Iran–US Escalation Heightens Risk to Industrial Systems: CloudSEK

Posted in Commentary with tags on March 5, 2026 by itnerd

CloudSEK today released a threat landscape assessment warning that more than 60 hacker groups mobilised within hours of the February 28, 2026 Iran–US military escalation — and that tens of thousands of US industrial control systems remain directly reachable from the internet, many with no authentication beyond a factory-default password.

The report, “A Threat Actor Landscape Assessment of ICS/OT Targeting in the 2026 Iran–US Conflict,” identifies a two-tier threat ecosystem: nation-state APTs pre-positioned inside US networks for years, and a fast-expanding pool of state-backed hacktivist proxies that need nothing more than an exposed device and a motivation to cause national-headline disruption. 

CloudSEK’s report finds that the industrial attack surface remains exposed at scale. In the United States alone, researchers identified approximately 182.2K internet-exposed industrial and automation-related assets (including both live and historically observed systems). Many of these were found to be actively reachable and exposed without authentication.

The exposure is not limited to the U.S.: Israel recorded around 104.9K such assets, while the United Kingdom showed roughly 88.8K exposed assets. CloudSEK notes that these listings represent industrial or automation-related devices observed on the public internet, underscoring the scale of potential targeting during periods of geopolitical escalation. 

Key highlights from the report

  • Rapid mobilization after escalation: CloudSEK observed a sharp rise in hacktivist and proxy activation following February 28, increasing the volume of actors scanning for high-visibility infrastructure targets.
  • Exposure at scale across industrial protocols: The report identifies large volumes of internet-reachable industrial services in the US, across widely used ICS/OT and automation protocols and platforms — indicating that many operational environments remain discoverable from the public internet.
  • Three primary routes from discovery to impact:
    1. Direct access to exposed industrial interfaces (often enabled by weak/default credentials)
    2. Phishing and compromise of OT-adjacent users and vendors (engineering workstations, operators, third-party access)
    3. Enterprise IT compromise followed by lateral movement into OT, allowing adversaries to pre-position access and activate during crisis windows
  • Basic weaknesses continue to enable real-world compromise: The report underscores that industrial incidents often stem from long-standing issues — internet exposure, unsecured remote access, and default credentials — rather than rare, highly advanced exploits.
  • Operational risk is physical by design: Unlike purely digital attacks, ICS/OT compromise can affect physical processes, making disruption potentially immediate and safety-relevant.

Why default access and exposed interfaces remain a critical risk

CloudSEK’s assessment notes that many industrial environments remain vulnerable because exposed devices and interfaces can be identified quickly through standard internet scanning. In such cases, attackers may not need to exploit software vulnerabilities — they only need to find an exposed system and gain access using weak or default authentication.

This dynamic becomes more dangerous during periods of escalation, when some actors prioritise visibility and disruption over stealth.

Recommended actions for operators and defenders

CloudSEK urges critical infrastructure owners and operators to prioritise immediate, practical defensive measures:

  • Remove ICS/OT management interfaces from the public internet wherever possible; enforce VPN-only access for remote operations
  • Eliminate default credentials and strengthen authentication on industrial devices and management consoles
  • Restrict industrial protocol exposure at the perimeter and shut down unnecessary remote-access services
  • Audit and limit third-party remote access into OT environments (MSPs/RMM tools, vendor pathways)
  • Improve monitoring and logging in OT-adjacent environments to detect unauthorised access and lateral movement early

Check Point Launches a Secure AI Advisory Service to Help Enterprises Govern and Scale AI Transformation

Posted in Commentary with tags on March 5, 2026 by itnerd

Check Point Software today announced a Secure AI Advisory Service, a new service designed to help enterprises accelerate AI adoption with governance, risk management and regulatory compliance embedded from the start.

AI is moving from experimentation to core business infrastructure. Yet in many organizations, deployment is outpacing oversight. Boards and executive teams are facing increased regulatory scrutiny, operational risk and accountability gaps as AI systems expand across hybrid networks, cloud environments and digital workspaces. Secure AI Advisory provides a structured, intelligence-driven framework to bring clarity and control to AI transformation. The service embeds governance, risk assessment and regulatory alignment across the full AI lifecycle, enabling measurable risk reduction and responsible scaling from day one.

This new service is part of the CPR Act, Check Point’s Cyber Resilience and Response unit, which delivers AI governance with global threat intelligence to provide actionable guidance. Unlike one-off assessments or standalone consulting, CPR Act integrates AI governance into the security lifecycle, connecting intelligence, readiness, detection, and response. This ensures controls and monitoring to adapt to new AI risks, regulations, and threats, offering organizations a single accountable partner from strategy through execution.

Enterprises require more than policy guidance. They need operational frameworks that align innovation with accountability and risk transparency. Secure AI Advisory delivers:

  • AI governance frameworks aligned to business strategy
  • AI risk and impact assessments with prioritized mitigation roadmaps
  • Regulatory readiness aligned to EU AI Act, GDPR, ISO 42001 and NIST AI RMF
  • Executive and practitioner enablement to operationalize controls

The service is available in three tiers, Essential, Enhanced and Total, supporting organizations at every stage of AI maturity. All tiers include access to Check Point’s interactive AI Risk and Compliance Dashboard for continuous visibility and structured oversight.

Secure AI Advisory complements Check Point’s prevention-first security architecture, supporting secure AI adoption across Hybrid Mesh Network Security, Workspace Security, Exposure Management and AI Security. This integrated approach enables organizations to govern AI consistently across multivendor and hybrid environments without adding operational complexity.

By combining vendor agnostic advisory with intelligence-led insight, Check Point helps enterprises transform AI from a source of uncertainty into a controlled driver of growth. Secure AI Advisory reinforces Check Point’s commitment to securing the AI transformation. By embedding governance, risk management and compliance into AI strategy at the outset, organizations can accelerate innovation while protecting resilience, reputation and shareholder value.

Commvault and CloudSEK Join Forces

Posted in Commentary with tags , on March 5, 2026 by itnerd

Commvault today announced an integration with CloudSEK, a global leader in Predictive Threat Intelligence and AI-driven external risk monitoring, to help enterprises proactively defend against identity-based cyberattacks fueled by stolen and exposed credentials.

As identity becomes the new attack surface, 80% of breaches involve compromised credentials. Today, more than 24 billion stolen credentials are across dark web marketplaces, stealer logs, and underground forums. With the rise of AI-driven attack automation and agentic adversaries, the time between credential exposure and exploitation has collapsed from months to hours. 

This integration brings CloudSEK’s real-time Dark Web Credential Intelligence directly into Commvault’s Active Directory Vulnerability Assessments and Active Directory Advanced Audit and Anomaly Detection solutions. By correlating external credential exposure signals with internal identity telemetry, customers can identify exposed accounts early and take decisive action, including: disabling, locking, or resetting compromised credentials and rolling back malicious changes to Active Directory before attackers can escalate privileges, deploy ransomware, or exfiltrate sensitive data. 

Additionally, via this integration, vulnerabilities and risks across internal, public, and dark web sources are automatically scored, prioritized, and delivered with clear remediation guidance, eliminating guesswork and enabling security teams to focus on the most critical issues first.

Availability

The CloudSEK integration will be available this summer at no charge for customers using Commvault Active Directory Vulnerability Assessments and Active Directory Advanced Audit and Anomaly Detection solutions. Customers will also have the opportunity to upgrade to the full suite of CloudSEK solutions.

Join Commvault at RSAC 2026

Commvault’s latest identity resilience offerings take center stage at this year’s RSAC Conference (Booth #S-0634) from March 23-26 in San Francisco. Show attendees can grab a ringside seat for the ResOps Rumble where resilience and operations join forces to deliver unified cyber recovery, identity resilience, and data security. Register today for ransomware recovery demos and sessions, expert insights on identity resilience and clean recovery, and the ultimate prize – unified resilience for your organization.

ConnectWise 2026 MSP Threat Report Spotlights How Identity Abuse is Redefining MSP Risk

Posted in Commentary with tags on March 5, 2026 by itnerd

ConnectWise today announced the release of its 2026 MSP Threat Report, delivering global threat intelligence and actionable guidance for Managed Service Providers (MSPs) navigating one of the most complex cybersecurity landscapes to date. The report details the most significant threats observed throughout 2025 and reflects ConnectWise’s continued evolution in helping customers secure and strengthen their businesses as identity, access and trust relationships become the primary battleground in modern cyberattacks.

Drawing from real-world incident response investigations, ConnectWise customer telemetry, ransomware leak site monitoring and malicious infrastructure tracking, the 2026 report reveals a decisive shift in attacker strategy: adversaries are no longer relying primarily on novel exploits. Instead, they are exploiting trusted identities, legitimate system tools, remote access infrastructure, and software supply chains to gain faster, more scalable access to MSP-managed environments worldwide.

Global threat landscape demands platform-level defense
The 2026 MSP Threat Report highlights trends observed across North America, Europe, and Asia-Pacific (APAC), reinforcing that while regional nuances exist, the underlying risks are consistent worldwide.

  • Ransomware prioritized speed and access reliability Rather than innovating encryption techniques, ransomware operators refined how they gained access. Groups such as Akira demonstrated rapid “scan, steal, encrypt” lifecycles, often targeting backup infrastructure early to prevent recovery. Attackers also bypassed OTP-based multi-factor authentication (MFA) by exploiting inherited VPN configuration artifacts or retained appliance secrets.

Key regional ransomware trends include:

  • In North America, ransomware operators prioritized speed and early backup disruption in midsized business environments.
  • European manufacturing and supply chain ecosystems saw increased targeting through credential and remote access abuse.
  • Growing SMB markets in APAC experienced expanding exposure of perimeter infrastructure and credential-stuffing campaigns.
  • VPN infrastructure became a consistent entry point Publicly exposed SSL VPN interfaces were repeatedly targeted through credential stuffing, inherited secrets and critical vulnerabilities affecting major vendors. In multiple cases, organizations experienced full domain compromise within hours of successful VPN authentication.
  • Software supply chain compromise expanded downstream risk – Supply chain attacks intensified in both scale and automation. Campaigns such as “Shai-Hulud” compromised npm maintainer accounts and propagated trojanized updates across thousands of downstream environments. Other ecosystems, such as PyPI, NuGet, RubyGems, and Rust, faced phishing and malicious package injection campaigns that turned routine dependency updates into execution paths.
  • ClickFix and user-mediated execution matured – ClickFix-style social engineering attacks, in which users are manipulated into copying and pasting malicious commands into legitimate utilities, emerged as a repeatable and adaptable intrusion method. The tactic bypasses traditional defenses by shifting execution responsibility to the user.
  • AI increased attacker scale and realism – Although AI’s direct artifacts are often invisible in forensic telemetry, its impact was evident through increases in deepfake-enabled fraud, LLM-generated phishing campaigns, AI-assisted malware development, and automation that lowered barriers to entry for threat actors globally. Rather than creating new attack categories, AI made established tactics faster, more scalable and more convincing.

ConnectWise: Evolving with the threat landscape

The 2026 MSP Threat Report underscores a critical reality: reactive security models are no longer sufficient. Defenders must move earlier in the attack lifecycle, focusing on identity, privilege, execution context, and resilience.

ConnectWise is addressing this shift by continuing to strengthen and integrate cybersecurity and data protection capabilities across the ConnectWise Platform, including:

  • Privileged Access Management (PAM) to enforce least-privilege and reduce blast radius from credential compromise.
  • Managed Endpoint Detection and Response (Managed EDR) to provide continuous, behavior-based monitoring and rapid containment.     
  • Security Information and Event Management (SIEM) to correlate identity, endpoint and network telemetry across multi-tenant environments.
  • Business Continuity and Disaster Recovery (BCDR) with immutable backup capabilities designed to resist tampering—even in ransomware scenarios.

The 2026 MSP Threat report is made possible by the ConnectWise Cyber Research Unit™ (CRU), an elite team of threat hunters and cybersecurity professionals who gather intelligence 24/7 from real-world incidents, customer environments, ransomware leak sites and malicious infrastructure monitoring. The full report is available for download at this link.

Guest Post – Surrounded by bots: Social media platforms delete 6.3B fake accounts, with Facebook and X at the top of the list

Posted in Commentary with tags on March 5, 2026 by itnerd

Popular social media platforms are constantly removing massive amounts of fake accounts and spam content. Surfshark’s analysis of annual public transparency reports reveals the staggering scale of this cleanup: Facebook, TikTok, X, and LinkedIn collectively remove 6.3B fake accounts. These platforms, along with YouTube and Instagram, also remove 11.1B pieces of spam content. On the dark market, fake account prices start at $0.08.

While AI agents are learning to interact with each other on their designated social media, bots pretending to be humans continue to sink popular platforms.

“I am convinced that the majority of fake accounts on social media are bots. Especially with the evolution of AI, producing and managing bots becomes easier. On some platforms, AI can fully cover the needs of “faking”. In contrast, on others it’s not that simple — for example, on Facebook, where interaction with real people and response to context are required,” says Justas Pukys, Senior Product Manager at Surfshark.

He explains that bots are programs designed to impersonate humans. They are centrally controlled, like marionettes, and trained to deceive both systems and humans. In addition, bots can also be real people who manage several accounts with a common goal, for example, to influence social media users’ attitudes, push an agenda on a certain issue, provoke society, or show exaggerated support for certain institutions or figures.

Comparing fake account removal volumes to active users reveals the enormous scale of the monitoring and removal that social media must perform.

On some platforms, the number of annual removals rivals or even exceeds the entire active user base. For example, Facebook, with 3B active users, removes 4.5B fake accounts annually — a volume 1.5 times its user count. Similarly, X reports removing 671M accounts each year for platform manipulation and spam, a figure that surpasses its 570M active users. TikTok deletes 1B fake accounts, equivalent to over half its active user base — 1.9B.

“Considering those platforms’ size, global reach, and impact on human opinion and behavior, I wouldn’t be surprised if the number of fake accounts and content were even higher than presented in the official transparency reports. Also, I believe these numbers will continue to grow drastically in the future, unless social media finds effective ways to combat the threat,” says cybersecurity expert at Surfshark.

Real users face increasing scam risks

Given that social media is flooded with fake accounts and content, a really worrying issue is that real users can easily be scammed and harmed, both morally and financially. Consider these recommendations from Surfshark’s experts on how to avoid getting scammed:

Pay attention to suspicious account profile details: fake accounts usually have very few photos or only associative images. Usually, the account is created recently and has a vague or overly promotional bio.

Be aware of unnatural behavior: fake accounts often send friend requests to many people in a short period of time. They may immediately send you links or other suspicious offers, usually encouraging you to move the conversation to WhatsApp or Telegram quickly.

Fake accounts send repetitive or copy-paste comments: they tend to post the same message under many posts. They typically offer “too good to be true” benefits, such as crypto, giveaways, and miracle cures.

What should you do to avoid harm?

  • Don’t engage with suspicious accounts and content: don’t reply, argue, or click links;
  • Always check: look at important details such as the account’s age, bio, and number of friends;
  • Report the account and content: use the social media platform’s report feature;
  • Protect yourself: enable two-factor authentication (2FA) on your account, make your social media profile private, and avoid sharing personal details publicly.

Musashi Energy Solutions and DG Matrix Team Up to Solve AI Power Spikes

Posted in Commentary with tags , on March 5, 2026 by itnerd

DG Matrix and Musashi Energy Solutions, a wholly-owned subsidiary of Musashi, today announced a strategic collaboration to tackle one of the biggest hurdles in AI infrastructure: extreme power fluctuations caused by high-performance Graphics Processing Units (GPUs).

The collaboration integrates Musashi’s ESS400 Energy Storage System (powered by Musashi’s Hybrid SuperCapacitors) with DG Matrix’s Interport™ – a multi-port solid-state transformer. Together, these technologies manage the massive, rapid power “pulses” created by AI workloads, protecting utilities, generators, and data center equipment, unlocking stranded capacity, reducing infrastructure costs, and increasing safety.

The Problem: AI’s Pulse-Load

Modern AI clusters don’t draw power steadily. Instead, GPUs demand massive, repetitive bursts of energy. Traditional UPS systems and batteries were never designed for dynamic power spikes that significantly degrade battery life, stress primary and backup generators, and force operators to overbuild expensive infrastructure to handle the peaks.

Flexible Integration: Greenfield & Brownfield

The joint platform is designed for maximum versatility across the evolving data center landscape. It is ideal for greenfield projects, where developers can design optimized, high-density power architectures from the ground up. Simultaneously, the system is engineered to seamlessly integrate into existing brownfield operations, allowing operators to modernize power management and access stranded capacity without a total facility overhaul.

The Solution: Closing the Gap in AI Power

The new platform acts as a high-speed shock absorber to protect the electrical grid. By pairing sustainable, safe, high-power, extreme-cycle-rated, and fast-acting HSCs with real-time multi-port power routing and software-defined control, the integrated system closes that gap, enhancing or replacing UPS systems.

  • Musashi’s Hybrid SuperCapacitors (HSCs): Unlike standard batteries, HSCs deliver 100x faster recharge speeds and 1,000x longer cycle life. They excel in the high-heat, high-demand environments of AI data centers.
  • DG Matrix’s Interport: This solid-state platform serves as the “brain,” routing power in real time between the supercapacitors, the grid, and the AI servers. It eliminates the need for complex, multi-stage power conversions.

Efficiency and Cost Savings

Early testing shows the system successfully absorbs GPU spikes without disrupting steady-state power. This approach allows data center operators to:

  1. Reduce Battery Size: Smaller battery footprints save space and money.
  2. Protect Generators: Fewer “cycling events” extend the life of backup hardware.
  3. Simplify Architecture: Multi-port AC/DC connectivity supports a wide range of voltages (415V to 1500V).

Musashi’s ESS400 and DG Matrix’s Interport power routing are perfectly matched, creating an integrated platform that supports the rapidly evolving AI data center infrastructure. Both companies are actively pursuing joint system engineering, integration validation, and pilot deployments targeting AI data centers and mission-critical electrical applications.

The companies are currently moving toward pilot deployments for AI data centers and other mission-critical electrical applications.                                          

Ivo expands to London and New York as revenue grows 6x and Fortune 500 adoption surges

Posted in Commentary with tags on March 5, 2026 by itnerd

Contracts sit at the center of every major business relationship, yet most companies still struggle to unlock the insights inside them. Ivo, the market-leading AI-powered contract intelligence platform, has seen demand surge over the past year as in-house legal teams look for faster, more reliable ways to review and extract intelligence from their agreements. Today, the company announced the opening of new offices in London and New York and plans to triple headcount to 180 employees as it accelerates its global expansion.

In the last twelve months, Ivo has increased annual recurring revenue by 600 percent, increased its total customer base by 134 percent, including customers like IBM, Uber, Shopify, Atlassian, Reddit, and Canva, and expanded adoption within the Fortune 500 by 250 percent. The new offices place Ivo at the center of two of the world’s most important legal and commercial markets as enterprise adoption grows.

Ivo’s expansion reflects the company’s long-term commitment to serving global enterprises that operate across jurisdictions, languages, and regulatory environments. The new offices will help the company support its customers more effectively, housing engineering, customer success, and go-to-market teams, and will accelerate product updates for better localization.

Ivo is purpose-built for in-house contracting teams that need both accurate, precise contract review and real-time visibility across their entire agreement portfolio. It enables teams to review contracts 75% faster and surfaces answers to business-critical questions in minutes rather than months. 

The platform is now embedded within the workflows of leading global enterprises. “Uber selected Ivo because it was intuitive to use, demonstrated a high level of accuracy, could work in multiple languages, and met its confidentiality requirements,” Kate Gardner, Senior Manager, Contract Operations at Uber, said. “Furthermore, the Ivo team was highly responsive to Uber’s needs.” 

The next phase of contract AI will be defined by reliability, accuracy, and trust at scale. As organizations increasingly treat contracts as operational infrastructure rather than static documents, Ivo is positioning itself as the solution enterprises rely on to power that shift.

PTaaS Ranked 4x More Effective Than Bug Bounties for Uncovering Complex Vulnerabilities, Cobalt Report Finds

Posted in Commentary with tags on March 5, 2026 by itnerd

Cobalt today released the Cobalt Pentester Profile Report 2026. The findings provide an unfiltered look at the offensive security landscape from a diverse pool of elite practitioners within the Cobalt Core—the company’s vetted community of professional pentesters.

The report highlights a significant gap in testing efficacy: 58% of respondents rank PTaaS as the most effective model for uncovering complex vulnerabilities—nearly four times higher than public bug bounties (15%). Conversely, only 1% of professional pentesters believe AI-only scanning is effective for uncovering high-impact, exploitable vulnerabilities. Human-led testing remains critical, as evidenced by the caliber of the workforce: 54% of surveyed pentesters report having discovered a Zero-Day or N-Day vulnerability that had no existing public patch or advisory.

Additional Findings Include:

  • Overwhelming Preference: 98% of professional testers prefer the PTaaS model over bug bounties, citing a combination of work-life balance, collaborative culture, and the ability to drive higher-impact security outcomes.
  • The Noise Problem: Pentesters report that 30% of all bug bounty submissions are invalid or low-value “noise,” creating a significant administrative burden for security teams and distracting from critical remediation.
  • Career-Critical Discoveries: 65% of the most significant, career-defining vulnerabilities discovered by these professionals were found during structured PTaaS engagements, rather than bounty hunts.
  • The “First-to-File” Frustration: 51% of respondents cite the pressure to be the first to submit a finding as their primary frustration with bug bounty programs, a dynamic that often incentivizes speed over thoroughness.

Together, the data suggests that as security leaders scrutinize return on investment, the structure of the testing model and the supporting technology platform directly influence the depth and actionability of findings. Traditional pentesting and bounty models often operate in silos—lacking shared context, workflow alignment, or integration into remediation systems.

In contrast, a programmatic approach to continuous pentesting transforms security from a series of disconnected events into a continuous cycle of improvement. By providing pentesters with a purpose-built platform and visibility into past findings, PTaaS enables them to bypass known issues and go deeper into complex application logic. This collaborative, real-time environment doesn’t just produce deeper exploit chaining; it ensures that every engagement builds on the last, resulting in validated, trackable risk reduction that translates into measurable security outcomes.

Methodology

The Cobalt Pentester Pulse Report 2026 is based on an anonymous survey conducted by Emerald Research Group of 198 elite offensive security professionals within the Cobalt Core. This group represents a highly specialized workforce encompassing in-house security professionals, full-time security consultants, and self-employed offensive security researchers. To ensure a vendor-agnostic perspective, 50% of respondents currently provide testing services for both pentesting and bug bounty programs, ensuring the data reflects broad practitioner sentiment across the entire security ecosystem.

Flux Voice AI Platform Now Supports On-the-Fly Configuration 

Posted in Commentary with tags on March 4, 2026 by itnerd

Deepgram just announced Flux “on-the-fly configuration” for its voice AI platform which lets developers dynamically update speech recognition settings — such as keyterms and end-of-turn detection — during a live voice conversation without disconnecting or restarting the audio stream.

This matters because now businesses can automate more customer interactions with voice AI without frustrating users, lowering support costs while maintaining a natural, reliable experience.

Employees love it because when voice AI reliably handles repetitive questions and routine tasks, they spend less time on frustrating, high-volume calls and more time on meaningful work, which tends to improve job satisfaction and reduce burnout. What’s more, when routine work is automated, employees often shift toward higher-value roles such as handling complex cases, supervising AI systems, improving workflows, or managing customer outcomes, which can lead to greater responsibility, new skills, and potentially higher pay.

Deepgram just published a blog detailing the new offering — it can be found here: https://deepgram.com/learn/flux-on-the-fly-configuration

Abstract’s ASTRO research team just released blog about critical CISCO vulnerabilities: CVE-2026-20079 and CVE-2026-20131

Posted in Commentary with tags on March 4, 2026 by itnerd

Abstract’s ASTRO research team has just published a blog entitled: Critical Cisco Vulnerabilities: CVE-2026-20079 and CVE-2026-20131 Affecting Cisco Secure Firewall Management Center‍.

Earlier today, Cisco published several security advisories addressing vulnerabilities across its Secure Firewall product line. Two of these are rated critical with a CVSS score of 10.0 and affect Cisco Secure Firewall Management Center (FMC). Both can be exploited remotely by unauthenticated attackers to execute code on an affected device and obtain root access to the underlying operating system. Cisco has released software updates to address these vulnerabilities. Currently there are no workarounds for either vulnerability, making patching the only path to remediation. At the time of publishing, Cisco PSIRT is not aware of any public announcements or malicious use of these vulnerabilities.

This post covers the critical vulnerabilities in detail, along with a summary of additional high-severity issues disclosed in the same advisory bundle. Abstract also offers recommendations for immediate actions to take plus detection and monitoring bullets.