply review and refine the report before submitting, reducing manual data entry and saving considerable time. This agent delivers a modern expense management experience – the expense report that practically manages itself.
  • Expense Pre-Submit Audit Agent: A Joule Agent that provides accurate, relevant receipt checks early in the expense report process. It proactively flags discrepancies in receipts before submission, helping address inaccuracies early, reduce report rejections and review cycles, and shorten reimbursement timelines. Drawing on decades of expertise and innovation in expense report auditing, SAP Concur delivers an agent that ensures receipt validation is robust and precise.

Concur Expense will soon support new capabilities to submit receipts via text message, offering another easy way for employees to capture receipts without manual data entry.

Expense Pre-Submit Audit Agent, Expense Automation Agent, and receipt texting capabilities are currently in the SAP Early Adopter Care program, with general availability expected later this year.

Expense Automation Agent will be available as part of Joule Premium for Travel and Expense.

Additionally, leveraging the power of the SAP Business Suite, the SAP Sales Cloud solution now integrates with Booking Agent to streamline workflows and enhance productivity for sales teams. Salespeople can use Joule within the SAP Sales Cloud solution to book travel for planned client visits. Joule recognizes key details of the client visit and presents personalized travel itinerary options for the salesperson to choose from for quick, seamless booking within the existing workflow. This eliminates the need to manage separate workflows for client visits and trip bookings, as Joule connects planned visits directly with easy booking options. The integration is planned for general availability in Q2 2026.

Simplified Administration, Stronger Compliance and Increased Automation Across Travel and Expense Processes

New AI-based rule creation tools simplify the complex process of managing policy rules in Complete by SAP Concur and Amex GBT, Concur Travel, and Concur Expense, especially for administrators without a technical background. These tools help customers automate enforcement of even the most nuanced policies using natural language or company policy documents as the input. Now, administrators can manage rule creation efficiently and confidently. Administrators can upload a travel policy document, and the travel rules will automatically be created or modified, saving time and strengthening policy compliance. This capability will be available as part of the SAP Early Adopter Care program in Q2 2026. Concur Expense administrators can create and manage audit rules using natural language starting in Q2 2026. The ability to create rules from uploaded policy documents is planned for later in 2026

Additionally, SAP Concur is strengthening two key financial industry partnerships to further streamline expense reporting and compliance.

SAP Concur and American Express (Amex) are deepening their partnership to enable joint customers to create and manage American Express Virtual Cards in Concur Expense. An American Express Virtual Card features a uniquely generated card number and security code associated with an employer’s Amex Corporate Card account, reducing the burden of out-of-pocket expenses by supporting online payments and transactions on-the-go through a digital wallet.

American Express Virtual Cards with SAP Concur enable employees to make purchases in just a few clicks, while providing organizations with enhanced visibility, stronger controls, and greater efficiency. They also can be used as a payment method within Concur Travel. This capability is available now to select U.S.-based American Express® Corporate and Business customers using Concur Expense with availability for all such customers planned for Q3 2026.

Last year, SAP Concur and Amex launched a real-time notification (RTN) capability that automatically generates and categorizes eligible business expenses from Amex Corporate Card purchases in Concur Expense. Enrolled cardholders will get real-time notification via the Concur mobile app when making a purchase, so they never miss key details like uploading a receipt or adding attendees for a meal.

SAP Concur teams up with Visa to drive greater integration between Concur Expense and Visa through the Visa Commercial Integrated Partner program. The first integration milestone will be for Concur Expense to enable real-time notifications to automatically create expenses from Visa card swipes and reduce the risk of lost receipts or duplicates. The capability will be available as part of the SAP Early Adopter Care Program in Q3 2026.

SAP Concur will now support RTN from all major credit card networks.

Corporate Travel Experience Enhancements and New AI-Enabled Capabilities

SAP Concur is advancing the corporate travel experience with new capabilities, expanded global availability, and enhanced partner integrations designed to support travelers and travel managers worldwide

SAP Concur and American Express Global Business Travel (Amex GBT) are announcing new innovations to Complete, an AI-enabled, co-developed solution for booking, servicing, payments, and expensing. New capabilities include AI-enabled travel support with hand-off to a live travel counselor and a specialized home page for travel managers. Concur Expense also integrates with Amex GBT Egencia for customers worldwide. For more about these co-innovations, visit the Concur blog.

For all customers using the new Concur Travel experience, it now fully supports guest bookings, offering an improved reservation workflow for hosting guest travel. Enhanced booking capabilities provide a streamlined experience, allowing guest profiles to be created quickly without having to establish new profiles for recurring visitors each time.

Starting in Q2, India joins more than 150 countries with access to the new Concur Travel experience. With expanded content from Cleartrip that supports all fare brands, seats, bags, and ancillaries, combined with new One-Way Faring capability and mobile user experience, travelers can shop IndiGo and SpiceJet, as well as new supplier additions including Akasa Air and Air India Express.

TripIt by SAP Concur is also enhancing the travel experience with new intelligent, on-device capabilities that help travelers organize plans effortlessly while staying informed about potential disruptions in real time.

  • TripIt Pro Image to Plan with Apple Intelligence: Travelers can turn photos or PDFs—including tickets, reservations, event flyers, and receipts—into organized TripIt plans in just a few taps. Using Apple Intelligence’s on-device foundation models, TripIt Pro securely extracts key details such as dates, times, locations, confirmation numbers, and costs, all without leaving the device.
  • Expanded TripIt Pro Risk Alerts: Based on the address entered with a trip plan, TripIt Pro monitors breaking news that may disrupt the itinerary. Travelers will now receive proactive, timely alerts about incidents that could affect lodging, car rental, rail, activities, and other plans, in addition to flights, airlines and airports.

These new capabilities in TripIt Pro are generally available now.

To learn more about announcements at SAP Concur Fusion, or to join the virtual event, visit here.

LiteLLM supply chain attack compromises PyPI package

Posted in Commentary with tags on March 25, 2026 by itnerd

According to researchers at Endor Labs, a supply chain attack has compromised the widely used LiteLLM Python library on PyPI, with malicious code introduced into versions 1.82.7 and 1.82.8, which have since been removed. The package is used in AI and developer environments and is estimated to see approximately 95 million downloads per month, significantly expanding the potential impact.

The malicious releases contained credential-stealing malware, including a .pth file that executes automatically when Python starts, allowing attackers to collect SSH keys, cloud credentials, API tokens, and environment variables from affected systems. In some cases, the malware also attempted to access Kubernetes secrets and deploy persistent backdoors on compromised machines.

The incident has been linked to the TeamPCP threat group, which previously targeted software supply chains, and is believed to be connected to earlier compromises involving developer tooling. Researchers reported that the attackers used compromised publishing credentials to distribute the malicious packages, with claims that data may have been collected from hundreds of thousands of affected devices.

Jacob Krell, Senior Director: Secure AI Solutions & Cybersecurity, Suzu Labs:

   “Every third-party dependency is a trust decision. The LiteLLM compromise demonstrates what happens when that trust is granted by default and at scale.

   “TeamPCP did not need to attack LiteLLM directly. They compromised Trivy, a vulnerability scanner running inside LiteLLM’s CI pipeline without version pinning. That single unmanaged dependency handed over the PyPI publishing credentials, and from there the attacker backdoored a library that serves 95 million downloads per month. One dependency. One chain reaction. Five supply chain ecosystems compromised in under a month.

   “The pattern is instructive. TeamPCP has exclusively targeted security adjacent tools. A vulnerability scanner, an infrastructure as code analyzer, and now an LLM proxy that handles API keys by design. These tools run with broad access because that is how they function. Compromising one hands the attacker every credential and secret that tool was trusted to touch.

   “This incident forces a broader conversation about how organizations treat their dependency graph. Zero trust has been applied to users, devices, and networks. Dependencies deserve the same scrutiny. Every imported library, build tool, and CI plugin carries implicit trust that is rarely evaluated with the same rigor applied to a new network connection or user account. At enterprise scale, this creates compounding technical debt where a single compromised package can cascade across the entire environment.

   “The cost of building capability in house has dropped significantly. Organizations have more options to reduce their dependency surface than they did even two years ago. Dependencies that were once unavoidable are now choices. Where a third party library handles sensitive credentials, routes API traffic, or runs inside a build pipeline, organizations should be asking whether the risk of importing that dependency outweighs the cost of building and maintaining the capability internally. For the dependencies that remain, strict service level agreements, continuous verification, and the same zero trust posture applied to any other external input are the minimum standard.

   “The dependency graph is part of the attack surface. Treating it as anything less is how cascading compromises happen.”

Noelle Murata, Sr. Security Engineer, Xcape, Inc.:

   “The LiteLLM incident is a textbook example of “blind-trust” engineering, where the convenience of a one-line install command outweighs basic cryptographic integrity. The business impact here is a complete loss of environment isolation, as a single unverified pip install can transition an attacker from a developer’s terminal to the core of a Kubernetes cluster in seconds.

   “We should care because the industry’s reliance on public repositories without local hash verification or “lockfiles” has effectively turned the Internet into an unvetted production dependency. This breach succeeded because many organizations treat PyPI as a trusted internal mirror rather than a public, high-risk source of untrusted code.

   “To remediate this, defenders must move beyond reactive patching and enforce the use of signed software bills of materials (SBOMs) and private package registries that require mandatory hash pinning and pre-install scanning. If your CI/CD pipelines are pulling directly from the public Internet without validating a requirements.txt against known-good hashes, you have effectively outsourced your root access to anyone who can phish a single package maintainer.

   “Installing unvetted packages from the Internet is essentially the digital equivalent of eating a sandwich you found on the subway and being surprised when you get food poisoning.”

Rajeev Raghunarayan, Head of GTM, Averlon:

   “The LiteLLM compromise reflects an accelerating pattern: attackers using compromised publishing credentials to inject malicious code into widely used libraries, turning trusted dependencies into distribution mechanisms for credential-stealing malware.

   “What makes incidents like this dangerous is the scope of access they expose. Cloud credentials, API tokens, and Kubernetes secrets don’t just represent a single point of compromise. They create pathways into the broader infrastructure those credentials connect to.

   “This is the pattern organizations need to plan for. The initial compromise is rarely where the real damage happens. It’s where the attack chain begins.”

Ryan McCurdy, VP of Marketing, Liquibase:

   “Incidents like this are a reminder that in the AI era, software supply chain risk is expanding faster than most control models. When widely used developer and AI tooling is compromised, the blast radius can move quickly across credentials, cloud environments, and production systems.

   “The lesson for enterprise teams is bigger than any one package: governance has to extend across how change is introduced, validated, promoted, and audited. Speed without control is not modernization. It is exposure.”

Blind trust in anything is a bad thing. This is example of why that is a bad thing. And why companies need to trust but verify. Or simply not trust at all.

Global VPN downloads fell in 2025, but adoption in some European and Gulf countries keeps climbing 

Posted in Commentary with tags on March 25, 2026 by itnerd

Global VPN downloads hit an all-time high of 487 million in 2022 — and have been falling ever since. Downloads dropped to 404 million in 2023, partially recovered to 464 million in 2024, and fell again to 412.5 million in 2025, according to the latest iteration of the Cybernews VPN Adoption Report.

The report analyzed download data for the 50 most popular VPN apps from the Google Play Store and Apple App Store across 126 countries, compared against each country’s population to calculate adoption rates.

The Gulf states dominate the top 10

The countries where VPN adoption remains highest are overwhelmingly in the Persian Gulf. The UAE leads the world at 85.5%. The driving forces are state-level content restrictions and VoIP service blocks, as large expatriate populations need to communicate internationally.

Europe is showing consistent growth

Europe is the one region still showing consistent growth in 2025, while adoption rates in most other regions slowed down significantly. Three European countries sit in the global top 10 — the United Kingdom at #7, the Netherlands at #8, and France at #10. France saw the biggest climb of any G7 nation, rising 12 positions since the previous report. Seven of the global top 20 are now European, with the Nordics and Baltics also posting steady gains.

Adoption in G7 countries varies widely

Among G7 nations, the picture is uneven. The UK and France are both in the global top 10, while Italy and Japan remain far behind their peers.

The United States, despite producing the largest absolute download volumes, ranks only #21 — with downloads falling from 63.4 million in 2024 to 54.1 million in 2025.

Where VPN adoption is falling fastest

The steepest single-year declines were concentrated in countries with volatile political or regulatory environments. Myanmar dropped 19.4 percentage points in a single year, Nauru fell 17.1 pp, and Russia declined 12.3 pp.

The countries where almost no one uses a VPN

The lowest adoption rates are concentrated in Africa — 8 of the bottom 10 countries are African.

Full report here: https://cybernews.com/best-vpn/vpn-usage-by-country/

Equinix Expands Investments in Global Data Center Workforce Development

Posted in Commentary with tags on March 25, 2026 by itnerd

Equinix today announced a series of global investments in workforce development to help build the next generation of technical talent for the digital infrastructure industry. Timed to International Data Center Day, celebrated globally on March 25, these initiatives underscore Equinix’s commitment to expanding access to high-quality technical careers, strengthening local talent ecosystems within the communities where it operates, and equipping people with the skills needed to support the rapid growth created by AI and digital transformation.

A cornerstone of Equinix’s workforce investments is the global launch of Pathways to Tech, an early‑career talent program that opens inclusive pathways into data center operations for students ages 14–18. After a successful two‑year pilot reaching nearly 2,000 students in select communities across the Americas and Asia-Pacific, Pathways to Tech is scaling to all Equinix locations worldwide to meet growing workforce needs fueled by AI and digital transformation. Pathways to Tech gives students hands‑on exposure to digital infrastructure through interactive sessions with Equinix professionals, IBX® data center tours and immersive Education Day events. The program creates clear pathways into internships, apprenticeships and early‑career operations roles—creating access to high-demand, well-paying careers many young people may not otherwise discover. On International Data Center Day, Equinix will welcome hundreds of students to Education Days at 20 locations worldwide, providing firsthand exposure to a critical industry that often operates behind the scenes.

Additional Workforce Development Initiatives

Alongside Pathways to Tech, Equinix is introducing additional programs designed to grow talent, including:

  • Global Data Center Technician Training Coalition: The Equinix Foundation, the philanthropic arm of Equinix, Inc., is partnering with Generation, a global nonprofit focused on economic mobility that has supported the economic advancement of over 150,000 people across 17 countries, to expand accessible career pathways in data center operations and technical support. Together, they are launching a groundbreaking global, multi-employer workforce coalition that brings data center and ecosystem companies together with industry partners to invest in IT training, shape curricula and hire graduates. Just as Equinix’s business is built on interconnection, this coalition is built on the idea that the industry’s workforce challenge is too big, and too important, for any single company to solve alone. The coalition’s first program will launch in Brazil—a market seeing rapid data center investment and rising demand for entry-level talent—with initial cohorts beginning in June and co-funding from partner Cisco Systems, Inc. This marks the starting point for a broader global expansion planned for 2026.
  • Global Operations Apprenticeships: Equinix is expanding and relaunching its global apprenticeship, internship and early‑career programs to build a resilient, future‑ready technical workforce. While Equinix has long supported interns and apprentices across its data centers worldwide, the company has now introduced a newly centralized global program with a refreshed curriculum and consistent standards. The first locations to go live include six critical markets: Brazil, France, Germany, the United States, Singapore and the United Kingdom. These initiatives create structured pathways into critical full‑time Operations roles, support knowledge transfer from experienced teams and reduce dependence on constrained labor markets. Working closely with schools, training providers and community organizations—often with support from the Equinix Foundation—Equinix is broadening access to technical careers while strengthening local talent ecosystems. Together, these efforts align business needs with community impact, advancing economic mobility, workforce development and long‑term operational readiness.
  • Learning Labs: Together with industry partners, Equinix is launching a new global training program to develop the next generation of technical talent, debuting across three markets—Dallas, Paris and Singapore. The initiative addresses a dual challenge: supporting a rapidly expanding digital infrastructure sector while creating meaningful reskilling and employment opportunities for individuals seeking new career paths. Designed for early‑career talent with a technical or electrotechnical background, the program aims to deliver hands‑on experience and a comprehensive qualification in data center infrastructure management, equipping participants with essential skills across electrical systems, cooling and climate control, safety practices, and facility operations. Through practical, real‑world training, participants learn how to manage and maintain critical data center environments and ensure their operational reliability.

Equinix’s new workforce development initiatives, including Pathways to Tech, will begin global rollout in 2026, with planned activations across the Americas, EMEA and Asia-Pacific. Interested schools, community organizations and workforce partners can learn more here.

Anker’s Spring Sale Deals Round Up Is Live

Posted in Commentary with tags on March 25, 2026 by itnerd

Here is a curated selection of top offers from Anker Innovations — covering must-haves in charging gear, home tech, audio, and portable entertainment. Deals span up to 40% off across brands including Anker, Eufy, Soundcore, and Nebula, with standout savings on power banks, smart vacuums, sleep earbuds, projectors, and more.

Anker | Charging Essentials & Power Solutions

Eufy Appliance

Robot Vacuums 

  • Eufy C28, $699 (30% off), regular $999
  • Eufy E28, $899.99 (25% off), regular $1199.99

Breast Pump

Eufy Security 

Soundcore

Audio 

Recording Productivity

Portable Projectors