Hisense Partners with FIFA for First-Ever Sensory-Inclusive FIFA World Cup

Posted in Commentary with tags on May 22, 2026 by itnerd

Hisense today announced a groundbreaking partnership with FIFA and KultureCity to support the first-ever Sensory Inclusive tournament at the FIFA World Cup 2026™.

Through this initiative, all 16 host stadiums across the United States, Canada and Mexico will feature dedicated sensory rooms equipped with Hisense display technology. Designed for fans who experience sensory overload — including individuals with autism, PTSD, dementia, anxiety and other conditions — these spaces will provide calming, supportive environments within the high-energy setting of match day.

Expanding Access to the Beautiful Game

Research indicates that an estimated five per cent to 16.5 per cent of people experience sensory processing challenges. For these fans, the intensity of live sporting events — the high energy of the crowd, sudden cheers and ongoing movement — can make attending feel overwhelming or inaccessible. This initiative looks to change that, ensuring that more fans can experience the beautiful game in person.

Sensory-Inclusive Infrastructure Across All 16 Stadiums

The initiative centers on two key components:

  • Sensory Rooms at Every Stadium: Each of the 16 venues will include a dedicated quiet space where fans can step away from match intensity to regulate their sensory experience. These rooms will feature dimmed lighting, reduced noise, comfortable seating, tactile resources and Hisense displays presenting calming visual content. Hisense’s advanced screen technology delivers clear, balanced visuals designed to support relaxation and sensory regulation.

Stadiums will feature sensory rooms within the venue or in the Stadium Fan Experience area as part of the expanded stadium footprint. In eight stadiums, both options will be available to fans, and fans will have access to a space in every stadium during every minute of the game itself. These rooms extend access to calming spaces throughout the venue, recognizing that sensory needs can arise at any moment during the event experience.

  • Ticket Access: In partnership with KultureCity, Hisense will provide complimentary match tickets in each Host City to families with sensory needs who may otherwise be unable to attend.

Creating a More Inclusive Tournament

In addition, the sensory rooms complement FIFA’s broader accessibility efforts, including sensory bags and trained venue staff to support fans with diverse needs.

The FIFA World Cup 2026™ will feature 104 matches across 16 cities over 39 days. For the first time in tournament history, every host stadium will include dedicated sensory-inclusive and accessible spaces — marking an important evolution in how global sporting events serve diverse audiences.

For more information about ticket applications through KultureCity, visit Hisense × KultureCity at FIFA World Cup 2026™ – KultureCity .

FBI Warns Of Device Code Phishing Attacks

Posted in Commentary with tags on May 22, 2026 by itnerd

The FBI has put out a warning about Kali365 and the spike in device code phishing attacks earlier this week:

Through the Kali365 platform subscription, cyber threat actors can capture “OAuth” tokens and gain persistent access to targeted individuals/entities’ Microsoft 365 environments. Kali365 lowers the barrier of entry, providing less-technical attackers access to AI-generated phishing lures, automated campaign templates, real-time targeted individual/entity tracking dashboards, and OAuth token capture capabilities.

But the deeper story is why this class of attack is so hard to catch. There’s no malicious link, no spoofed login page — just a legitimate OAuth flow handing attackers a valid token, bypassing everything traditional security is trained to flag.

Gidi Cohen, CEO & Co-founder, Bonfy.AI had this comment:

“The FBI’s warning is well-placed, and the recommended mitigations — conditional access policies, blocking device code flows — are the right first response. But they address the front door.

The harder question is what happens once an attacker is already inside a legitimate session. When a token is stolen, the attacker isn’t a stranger to the system anymore. They’re operating with valid credentials through authorized pathways. Traditional controls see a clean session. They don’t see intent.

That gap gets wider as AI enters the picture. Copilots and agents connected to M365 mean a compromised session isn’t just access to stored data — it’s a potential entry point into ongoing AI workflows, retrieval pipelines, and generated outputs that can surface sensitive information in ways that are much harder to detect.

The industry conversation tends to stop at authentication. It needs to extend to the data layer — what’s actually moving through these systems, what it contains, who it’s about, and whether that movement aligns with policy intent. Because by the time data is in motion, the authentication question has already been answered. Correctly or not.”

As mentioned, this technique is particularly dangerous because it exploits legitimate authentication workflows, making detection more difficult. Thus the mitigations that are recommended are vital to keeping your organization safe.

Anker Unveils Next-Generation Products Across Brands at Anker Day 2026

Posted in Commentary with tags on May 22, 2026 by itnerd

Anker hosted Anker Day 2026: Where Ultimate Meets Possible, its annual multi-brand event to showcase its newest product launches and technology breakthroughs from across its portfolio of brands. Where Ultimate Meets Possible will bring together media, retail buyers and key influencers for an exclusive look at what’s next in consumer electronics, spanning premium audio, home energy and the smart home space.Where Ultimate Meets Possible will be held in New York City, featuring keynote presentations, hands-on product demonstrations and a deep dive into the company’s latest innovations.

Soundcore Introduces First THUS™-Powered Earbuds and New AI Experiences for Everyday Life and Home Entertainment

  • Earlier this year, Anker Innovations announced THUS™️, a proprietary AI chip platform designed to bring powerful on-device AI capabilities to consumer electronics. The first THUS™️ AI chip makes its debut in the new Soundcore Liberty 5 Pro Series delivering intelligent audio experiences with fast, local processing. Today Soundcore launches the Liberty 5 Pro and Liberty 5 Pro Max featuring Whisper Clear calls, a neural-net AI model combined with a 10-sensor array for clear voice capture even in noisy environments. The Liberty 5 Pro has set a Guinness World Record for call clarity and the Liberty 5 Pro Max which feature the same earbuds and identical call performance — proving them to be the World’s Clearest Earbuds for Calls.
  • The Liberty 5 Pro Max features a 1.78-inch AMOLED display on the charging case that serves as the world’s first smart screen earbuds with an AI Note-Taking function. Double-tap the case button to begin recording, and the Soundcore app generates speaker-identified transcripts, meeting summaries and action items. All recordings are stored locally without a network connection with data protected by SOC2 certification.
  • The Liberty 5 Pro is priced at $169.99 and the Liberty 5 Pro Max at $229.99, both available today on Amazon.com and Soundcore.com and BestBuy.com. A Try Before You Buy program is also available in the US on Soundcore.com, offering a 30-day trial at no upfront cost, in limited availability, backed by confidence in the series’ call quality.
  • Expanding beyond hardware, Soundcore launches VibeOS, an AI-powered experience platform that connects listening, work and daily life across Soundcore products. Through VibeOS, users can personalize sound, capture and organize information, review sleep insights and move beyond playback through more natural, context-aware product interactions.
  • Soundcore Nebula brings SpaceFlow, an AI-powered spatial storytelling experience for the X1 and X1 Pro that transforms real-world spaces into immersive 3D environments. SpaceFlow is available today on Soundcore.com and across all channels, with an MSRP $799 and a special launch price of $399 during the launch period.


Anker SOLIX launches the S-Series, a new line for home backup headlined by the world’s longest-lasting 2kWh power station

Anker SOLIX today announces the S-Series, a new line of home backup power solutions. Leading the series is the Anker SOLIX S2000, the longest-lasting 2kWh power station, certified with A+ Runtime, the highest rating by TÜV SÜD for real-world power delivery, and delivering up to 35 hours of continuous refrigerator backup. Powered by proprietary OptiSave™ Technology that reduces idle power consumption by 40 to 70 percent, down to sub-6W, and achieves over 90 percent light-load efficiency, the S2000 delivers 20 percent more real-world runtime than competing 2kWh units.Built with industry-leading 314Ah LiFePO4 battery cells, the S2000 supports up to 10,000 battery cycles for a 15-year service life, double the industry average. With 1,500W AC output (3,000W peak), 400W solar input, and integrated UPS functionality with seamless switchover during outages, the S2000 powers a refrigerator and multiple devices at once. Its 1.2-hour AC fast charge to 80 percent ensures it stays ready for the next outage even after heavy use.Measuring just 8.19 × 11.1 × 12.7 inches, the S2000 packs 2,010Wh into a footprint 30 percent smaller than the industry average, comparable to a 1kWh unit. Its vertical design slides easily against kitchen walls, while unique rear-facing AC outlets keep messy cords hidden and front ports stay clear for phones and daily use.The S2000 is available for early-bird signup from today through June 1st at Ankersolix.com, with early access pricing at $599 on launch day, June 2. It will be available at Ankersolix.com and Amazon starting June 2 at an introductory price of $679.99, with an MSRP of $1,199.99.

eufy Security Unveils eufy EdgeAgent™ – The World’s First Local Security AI Agent with Proactive Home Protection

  • eufy Security unveiled EdgeAgent™, a proprietary local AI agent that brings intelligent real-time reasoning and proactive response to home and property security. eufy EdgeAgent™ operates through a three-stage framework of detection, analysis and action. The Smart Security Shield’s advanced 180° dual-radar and DSKey™ (digital security key) technology detects strangers and recognizes friends and family with greater accuracy. At the core of the EdgeAgent™ system is the advanced large-model AI chipset, which enables local processing and analysis in as little as three seconds. By processing events directly on local devices with no monthly subscription fees attached, EdgeAgent™ delivers faster response times, reduced false alarms, enhanced privacy protection and more reliable security for homeowners. eufy EdgeAgent™ is scheduled to launch in the second half of 2026, and will be compatible with multiple eufy hardware and AI service bundles.

eufy Mom & Baby advances wearable breast pump and bottle-washing technology for modern parents

  • With heated massage technology, the eufy Wearable Breast Pump S2 Pro sets a new benchmark for the industry. Featuring VibraPump™ technology that softens tissues for more efficient emptying and clog relief, alongside HeatFlow™ 2.0 with seven adjustable heating levels (97℉ – 107℉) to enhance output and comfort, the S2 Pro encourages 35% more milk output, 30% faster. Its 360-degree transparent design with integrated light ensures precise alignment and monitoring day or night. Through the eufy app, users can remotely control settings, customize suction rhythms and access guided meditation sessions to support relaxation.
  • Furthering innovation and convenience, eufy’s new Bottle Washer S1 Pro is the world’s first bottle washer with a built-in water softener. Its proprietary 3D HydroBlast™ technology uses triple-layer rotating spray to eliminate stubborn milk residue, while 212°F true steam sterilization kills 99.99% of common germs. The HygieniDry™ dual-fan heating system completes 40-minute rapid drying to prevent bacteria growth, and with the largest capacity on the market, parents can clean an entire day’s feeding gear in one cycle. The Wearable Breast Pump S2 Pro and Bottle Washer S1 Pro are now available at eufy.com/eufy-mom-and-baby.

McRock Capital Recognizes Winners of their 2026 Industrial AI Awards 

Posted in Commentary with tags on May 21, 2026 by itnerd

McRock Capital announced the 2026 winners of the McRock Industrial AI Awards during its 12th Annual McRock Industrial Software Symposium in Montreal. Established to highlight the critical role of artificial intelligence in transforming the world’s largest industrial sectors, the McRock Industrial AI Awards shine a spotlight on the innovators developing cutting-edge technologies that are driving operational efficiency, sustainability, and intelligence across industries such as manufacturing, energy, transportation, and infrastructure. The awards recognize three categories: Industrial AI Corporate Leader of the Year, Industrial AI Company of the Year, and Industrial AI Entrepreneur of the Year. The 2026 winners were selected by a panel of independent judges that included Robert Rosen, Managing Director of Innovation Banking at Canadian Imperial Bank of Commerce (CIBC); Mickaël Galvani, Investment Director of Fund Investments at Fonds de solidarité FTQ; and Brenda Hogan, Chief Investment Officer at Venture Ontario.

McRock Industrial AI Corporate Leader of the Year

This award is presented to a corporate leader playing a significant role in advancing AI innovations and accelerating the digital transformation of major industries. IFS has been named the McRock Industrial AI Corporate Leader of the Year 2026.

With a decades-long legacy in enterprise software for asset-intensive industries, IFS has continually evolved to meet the complex demands of modern industrial operators, embedding AI-native capabilities directly into mission-critical workflows across manufacturing, energy, aerospace, and field service. In 2025 and into 2026, IFS made significant strides in advancing autonomous enterprise operations, introducing agentic AI and intelligent automation features across its ERP, EAM, and FSM platforms that enable organizations to move from reactive operations to predictive, self-optimizing systems. Through its bold product vision, ecosystem partnerships, and commitment to delivering measurable outcomes, IFS continues to shape what it means to be an AI-native industrial enterprise.

McRock Industrial AI Company of the Year

This award is presented to a privately owned emerging company that has demonstrated tangible achievements in leveraging AI to deliver transformational solutions to the industrial world. Nurau is awarded the McRock Industrial AI Company of the Year 2026.

Nurau brings real-time AI intelligence to industrial frontline operations, transforming how shift teams capture, communicate, and act on operational knowledge. The platform combines multimodal data capture with AI-powered shift intelligence, enabling frontline teams in manufacturing and industrial environments to reduce information loss between shifts, accelerate decision-making, and drive continuous improvement directly from the floor. Trusted by leading operators across North America, Nurau is redefining how operational knowledge is captured and shared in the age of AI, turning every shift handover into a strategic asset.

McRock Industrial AI Entrepreneur of the Year

This award is presented to an entrepreneur whose company has developed innovative AI products while demonstrating leadership in advancing the adoption of industrial AI. Adam Keating, Co-Founder and CEO of CoLab, is awarded the McRock Industrial AI Entrepreneur of the Year 2026.

Under Adam’s leadership, CoLab has transformed how engineering teams collaborate on product design, bringing AI-native capabilities to the intersection of PLM, design review, and cross-functional collaboration. By enabling engineers, suppliers, and manufacturing partners to review, mark up, and resolve design decisions in real time, CoLab has significantly compressed product development cycles for some of the world’s most complex manufacturers. Adam’s vision for a more connected and intelligent engineering workflow has positioned CoLab as a trusted partner for leading aerospace, defence, and industrial organizations pursuing faster, smarter product development.

Trump’s AI oversight order exposes a gap: consumer social AI is flying under the radar

Posted in Commentary with tags , on May 21, 2026 by itnerd

As President Donald Trump moves to sign an executive order on AI oversight, the policy conversation is dominated by national security and enterprise risk — but consumer-facing AI platforms, where users are trusting AI with something as personal as their social lives and relationships, are barely part of the debate. The order raises a critical question: who sets the standard for emotional safety, transparency, and user consent in AI that mediates human connection?

Gidi Cohen, CEO & Co-founder, Bonfy.AI had this to say:

“The reported shift toward federal oversight of frontier AI models reflects something the security community has been watching develop for some time: the recognition that AI systems are no longer just productivity tools — they are infrastructure.

What’s notable about this moment isn’t the regulatory instinct. It’s what’s driving it. Reports of AI models autonomously discovering software exploits and scaling cyber operations aren’t abstract risks. They’re demonstrations of the same challenge we see playing out inside enterprises every day: AI systems that behave in ways their deployers didn’t anticipate, at speeds that outpace human review.

At Bonfy, we call this the “Shady AI” problem — not unauthorized AI, but sanctioned AI behaving in ways that violate policy or intent. The national security version of this problem is just the frontier model at civilizational scale.

The instinct to require pre-release government review of frontier models makes sense if you frame it the way Washington now appears to: as dual-use technology with offensive capability, not software. But a 90-day review window won’t solve the underlying challenge. The risk isn’t just in what a model can do before deployment — it’s in how it behaves when embedded in workflows, connected to tools and data, and operating semi-autonomously at machine speed.

That’s the architectural reality facing enterprise security teams today, and it’s why data security can no longer rely on perimeter controls and metadata. When AI agents are the actors, you need visibility into the data flowing through them — not just the permissions around them.

The government is arriving at a conclusion that security practitioners have been working through in parallel: that AI requires a different kind of oversight, one grounded in behavior and context, not just access configuration.”

For measures to be effective, they have to cover as many use cases as possible. This measure doesn’t do that, which means it may not have the intended effect at the end of the day.

ESET Research uncovers CallPhantom scam on Google Play

Posted in Commentary with tags on May 21, 2026 by itnerd

A new Android scam, CallPhantom, falsely claims to provide access to call logs, SMS records, and WhatsApp call history for any phone number in exchange for payment.

ESET identified and reported 28 separate CallPhantom apps on Google Play, cumulatively downloaded more than 7.3 million times.

Some CallPhantom apps sidestep Google Play’s official billing system, complicating victims’ refund efforts.

ESET researchers have uncovered fraudulent apps on Google Play that claim to provide the call history “for any number.” The offending apps, which ESET named CallPhantom based on their false claims, purport to provide access to call histories, SMS records, and even WhatsApp call logs for any phone number. To unlock this supposed feature, users are asked to pay — but all they get in return is randomly generated data. ESET’s investigation identified 28 such fraudulent apps, cumulatively downloaded more than 7.3 million times. As an App Defense Alliance partner, ESET reported their findings to Google, which removed all of the apps identified in this report from Google Play. 

The CallPhantom apps mainly targeted Android users in India and the broader Asia Pacific region. Many of the apps came with India’s +91 country code preselected, and support UPI, a payment system used primarily in India.

In general, CallPhantom apps have a simple user interface and do not request any intrusive or sensitive permissions — they don’t need to. Coincidentally, they do not contain any functionality capable of retrieving actual call, SMS, or WhatsApp data.

In the CallPhantom apps ESET analyzed, researchers saw three different payment methods used, two of which are in violation of Google Play’s payments policy. Some of the apps relied on subscriptions via Google Play’s official billing system. Others relied on payments via a third party; in some cases, payment card checkout forms were included directly in the CallPhantom apps.

The fees requested for the fake service differ widely across the apps. The apps also appear to offer different subscription packages, such as weekly, monthly, or yearly services, with the highest requested price sitting at US$80. For the lowest “subscription tier,” the average requested price was €5.

In general, subscriptions purchased through the official Google Play billing system can be canceled. For the 28 apps described in this blog post, existing subscriptions were canceled when the apps were removed from Google Play. In some cases, refunds for Google Play purchases are possible.

If the purchase was made outside of Google Play — for example, by entering payment card details inside the app or by paying via third-party services — then Google cannot cancel the subscription or issue a refund, and users have to contact their payment provider.

For a more details about CallPhantom, check out the latest ESET Research blog post, “Fake call logs, real payments: How CallPhantom tricks Android users,” on WeLiveSecurity.com.

Anthropic quietly patches Claude Code sandbox issue

Posted in Commentary with tags on May 20, 2026 by itnerd

Anthropic quietly patched a sandbox bypass vulnerability in Claude Code without public disclosure, leaving developers and security teams unaware that the agentic coding tool they were running had a containment flaw. The silent fix reflects a broader pattern: as AI coding agents are rapidly adopted into developer workflows, the security posture of those tools is often opaque — even to the vendors shipping them.

SecurityWeek has coverage here: Anthropic Silently Patches Claude Code Sandbox Bypass – SecurityWeek

Gidi Cohen, CEO & Co-founder, Bonfy.AI had this comment:

“The technical details here are worth understanding — a null-byte injection that tricks an allowlist filter into approving connections it should block, chainable with prompt injection to exfiltrate credentials and tokens. Anthropic fixed it. The researcher is frustrated about disclosure process. That debate will continue.

But the more important signal is structural: sandbox boundaries are policy enforcement mechanisms, and policy enforcement is only as good as the data flowing through it. When the filter sees .google.com and approves, it’s not making a security mistake — it’s doing exactly what it was told. The problem is that the data it was evaluating had already been manipulated upstream.

This is the pattern that keeps recurring across AI agent security incidents. The attack doesn’t defeat the control directly. It shapes the input so the control defeats itself. Prompt injection, malicious comments, null-byte tricks — these work because inspection is happening at the wrong layer, or not at all, and because the data moving through these systems isn’t being evaluated for what it actually contains.

Organizations deploying AI coding agents today should be asking a harder question than “is our sandbox configured correctly?” The question is whether they have any visibility into the data those agents are touching, generating, and sending — before it reaches any boundary at all.

Configuration is a starting point. It was never a substitute for understanding the data.”

I really hope that this doesn’t become a trend as it would really make me less likely to trust AI based developer tools. But I guess we will see on that front.

The Verizon 2026 Data Breach Investigations Report Is Out

Posted in Commentary with tags on May 20, 2026 by itnerd

The new Verizon Data breach investigations report has been released, revealing that nearly a third (31%) of data breaches over the past year started with vulnerability exploitation. This is up from 20% in last year’s report. The report looks at the dramatic impact that AI and supply chains are having on businesses.

Ensar Seker, CISO at SOCRadar:

“The latest Verizon DBIR confirms what many defenders have been experiencing operationally over the past year: attackers are increasingly prioritizing speed and scalability. Vulnerability exploitation jumping from 20% to 31% is a major signal that threat actors are moving away from slower intrusion methods and focusing on exposed internet-facing assets, edge devices, third-party software, and unpatched vulnerabilities that can provide immediate access at scale. What is especially concerning is how this trend intersects with supply chain risk and AI-driven operational acceleration. Organizations are no longer defending only their own infrastructure. They are also inheriting the risks of vendors, MSPs, SaaS providers, open-source dependencies, and interconnected ecosystems. 

A single exploited supplier can create downstream compromise opportunities across hundreds or thousands of organizations simultaneously, which dramatically increases attacker ROI. The AI component is equally important. While AI is currently improving productivity for defenders, adversaries are also leveraging automation to accelerate reconnaissance, phishing customization, vulnerability research, and operational decision-making. This lowers the barrier for less sophisticated actors while increasing the speed of mature threat groups. The result is a threat landscape where exploitation cycles are becoming shorter and organizations have less time to detect and respond. One of the biggest lessons from this year’s DBIR is that exposure management is becoming just as critical as traditional detection. 

Organizations need continuous visibility into external attack surfaces, third-party dependencies, exposed credentials, vulnerable assets, and misconfigurations. The companies that reduce attacker dwell time will be the ones that can rapidly identify exploitable exposure before threat actors operationalize it. We are also seeing a growing divide between organizations that treat patching as a periodic IT function versus those treating vulnerability prioritization as an active cyber risk management process tied to real-world exploitation intelligence. Attackers are increasingly targeting the vulnerabilities organizations fail to prioritize correctly, not necessarily the ones with the highest CVSS score.”

Brian Higgins, Security Specialist at Comparitech:

“The DBIR is always a useful publication. The contribution community is quite unique and it’s worth reading how the data is collected and managed if you haven’t already. A study of results and trends etc. should inform a lot of budget allocation and decision making in the coming periods.The major takeaways this year are:

Vulnerability exploitation overtaking credential theft as the highest ranking breach method. This in itself should be a catalyst for some major resource restructuring.

AI is obviously changing the attack landscape but possibly more noteworthy is a reported 45% of employees using unauthorised generative AI allowing data leakage at alarming levels. Clearly some policy and enforcement measures could help here.

Third party/Supply Chain attacks now account for almost half of all reported breaches. Conclusive proof, should anyone still need it, that it’s not enough in today’s digital environment to simply put your own house in order. Your Network is dynamic and its security relies heavily on factors difficult to control. It’s more vital than ever to have a Plan for when things go sideways.”

I really suggest reading this report as it really provides a lot of insight as to what threat actors are up to and where your next threats may come from. That way you can plan your defences accordingly.

UPDATE: Dave Hayes, VP of Product at cybersecurity company FusionAuth, commented:

“Credentials continue to do a lot of damage, they just don’t look like passwords anymore. The Drift Breach wasn’t a traditional password breach, it was a token abuse problem. OAuth tokens are critical to modern apps, but they’re also incredibly powerful. If companies don’t know where tokens exist, what they can access, and when they expire, attackers will happily answer  those questions for them.”

UPDATE #2: Scott Miserendino, VP of Engineering, Cyber at DataBee, A Comcast Company commented:

“Vulnerability exploitation is now the front door—and patching isn’t keeping up.

The DBIR confirms what many security leaders are experiencing operationally: exploitation of vulnerabilities is now the leading initial access vector (31%), overtaking credential abuse. But the more important signal isn’t just attacker behavior—it’s defender constraints. Organizations are facing a growing backlog of critical vulnerabilities, with only 26% fully remediated and a median remediation time stretching to 43 days. 

The gap here isn’t awareness—it’s operational execution. Security teams don’t lack vulnerability data; they lack the ability to prioritize, coordinate, and act on it at scale across fragmented environments.

Looking ahead, this challenge is likely to intensify. Emerging cyber-focused AI models—such as Anthropic’s Mythos, OpenAI’s GPT-5.5-Cyber, and DeepMind’s Big Sleep—have the potential to dramatically accelerate vulnerability discovery and lower the barrier to exploitation. Even before broad availability, it’s reasonable to expect that attackers will gain access to similar capabilities, enabling them to uncover undisclosed vulnerabilities faster and weaponize them with far less expertise. If that happens, the already widening gap between time-to-exploit and time-to-remediate could expand further, making it a critical area to watch in next year’s DBIR.

The implication is clear: vulnerability management is no longer just a prioritization problem—it’s a speed and accountability problem.

The most effective defense remains foundational but difficult to execute consistently:

  • A robust, disciplined patching process
  • Continuous monitoring of exposures across environments
  • Clear, enforced accountability for remediation, grounded in accurate asset and application ownership

Organizations that can reliably answer who owns what, and ensure those owners are accountable for timely patching, will be far better positioned to reduce risk, even as attacker capabilities accelerate. In other words, while the threat landscape is evolving rapidly, the winners will be those who can operationalize the fundamentals with greater precision, speed, and accountability.”

Averlon Launches Precog to Stop Exploitable Risk Before It Reaches Production

Posted in Commentary with tags on May 20, 2026 by itnerd

Averlon today announced Precog, a predictive remediation capability that identifies exploitable risk in proposed code and infrastructure changes and delivers the fix to developers before the change reaches production. Precog addresses a widening gap: AI is accelerating both code delivery and vulnerability discovery, and security teams can no longer manage risk only after it lands in production.

The need for this shift is becoming urgent. Google Cloud’s Mandiant M-Trends 2026 report found that mean time to exploit collapsed from 63 days in 2018 to an estimated minus seven days in 2025, meaning exploitation now often begins before a patch is available. New frontier models such as Claude Mythos and GPT-5.5-Cyber are making it increasingly clear that AI will compress the time required to discover, validate, and exploit vulnerabilities. The result is a widening gap between the speed at which risk is discovered and exploited, and the speed at which security teams can triage and fix it.

The industry is converging on a new operating model: Remediation Operations, or RemOps. The premise is simple: finding risk and closing risk are different problems. Security teams do not need more alerts; they need a way to understand what is truly exploitable, prioritize by business impact, and drive safe fixes through developer workflows.

Averlon’s Remediation Operations platform addresses the full lifecycle of risk reduction: ingesting security findings, determining what is truly exploitable, prioritizing by business impact, and driving agentic remediation through developer workflows. The platform has helped customers reduce remediation time by up to 90 percent and alert noise by up to 95 percent, helping security teams move from backlogs of thousands of findings to the handful that need fixing.

With Precog, Averlon extends that model earlier in the lifecycle by preventing exploitable risk before it becomes production exposure. Unlike security scanners that flag findings based on generic severity scores, Precog evaluates whether a proposed change would actually be exploitable in the customer’s real environment, accounting for internet reachability, exposed services, and existing compensating controls. This contextual analysis means Precog surfaces the changes that genuinely create exposure, not the long tail of theoretically risky findings that wouldn’t be exploitable in production. Precog integrates into CI systems such as GitHub, evaluating proposed changes before they reach production.

When risky changes are detected, Precog identifies the issue, explains the exploitable path, and generates a remediation directly in the developer workflow. Developers receive the proposed fix at the same time they are notified of the risk, reducing friction between security review and software delivery.

Read the research and see Precog in action:

SIOS Technology Returns with Season 2 of “Don’t Fail Me Now,” Spotlighting IT Resilience in Action

Posted in Commentary with tags on May 20, 2026 by itnerd

SIOS Technology today announced the launch of Season 2 of its podcast series, Don’t Fail Me Now. Created for IT leaders, architects, and decision-makers, the podcast focuses on practical ways to reduce downtime, advance HA/DR initiatives, and support resilient, always-on systems.

Season 2 includes five weekly episodes, each 15–30 minutes long, with SIOS experts and industry guests sharing firsthand insights, best practices, and strategies for maintaining availability across complex environments. All episodes from Season 1 are also available on demand for listeners who want to catch up on earlier discussions.

Episodes will be released weekly on Spotify, YouTube, and Apple Podcasts.

Season 2 Lineup

  • Episode 1: Protecting the Protectors: High Availability for Security and Compliance Platforms – Justin Chandler, senior solutions engineer at Cimcor, Inc., explores how file integrity monitoring, compliance automation, and high availability work together to eliminate blind spots. He discusses reducing alert fatigue, enforcing secure configuration baselines, and preventing data loss during outages, as well as trends in automation, containerization, and DevSecOps.
  • Episode 2: Behind the Scenes of Award-Winning Customer Support at SIOS – Sandi Hamilton, director of product support engineering at SIOS Technology, shares insights on building and leading a global 24×7 customer support team, prioritizing critical outages, collaborating across teams, and maintaining the human element in an AI-driven world.
  • Episode 3: Why SQL Server Audits Go Wrong, and How to Prevent – Shawn M. Upchurch, founder and CEO of UpSearch, explains why traditional SQL Server audits fall short, how visibility gaps form in virtualized and hybrid environments, and what continuous governance looks like to avoid unexpected costs.
  • Episode 4: Building the Future of High Availability – Devin Haynes, product owner at SIOS Technology, discusses how the SIOS product roadmap is shaped by customer feedback, market trends, and emerging technologies such as automation and AI, and what it takes to build resilient software.
  • Episode 5: Why High Availability Matters in Video Surveillance – Chebel Bou Chebel, technology partner manager at Milestone Systems, explores how modern video management platforms are scaling, the role of partner ecosystems, and why designing for failure is essential in high-risk and regulated environments.

IT professionals can subscribe to Don’t Fail Me Now and listen on all major platforms: