Kognitos Bridges the AI Trust Gap with Governed, Deterministic Execution for the Autonomous Enterprise

Posted in Commentary with tags on March 3, 2026 by itnerd

Kognitos today announced new platform enhancements designed to help enterprises move artificial intelligence (AI) from experimentation into real operational execution. Built in direct response to customer feedback, the latest release enables AI systems to perform mission-critical work with deterministic behavior, explicit human control, and full auditability, addressing the core trust barriers that have kept AI confined to pilots.

Enterprises have already demonstrated that AI can analyze data, interpret language, and generate recommendations at scale. Yet despite widespread experimentation, most organizations still stop short of allowing AI to execute core business processes. Customers state that the limitation is not intelligence, but predictability. 

Probabilistic AI systems often behave inconsistently at the edges, evolve silently over time, or embed business logic directly into prompts, creating a ‘Spaghetti Spiral,’ a tangled, brittle execution path that cannot be easily traced, governed, or audited. As a result, AI initiatives frequently stall at the final stage, or the ‘95% wall,’ the point at which AI works in pilots, but fails when edge cases, exceptions, and compliance requirements determine whether it can be trusted in production.

Kognitos is purpose-built for business processes that cannot run on probabilistic logic, where every step must be predictable, every outcome traceable, and every decision explainable. As the deterministic, agentic AI for enterprise operations, Kognitos closes the gap between what large language models can assist with and what production-grade execution actually demands.

From AI experimentation to governed execution

Kognitos’ latest platform release directly addresses the gap between AI experimentation and production execution by introducing a governed model that separates AI-assisted reasoning from live operational behavior. In this model, AI can interpret intent, plan workflows, and assist with design, but execution is performed by a deterministic, symbolic runtime that runs only explicitly approved logic.

Rather than relying on prompt chains or opaque agents, Kognitos uses Executable Natural Language, often described as English-as-Code, to express business logic in plain English Standard Operating Procedures (SOPs). These SOPs become the authoritative source of truth for execution, allowing organizations to define exactly what an automation is permitted to do, using language that business, IT, and compliance teams can all understand.

Once approved, these executable specifications function as versioned, human-readable contracts. Automations execute exactly as written, every time, and cannot change unless a human explicitly authorizes a revision. This approach enables developers to guarantee deterministic behavior at runtime, while allowing business users to own and evolve their operational logic safely.

Eliminating hallucinations, logic rot, and silent behavior drift

Businesses consistently cite silent behavior drift and untraceable ‘logic rot’ as major blockers to scaling AI in production. In many AI-driven systems, execution logic evolves implicitly as models adapt or prompts change, making it difficult to explain outcomes or reproduce past behavior.

Kognitos eliminates this risk by anchoring all execution to a symbolic layer that remains constant at runtime. Every automation run is associated with a specific version of its English specification, allowing teams to trace outcomes back to exact instructions. Past executions can be replayed deterministically, and all changes are recorded in a complete audit history showing who approved which logic and when.

By separating reasoning from execution, Kognitos ensures hallucination-free execution for deterministic rules, while eliminating the ‘Token Tax,’ the cost, latency, and variability introduced when large language models are used for simple, deterministic decisions.

Turning exceptions into institutional memory

Another critical pain point seen in AI systems today is the repetitive handling of exceptions. In many organizations, teams resolve the same edge cases repeatedly, with little knowledge retained and senior staff pulled into ongoing firefighting.

The new platform enhancements introduce a governed learning loop that treats exceptions as assets rather than failures. When an automation encounters an unknown condition, execution halts instead of guessing. AI proposes a resolution, a human reviews and approves it in plain English, and the approved logic is stored as part of the organization’s exception knowledge, without polluting the core process definition.

Over time, this creates a living runbook of how the organization operates, enabling exceptions to be resolved automatically and ensuring that critical expertise survives turnover.

Designed for shared ownership across business and IT

The enhancements are designed for operationally complex environments such as finance, accounting, manufacturing, and enterprise operations, where workflows span multiple teams and require strict governance.

Kognitos supports two complementary adoption paths into the same platform. Developers and IT teams gain a deterministic execution engine they can trust to behave consistently under regulatory and operational constraints. Business users and process owners gain a plain-English interface for defining, reviewing, and evolving their own automations without relying on prompt engineering or specialized scripting.

Because both groups work against the same human-readable logic, governance and collaboration improve rather than fragmenting across tools.

Availability

These enhancements are available as part of Kognitos’ current release. To help organizations evaluate readiness, Kognitos is offering a Trust Gap Assessment that enables enterprises to identify where existing AI initiatives may be constrained by predictability, governance, or auditability.

Dynabook Canada Expands Nationwide Distribution Through TD SYNNEX

Posted in Commentary with tags on March 3, 2026 by itnerd

Dynabook Canada Inc. has signed a nationwide distribution agreement with TD SYNNEX, expanding access to its business‑class laptop portfolio across Canada. The partnership improves product availability for resellers and system integrators while consolidating procurement through TD SYNNEX’s national channel.

The agreement responds to customer demand for predictable supply, longer device lifecycles, and consistent support. Through TD SYNNEX’s distribution network, partners can access Dynabook’s Portégé and Tecra laptops more efficiently, supporting faster deployment for commercial customers.

The partnership builds on TD SYNNEX’s existing relationship with Sharp Electronics of Canada’s business technology portfolio and aligns with Sharp Corporation’s broader strategy in the Canadian market. As a Sharp subsidiary, Dynabook manages product design, engineering, and testing centrally in Japan, supported by dedicated Canadian sales and service operations.

Dynabook Canada will continue to focus on delivering business laptops engineered for durability, security, and lifecycle consistency, supported by local infrastructure and national distribution coverage.

Learn more: https://ca.dynabook.com

First-Party Fraud Jumps 32 Per Cent as Canadians Report Growing ‘Fraud Fatigue’ Says Equifax

Posted in Commentary on March 3, 2026 by itnerd

The rate of first-party fraud in Canada rose 32 per cent year over year, moving from 0.25 per cent at the end of 2024 to 0.33 per cent by Q4 2025, according to Equifax Canada’s Market Pulse Fraud Trends and Insights. First-party fraud involves individuals using their own legitimate identity to misrepresent information for financial gain.

The increase comes as a new Equifax Canada Fraud Survey conducted for Fraud Prevention Month reveals that Canadians are feeling increasingly worn down by the steady stream of scams and fraud attempts in their daily lives.

Nearly three in ten Canadians surveyed, 28 per cent, describe the daily volume of fraud attempts as a “manageable annoyance.” More than one-quarter say they feel numb to suspicious messages and delete them without reviewing them. Sixteen per cent report feeling “anxious and tired” trying to determine what is real and what is fake, while five per cent say they feel “completely burnt out.”

More than four in five Canadians surveyed, 83 per cent, are concerned that technology can now be used to create fake legal documents such as pay stubs, insurance claims, or identification that appear convincingly real.

Identity theft and impersonation scams remain top concerns. Two-thirds of Canadians believe identity theft, 67 per cent, and impersonation and phishing scams, 64 per cent, are among the most worrisome forms of fraud today. Digital payment scams follow at 59 per cent, with investment and romance fraud at 46 per cent.

The findings highlight how pervasive fraud risk has become. Six in ten Canadians say they feel most vulnerable online. One-third report feeling at risk while using public Wi-Fi, and one-quarter feel vulnerable at home. Only a small minority say they never feel vulnerable.

Despite heightened awareness, risky behaviours persist. Nearly four in ten Canadians admit they have accidentally clicked on a fraudulent link in an email or text message. Half say they know someone who has experienced identity theft. Many report difficulty keeping pace with evolving scams, underscoring the need for ongoing education and stronger protections.

Canadians overwhelmingly agree that combating fraud demands collective responsibility:

  • 88 per cent say public and private sectors must work together to combat financial crime
  • 83 per cent believe the media should do more to raise awareness about how scams operate80 per cent support stricter penalties for scammers
  • 62 per cent believe everyday scams help fund more serious criminal activity

When asked what would help them stay safer, respondents pointed to stronger safeguards and education:

  • 68 per cent say banks should implement stronger security measures to protect accounts
  • 63 per cent want governments and companies to use more sophisticated fraud solutions
  • 59 per cent support mandatory education in schools and broader public awareness campaigns

Auto insurance fraud is also on Canadians’ radar, with nearly half concerned that fraudulent activity is contributing to higher premiums for honest drivers.

Equifax surveyed 1,570 Canadians ages 18 to 65 from Jan. 30 to Feb. 1, 2026. A probability sample of the same size would yield a margin of error of plus or minus 2.5 percentage points, 19 times out of 20.

Attackers turn to “Vibe Hacking” and Flat-Pack Malware, according to HP’s latest Threat Insights Repor

Posted in Commentary on March 3, 2026 by itnerd

HP Wolf Security’s latest Threat Insights Report is live this morning and it reveals attackers are turning to vibe hacking, flat-pack malware and low-effort AI-built attacks to outpace and bypass business defenses.

The report highlights how AI is enabling attackers to scale and accelerate campaigns, prioritizing cost, effort and efficiency over quality.

Notable campaigns highlighted in the report include:

  • Vibe-Hacking Scripts Using Booking.com Redirects: Attackers are using AI to generate ready-made infection scripts – known as vibe-hacking – to automate malware delivery. In one campaign a fake invoice PDF triggered a silent download before redirecting victims to Booking.com to appear legitimate.
  • Flat-Pack Malware Speeds Up Campaign Building: Threat actors are assembling attacks using inexpensive, off-the-shelf malware components, likely purchased from hacker forums – allowing them to quickly build, customize, and scale campaigns with minimal effort.
  • Malware Hidden in Fake Teams Installer ‘Piggyback’ Attack: Campaigns using search engine poisoning and malicious adverts to promote fake Microsoft Teams websites. Victims download an installer where hidden malware runs alongside the real app, giving attackers backdoor access

Here is a blog about the report from the HP Wolf Security team.

Pentagon picks Grok AI…. Which Likely Isn’t A Good Thing

Posted in Commentary with tags on March 3, 2026 by itnerd

The US Pentagon recently approved Elon Musk’s Grok AI for classified military operations while threatening Anthropic with penalties for refusing to remove ethical safeguards from its Claude AI.

Jurgita Lapienytė, chief editor at Cybernews had this to say:

Safety rules are being thrown out.

    “For the fear of its Claude being used for the surveillance of American citizens or used to develop mass weapons, the US leading AI company has backed out of the deal with the Pentagon, and is now facing penalties for standing its ground. Yes, the government shouldn’t allow any company to dictate the terms for defence operations. But should AI companies be punished for having safety rules? If the biggest market players are forced onto their knees, smaller companies will stop having safety rules, too. Will being “safe” become bad for business?”

    Machines making kill decisions.

      “Currently, AI is not only untrustworthy but also very dangerous when unsupervised. In military operations, it can also be used to dehumanize operations by offering gamified experiences for officers and soldiers, and shifting personal responsibility.”

      Approval based on politics, not security.

        “You’d expect your government to pick the best technology and go to great lengths to discuss the best possible solutions for American citizens and defense goals. What seems to have happened here is that, in the heat of public discussion, another company got fast-tracked, while at the same time it’s facing hefty fines and even bans in other countries.”

        This might be a security issue for other countries, too.  

          “When the world’s most powerful military starts using AI without being transparent about exactly how, one can begin to wonder just how much US operations overseas are influenced by the algorithm. Every country in conflict with the US should keep a close eye on this development.”

          Volvo Cars kicks off largest over-the-air car software update in history with comprehensive user experience upgrade

          Posted in Commentary with tags on March 3, 2026 by itnerd

          Volvo Cars is launching its largest over-the-air software update ever, as it rolls out a new, more intuitive user experience to millions of customers starting this week.

          Around 2.5 million Volvo cars across 85 countries around the globe will receive the new user experience, called Volvo Car UX. A more user-friendly new layout for the car’s central display screen allows drivers to enjoy a faster, easier and more intuitive way to interact with their cars while reducing the number of taps to get to different functions.

          Customers who drive a Volvo car with Google built-in will receive the upgrade on their Volvo cars built as early as 2020 free of charge, an initiative in line with Volvo Cars’ strategy to make its cars better over time with regular software updates.

          Based on the Android Automotive operating system and with several Google services as standard, the new user experience aims to make customers’ lives easier behind the wheel. It now takes fewer taps or clicks for customers to reach the most-used features, getting them where they want to be more quickly.

          The new layout also includes easier, more prominent navigation and a refreshed, more modern look, with many upgrades grounded in real-world research and feedback from customers. In other words, it’s simply better.

          As one of the most comprehensive infotainment updates by any car maker to date, the new user experience creates a contemporary and consistent design philosophy across all Volvo car models. This means a customer with a three-year-old XC40 benefits from the same approach as an EX90 owner, for example.

          The content on the screen represents the biggest change, with the most common apps and controls, such as maps, media and phone, presented on the home screen. This means for example that customers who are following navigation directions and want to change the music, no longer have to leave Google Maps to access the media feature.

          Then there is the contextual bar, which changes what drivers see according to the situation and displays the most recently used apps. When driving at low speeds, the icon for outside cameras appears so drivers can get help manoeuvring in tight spaces.

          For plug-in hybrid drivers, the new user experience makes it easier for drivers to get the most out of their electric powertrain. Via ‘Drive Modes’ on the home screen, drivers can easily access ‘Pure’ mode alongside other options. That means switching from hybrid to electric-only power is now only one tap away, giving drivers more control.

          At the same time as the updates above, Volvo Cars will also start to roll out the opportunity for all customers with Google built-in, but without its Pilot Assist driver assistance feature, to purchase and download the feature to their car.

          The update also prepares cars for an optimal conversational AI experience with Google Gemini, which is set to come to the same eligible cars later this spring.

          CloudSEK Uncovers Fake “Red Alert” App Campaign Exploiting Conflict-Driven Panic

          Posted in Commentary with tags on March 3, 2026 by itnerd

          CloudSEK has uncovered a malicious mobile campaign spreading a fake version of Israel’s “Red Alert” emergency warning app, the legitimate alert platform operated by Israel’s Home Front Command, through spoofed SMS messages.

          According to CloudSEK’s latest threat intelligence report, the trojanized Android application is designed to appear trustworthy while enabling the theft of SMS data, contact lists, and precise location information from infected devices.

          The campaign emerges against the backdrop of the ongoing Israel-Iran conflict, where demand for real-time public safety information has sharply increased. CloudSEK’s researchers found that threat actors are exploiting this urgency by luring users to sideload a malicious APK outside the Google Play Store, while presenting it as an emergency update or warning application. )

          According to the report, the malware mimics the user interface of the legitimate Red Alert application closely enough to reduce suspicion and can even continue delivering alert-style functionality to maintain its disguise. 

          The key difference appears during installation and onboarding: while the authentic app operates with basic notification access, the fake version aggressively requests high-risk permissions, including access to contacts, SMS, and location. 

          CloudSEK’s technical analysis found that the malicious app uses signature spoofing, installer spoofing, reflection, and multi-stage payload loading to conceal its true behaviour and bypass basic integrity checks. Once active, the malware begins harvesting data in the background and exfiltrating it to attacker-controlled infrastructure. The report identifies api[.]ra-backup[.]com/analytics/submit.php as an exfiltration endpoint and lists several associated IP addresses tied to the campaign’s infrastructure.

          CloudSEK warns that this campaign carries implications beyond conventional mobile malware. In an active conflict environment, real-time location tracking and SMS interception can create serious physical security, surveillance, and intelligence-gathering risks. The report notes that location data could potentially be misused to map shelter activity, movement patterns, or concentrations of individuals during periods of heightened military escalation.

          The report also underscores a larger pattern: threat actors are increasingly weaponising real-world crises and trusted institutions to distribute malware at scale. By impersonating a life-saving emergency app during a volatile geopolitical situation, the attackers behind this campaign have demonstrated how cyber operations can feed directly off civilian anxiety and information dependency.

          CloudSEK has advised immediate caution around app downloads delivered through links in SMS messages, particularly in conflict-related or emergency contexts. The company recommends that users install critical public-safety applications only through official app stores and that organisations block the listed indicators of compromise and monitor for suspicious sideloaded Android packages.

          For More Information, Read The Full Report Here

          Black Kite’s 2026 Third-Party Breach Report Identifies Risk Concentration as the Primary Catalyst for Global Cascading Failures

          Posted in Commentary with tags on March 3, 2026 by itnerd

          Black Kite today announced the release of its seventh annual Third-Party Breach Report, which analyzes third-party data breaches in 2025, including how they occurred, organizational impact, and structural conditions shaping third-party cyber risk at scale. The report found 136 unique major incidents, affecting 719 companies, plus an estimated 26,000 additional impacted companies that were not officially named.

          Black Kite’s report examines the supply chain’s interconnectedness and vulnerabilities by evaluating last year’s key third-party breach events and dominant trends, the cyber posture of approximately 200,000 monitored companies on the Black Kite platform, and the concentration risk among the top 50 most relied upon third parties within the Forbes Global 2000 ecosystem.

          2025 Incidents and Impact

          2025 saw a surge in verified incidents with 136 major events. However, what stood out is not that companies were breached, but rather, a significant “shadow layer” emerged behind aggregate disclosures. In fact, while 719 companies were publicly named as victims, approximately 26,000 additional impacted companies were affected but never officially named.  At the individual level, publicly disclosed figures point to 433 million impacted people.

          In 2025, we saw an average of 5.28 downstream victims per third-party breach, the highest level observed to date (2.56 in 2024, 3.09 in 2023, 4.73 in 2022, and 2.46 victims per incident in 2021). This uptick reflects a sharp increase in the scale and coordination of attacks, driven by threat actors targeting shared platforms, centralized services, and high-dependency vendors. As attackers move upstream, single compromises increasingly translate into multi-company impact.

          The visibility gap is further exacerbated by a persistent “Silent Window”: while the median time to detect an intrusion was 10 days, the median delay to disclose that breach to the public was 73 days. This delay represents a massive transfer of risk from the vendor to the unsuspecting downstream customer.

          Key findings include:

          • Verified incidents surged to 136 events, with 719 named victim companies, and a much larger hidden layer behind aggregate disclosures
          • Publicly disclosed impact reached 433 million people, while vendors reported approximately 26,000 additional affected companies without naming them
          • Detection is slow, disclosure is slower, with median detection at 10 days (79 events with timeline data) and median disclosure lag of 73 days (average 117)

          What the Third-Party Ecosystem Looks Like

          Across a baseline of approximately 200,000 monitored organizations, randomly selected to understand the current state of the industry, the ecosystem appears healthy on paper with an average Cyber Grade of 90.27 (A). While a high average grade indicates that many organizations meet standard control expectations and compliance checklists, it does not guarantee that the ecosystem is resilient under real-world pressure. Third-party risk scales through common failure modes and dependency structures, so ecosystems can look strong in aggregate while remaining fragile in the specific places attackers repeatedly exploit.

          For instance, the reality of the terrain is defined by repeatable weaknesses. Over 53% of organizations have at least one critical vulnerability, and 23% have corporate credentials circulating on the dark web. This creates “Pressure Zones,” particularly in manufacturing and professional services, where high susceptibility and weak discipline overlap. Notably, these sectors have been the top two hit by ransomware for four consecutive years. Education is another high-pressure sector. This is not driven by attack sophistication, but by chronic exposure. High credential leakage, inconsistent patch discipline, and operational constraints combine to create environments where compromise is easier to initiate and harder to contain.

          On the other hand, finance presents a different pattern. Ransomware Susceptibility Index® (RSI™) scores remain materially lower because sustained governance pressure forces tighter control over identity, patching, and exposure management. Regulatory frameworks and continuous audit expectations raise the cost of negligence and shorten tolerance for unresolved weaknesses.

          Key findings include:

          • Across nearly 200,000 monitored organizations, the ecosystem appears healthy on paper, with an average Cyber Grade 90.27 (A), yet failure signals are widespread – 53.77% have at least one critical vulnerability, and 23.34% have corporate credentials circulating on the dark web.
          • The ecosystem is not uniformly risky, with manufacturing and professional services sitting in the pressure zone with high Ransomware Susceptibility and weak patch discipline, while finance trends toward a more controlled profile.

          The Concentration Risk Crisis: Top 50 Shared Vendors

          The top 50 vendors shared by the Forbes Global 2000 represent not only a concentrated point of failure, but also, threat actors know they are the “master keys” to some of the world’s largest organizations, so they are hunting them aggressively.

          Of utmost concern is that these vendors maintain a lower average Cyber Grade (83.9, B) than the ecosystem at large, and a staggering 70% of them have at least one vulnerability currently listed in the CISA KEV catalog. With 62% of them showing corporate credentials in stealer logs, this sensitive information is already circulating on the dark web.

          Key findings include:

          • 70% have at least one CISA KEV exposure, and 84% have critical vulnerabilities(CVSS ≥ 8)
          • 80% show phishing URL exposure, and 40% show active targeting signals
          • 62% have corporate credentials exposed in stealer logs, and 30% have breached credentials in the last 90 days
          • 52% have a breach history, with 18% in the last year

          To read the report, visit https://content.blackkite.com/ebook/2026-third-party-breach-report/.

          Methodology

          The findings in this report are the result of a multi-source, intelligence-led investigation conducted by the Black Kite Research Group. Black Kite combined verified public breach disclosures with the company’s external cyber risk telemetry and supply chain intelligence to analyze how third-party data breaches emerged, propagated, and concentrated across the ecosystem throughout 2025. The report covers third-party data breach events disclosed between January 1, 2025, and December 31, 2025. The breach dataset is limited to verified, publicly disclosed incidents and is designed to reflect what can be substantiated from reliable reporting and primary disclosures.

          Over 676 Million U.S. Identity Records Including SSNs Exposed by Public Elasticsearch Instance 

          Posted in Commentary with tags on March 3, 2026 by itnerd

          he SOCRadar threat intelligence team over the weekend identified a publicly accessible Elasticsearch instance containing over 676 million indexed U.S. identity records, including full SSNs, and complete identity profiles. 

          The dataset was exposed to the internet without authentication, enabling unrestricted access to full identity attributes, including SSNs, dates of birth, historical address records, and phone numbers.

          The exposed instance contained highly sensitive personal data at a scale exceeding the current U.S. population. This finding represents an extreme-scale identity risk.

          Even if duplicate or historical entries exist, the presence of searchable government-issued identifiers in an unauthenticated database places this case in the Critical severity category.

          More details can be found here: https://socradar.io/blog/us-elasticsearch-leak-676m-identity-records-ssn-exposure

          Palo Alto Networks Unit 42 Says That A Chrome CVE Can Allow Hijacking Of The In-Browser AI Assistant 

          Posted in Commentary with tags on March 2, 2026 by itnerd

          The new wave of agentic browsers brings the promise of transforming the way we use our computers and experience the internet, with AI-driven tools that interact with websites, fill out forms and manage workflows on our behalf. But with these experiential benefits, also come profound new cybersecurity challenges. 

          Unit 42 researchers at Palo Alto Networks released new research on a high-severity vulnerability (CVE-2026-0628) they discovered in Google’s new Gemini Live in Chrome feature that could allow malicious extensions with basic permissions to ‘hijack’ the new in-browser AI assistant, granting attackers access to webcams, microphones, and private files

          Palo Alto Networks researchers shared the issue with Google in October via coordinated vulnerability disclosure and Google issued a fix in early January. But, this discovery underscores a growing security paradox: as tech giants rush to turn browsers into powerful AI agents, they are inadvertently opening new backdoors to sensitive personal data.

          The research is live here: http://unit42.paloaltonetworks.com/gemini-live-in-chrome-hijacking