Critical RCE in Hugging Face’s LeRobot

Posted in Commentary with tags on April 28, 2026 by itnerd

Researchers disclosed a critical remote code execution flaw (CVE-2026-25874, CVSS 9.3) in Hugging Face’s open-source robotics platform LeRobot, caused by unsafe deserialization through Python’s pickle format. The issue allows an unauthenticated attacker to send malicious payloads over unsecured gRPC channels and execute arbitrary code on both the policy server and connected robot clients.

You can read more here: https://github.com/advisories/GHSA-f7vj-73pm-m822

Eli Woodward, Cyber Threat Intelligence Advisor, Team Cymru has provided this comment:

     “The bigger issue here is that AI infrastructure is increasingly becoming part of the external attack surface, often without the same visibility defenders have for traditional enterprise systems. Services like this can expose privileged environments that connect directly to valuable internal resources, making them attractive entry points for both financially motivated actors and more advanced threat groups. Once an attacker gains access, the challenge becomes understanding what else that infrastructure is connected to and how quickly they can pivot. External visibility and context become critical because many of these risks originate well beyond the traditional network perimeter. This is also an interesting case where even ‘physical safety’ becomes part of the risk model. While we’ve certainly seen that before in medical devices, the implementation of AI into robotics can create a whole new level of risk we haven’t seen before.”

This is a today problem. Especially since there is no fix at present. Not good in my opinion.

Check Point Software Launches Canada Data Residency for SASE

Posted in Commentary with tags on April 28, 2026 by itnerd

Check Point today announced the availability of Canada data residency for Check Point SASE, enabling Canadian organizations to process and store key SASE security data within Canada.

This expansion follows the recent launch of Check Point WAF and further reinforces Check Point’s commitment to the Canadian market. By enabling Canada data residency for Check Point SASE, organizations gain greater control over where sensitive network and security telemetry is processed, helping organizations support their compliance efforts with Canadian privacy and data residency requirements without compromising enterprise-grade security capabilities. Key SASE data, including traffic inspection and session data, security event logs, metadata, and tenant configuration,[HK1] [IP2] [IP3]  is processed and stored within Canada, giving security, IT, and compliance teams greater transparency when addressing regulatory or audit requirements around data location.

Check Point SASE’s Canada data residency capability is designed to support organizations’ compliance efforts by helping ensure that critical network and security telemetry remains within Canada.[HK4] [IP5] [HK6]  Other key benefits include:

  • Processing and storage of key SASE data within Canada, including traffic inspection, session data, logs, metadata, and configuration[HK7] [IP8] [IP9] 
  • Support for Canadian privacy and data residency requirements without reducing security capabilities
  • Full access to the complete Check Point SASE platform, including Private Access (ZTNA), Internet Access (Secure Web Gateway), and SaaS Security (CASB)
  • Local data handling combined with global scale, backed by Check Point’s worldwide backbone and high-availability architecture

Canada joins the United States, European Union, India, and Australia as a fully supported data residency region for Check Point SASE, reflecting the company’s continued investment in regionally aligned security architectures that meet customers where their regulatory requirements are. Check Point SASE support teams operate globally, and customer information is handled solely as required to support service delivery

Availability

Check Point SASE Canada data residency is generally available to new customers immediately. Existing customers requiring Canada data residency should contact their Check Point representative to discuss onboarding options.

156 deepfakes targeted U.S. officials in the past two years: Cybernews

Posted in Commentary with tags on April 28, 2026 by itnerd

New research by Cybernews reveals that there have been 156 deepfake incidents targeting currently-serving U.S. officials in the past two years. Most of them are of Donald Trump. The research analyzed deepfakes of the President, Vice President, Cabinet members, governors, and Congress members.

Here are the key findings:

  • 23 out of 602 currently-serving U.S. officials were targeted at least once during the analyzed period.
  • In the past two years, there have been 156 deepfake instances of currently serving U.S. government officials. President Donald Trump alone accounts for 90 of the 156 instances recorded, or 58% of all deepfake incidents in the dataset.
  • The next most targeted figures are Marco Rubio (13 instances) and JD Vance (12 instances). Together, the top three account for 115 out of 156 instances, or 73.7% of all recorded cases.
  • 76% of deepfakes targeted Republicans – but without Trump, the distribution is more balanced.
  • The most-deepfaked democrat is Alexandria Ocasio-Cortez with 9 instances recorded.
  • The likelihood of being targeted by deepfakes drops sharply in larger groups, such as the House and Senate, where individual members are less visible and less recognized by the media.

For more information and visuals, here’s the full report: https://cybernews.com/ai-news/most-deepfaked-us-government-officials

Canada’s fragmented health records – could AI help connect them?

Posted in Commentary with tags on April 28, 2026 by itnerd

Canada’s healthcare system is still struggling with a basic challenge: patient information doesn’t always move easily between providers.

According to insights referenced in TELUS Health’s new Agentic AI discussion paper71% of physicians say interoperability across data and records would significantly reduce administrative burden. Yet many electronic medical record systems still function primarily as digital filing cabinets – storing information rather than helping care teams coordinate it.

The paper explores how AI-powered EMRs could help bridge that gap. By connecting data across providers, pharmacies, virtual care platforms, and health authorities, AI tools can help clinicians track longitudinal patient information, surface relevant insights, and coordinate care more effectively across settings.

For clinicians managing hundreds or even thousands of patients, that kind of system support can be critical – helping identify care gaps, monitor trends, and reduce the manual work required to piece together fragmented patient histories.

The discussion paper also examines how these systems can operate within Canada’s strict healthcare privacy frameworks. Solutions are designed to work within regulated environments governed by legislation such as PHIPA and PIPEDA, while supporting secure collaboration across care teams.

You can read the discussion paper here:

EN: https://go.telushealth.com/hubfs/whitepapers/telus-health-agentic-ai-discussion-paper-en.pdf
FR: https://go.telushealth.com/hubfs/whitepapers/telus-health-agentic-ai-discussion-paper-fr.pdf

Park Place Technologies Partners with Professional Athlete Genie Bouchard as “Genie from IT” in New TV Commercial

Posted in Commentary with tags on April 28, 2026 by itnerd

Park Place Technologies is serving up a fresh take on B2B brand storytelling by partnering with professional pickleball star Genie Bouchard for a new TV and streaming commercial and social media series themed around the “Genie from IT.” 

In the 30-second spot, Bouchard in her first TV commercial, steps into the role of the “Genie from IT,” a playful yet powerful representation of how Park Place helps customers eliminate complexity, respond quickly when issues arise and keep critical systems running smoothly. Just as a genie grants wishes, Park Place removes friction from IT operations so organizations can focus on what matters most.

The spot will begin to stream online this week (April 27) and in all PPA Tour and MLP coverage, such as Pickleball TV, Fox Sports 1 and 2, ESPN 1 and 2 and CBS and then will air on CBS-TV during the May 2 Atlanta Pickleball Championships. Beyond the screen, Bouchard, who will compete in this summer’s Wimbledon’s Legends, will represent Park Place both on and off the court, sporting the company’s logo during competitions and connecting directly with customers through hands-on experiences such as Play-with-a-Pro clinics.

Unpatched Windows ‘PhantomRPC’ Flaw Allows Privilege Escalation

Posted in Commentary with tags on April 27, 2026 by itnerd

Researchers have published new findings PhantomRPC: A new privilege escalation technique in Windows RPC on April 24th about a  has no patch as it is said to be an architecture problem, and affects all Windows systems.

In response, three cybersecurity experts offer perspective.

Sameed Aijas Ahmed Khan with Dubai-based Secure.com:

“PhantomRPC is a meaningful finding because it sits at the architectural level of Windows, not in an isolated feature that can simply be switched off or patched. What makes it particularly relevant for organizations is the lateral movement risk. 

Once an attacker has a foothold, a flaw in how Windows systems communicate internally can become a pathway across the broader environment and that kind of silent spread is exactly what makes unpatched vulnerabilities so costly over time. We’ve written about how the Dell zero-day campaign went undetected for over 400 days precisely because the initial entry point wasn’t caught in time.

Architectural changes are genuinely complex, and caution is understandable. But as we’ve covered in looking at the Microsoft Word zero-day earlier this year, the window between disclosure and active exploitation tends to be short and organizations are left managing that risk largely on their own.

When remediation isn’t immediately available, mitigation becomes the working strategy. That means network segmentation to limit unnecessary exposure, tightening access controls around privileged accounts, and increasing monitoring for anomalous behavior in affected systems. As we note in our coverage of vulnerability remediation vs. mitigation, a mitigated vulnerability is still present so the goal is to reduce the blast radius while staying alert to how the situation evolves.”

Jacob Krell, Senior Director, Secure AI Solutions and Cybersecurity, Suzu Labs:

PhantomRPC can turn a lower-privileged service compromise into SYSTEM-level control. For an organization, that means a normal foothold can become full host compromise. From there, an attacker may be able to access sensitive credentials, tamper with security tooling, establish persistence, and use the machine as a staging point for lateral movement. The important point is that this is not just a single bad component. Kaspersky’s research points to a broader weakness in how Windows RPC handles server provenance, which means new abuse paths may continue to appear as researchers and attackers find additional privileged RPC clients.

Microsoft’s decision not to issue a patch makes sense only within a narrow vulnerability-triage model. The issue typically requires SeImpersonatePrivilege, and Microsoft appears to have treated that prerequisite as a limiting factor. The problem is that SeImpersonatePrivilege has been central to Windows privilege escalation research for years. It is not rare, exotic, or purely theoretical. Many real-world compromises already land in service contexts where impersonation privileges are available by design.

That is especially important because service accounts are often one of the first positions an attacker obtains after exploiting a web-facing application or local service. From an attacker’s perspective, the question after that initial foothold is simple: how do I become SYSTEM? PhantomRPC provides one answer by abusing the trust relationship between privileged RPC clients, expected endpoints, and impersonation. That makes the prerequisite less reassuring than it may appear on paper.

Microsoft should remediate the underlying architectural weakness, or at minimum provide stronger platform-level safeguards around RPC endpoint authenticity and privileged impersonation flows. The lesson from the Potato family was that broad impersonation rights can turn service-level access into SYSTEM. PhantomRPC shows that lesson still applies, just through a different IPC path. A flaw that repeatedly converts common service compromise into full host control should not be dismissed simply because the dangerous privilege was granted by design.

To protect themselves, organizations should focus on detection, hardening, and reducing unnecessary impersonation exposure. Kaspersky’s recommended approach is ETW-based monitoring for RPC activity where high-privileged clients attempt to connect to unavailable servers, especially when those calls use elevated impersonation levels. Those failures can indicate places where a malicious RPC server could be inserted.

They should also review which custom and third-party services hold SeImpersonatePrivilege and remove it where it is not strictly required. Where possible, legitimate services should be configured so expected RPC endpoints are actually registered, reducing the opportunity for an attacker to occupy the missing endpoint first. This is not a complete fix, but it reduces the attack surface and gives defenders observable signals.

PhantomRPC should be viewed in the same lineage as the Potato family of Windows privilege escalation techniques. Those exploits showed years ago that service accounts with SeImpersonatePrivilege can become a dangerous bridge to SYSTEM when Windows allows a lower-privileged process to impersonate a higher-privileged caller. PhantomRPC matters because it shows that the underlying design issue was never fully eliminated. The abuse path has moved from familiar COM-based techniques into the RPC layer itself.

That is why treating SeImpersonatePrivilege as a simple prerequisite misses the larger point. The privilege is widely granted to service identities because Windows services need impersonation for legitimate functionality. In practice, that makes it part of the operating system’s architectural attack surface, not an unusual edge condition. If a common service context can register the right endpoint, wait for a privileged client, and inherit its authority, the weakness is in the trust model around impersonation and endpoint provenance.

This is also unlikely to be the last route researchers find. Once the pattern is understood, the question becomes how many other privileged Windows clients connect to expected IPC endpoints without strong enough assurance about who is actually listening. Security teams should treat PhantomRPC less like a one-off vulnerability and more like a signal that Windows IPC and impersonation flows need sustained monitoring, hardening, and architectural attention.

Xcape, Inc. board member Damon Small:

Microsoft’s decision not to patch is technically defensible under their traditional servicing criteria – since the attacker already needs SeImpersonatePrivilege – but it is operationally negligent in a landscape where attackers frequently use compromised service accounts as a beachhead. This “Moderate” rating ignores how easily these prerequisites are met during real-world lateral movement. Since no patch is forthcoming, defenders must treat this as a permanent architectural debt. To be clear, it is not so much that Microsoft decided not to patch, but at this time it appears that it cannot be patched without fundamentally changing how RPC functions.

The most effective mitigation organizations should invoke is to restrict SeImpersonatePrivilege to the absolute minimum number of accounts and utilize Host Intrusion Prevention Systems (HIPS) or EDR rules to monitor for unauthorized processes attempting to bind to known RPC ports, particularly those associated with the Terminal Services port range.

This was reported to Microsoft on September 25, 2025. Microsoft assessed this as a moderate severity, not eligible for a bug bounty, and not in need of a CVE or immediate fix at the time. Because of the fundamental, architectural, nature of this vulnerability, we should expect to see variants on this attack pattern emerge in the future. Defenders should keep an eye on service accounts exhibiting anomalous behavior, such as spawning arbitrary listeners. This publication at this time is indicative of a pattern where Microsoft has downplayed an external researcher’s finding because resolving the underlying issue is a deep architectural change. It is a bold strategy for Microsoft to claim a flaw is not a bug simply because you have to be halfway into the house before you can use it to unlock the safe.

I strongly recommend that you read this report and consider this to be a “today” problem because there is no fix. Which means that it’s only a matter of time for threat actors exploit this if they have not already.

Microsoft’s Outlook.com Email Seems To Be Having Issues

Posted in Commentary with tags on April 27, 2026 by itnerd

I have received two calls today about people having issues with Outlook.com email accounts (which can be also hotmail.com). Here’s what they are reporting:

  • Outlook on iPhone is making users sign in.
  • You go through the steps to sign in and you still get a prompt to sign in.
  • Removing and re-adding the account does not fix this. Mi

I’ve been able to replicate this myself.

This issue seems to be widespread based on Down Detector which has similar reports of this issue. Microsoft’s Service Status page as well as on Twitter confirm this as well:

Thus it is safe to say that Microsoft has an issue that it is trying to wrap its hands around. There does not appear to be an ETA to resolution. Thus users of Outlook.com will have to wait it out until Microsoft fixes this.

TELUS Friendly Future Foundation Gala returns with headliner Lionel Richie

Posted in Commentary with tags on April 27, 2026 by itnerd

The TELUS Friendly Future Foundation announced its third annual gala will take place on June 18, 2026 at the iconic TELUS Centre for Performance and Learning in Toronto. As young Canadians face increasing challenges ranging from mental health concerns to employment barriers and financial hardship, the gala brings together Canada’s business, philanthropic, technology, and cultural leaders to raise funds to address these urgent issues. Since its inception, the TELUS Friendly Future Foundation, with the support of the 13 Canadian TELUS Community Boards, has provided $137 million to support youth across Canada. In 2025 alone, the Foundation exceeded $10 million in impact through grants that fuel critical youth-focused health and education programs and student bursaries that empower the next generation of changemakers to pursue their post-secondary dreams.

All funds raised from the gala directly support the TELUS Friendly Future Foundation’s mission to help youth reach their full potential through two vital programs:

  • The TELUS Student Bursary awards up to $5,000 annually to more than 500 deserving post-secondary students facing financial barriers and committed to giving back to their communities. Beyond financial aid, recipients gain access to comprehensive wraparound support including free or heavily discounted TELUS Mobility and Internet for Good plans, mental health services through TELUS Health and professional development opportunities. Since launching in 2023, the program has supported 2,000 students, with more than 50 per cent of all recipients being the first in their families to pursue higher education. 
  • TELUS Community Board Grants, which help fund critical, youth-serving charitable programs. The Foundation and its 13 Canadian TELUS Community Boards provide $6 million in grants annually to more than 500 local charities across the country. These grants support innovative, technology-enabled health and education programs that help millions of youth develop critical skills, confidence, and a deep sense of belonging in their communities.

The Together for Tomorrow Gala has become Canada’s premier philanthropic event dedicated to youth empowerment. Building on the success of the first two galas – which raised over $5 million – this year’s event, hosted by television personality Cheryl Hickey, promises an extraordinary evening of entertainment and impact. The night will culminate with an exclusive, one-night-only headline performance by four-time Grammy award winner Lionel Richie. Following the gala, guests are invited to continue the celebration at the afterparty with DJ Jake Wahlberg. A live auction will offer exclusive experiences and opportunities, giving guests the chance to bid on unique items while directly supporting the Foundation’s mission.

The Foundation would like to express a special thanks to TELUS, its many sponsors, donors and volunteers who help make this remarkable event possible.

For more information about the TELUS Friendly Future Foundation Gala, please visit friendlyfuture.com/gala. To learn more about gala sponsorship and attendance, please email info@friendlyfuture.com

KAYAK Launches Ask AI

Posted in Commentary with tags on April 24, 2026 by itnerd

KAYAK today introduced Ask AI, a new conversational travel planning experience designed to help travellers search, compare, and book trips more easily, as interest surges ahead of this summer’s World Cup.

Building on KAYAK’s mission to make travel search more personalized and conversational, Ask AI is an industry first that lets travellers start planning their trip in a chat—while flight, hotel and rental car results update live alongside the conversation, combining the ease of AI with the power of a traditional results page.

Launching just as travel interest ramps up around the World Cup, Ask AI arrives at a time when travelers are planning more complex, multi-city trips. KAYAK data already shows a 12 per cent increase in flight searches to Canadian host cities, including Toronto seeing a 19 per cent increase and Vancouver seeing a 5 per cent increase compared to last summer, with prices and availability expected to shift quickly in the months ahead.

Plan Your Trip with Ask AI
Whether you’re travelling to one match or several, Ask AI helps you move from inspiration to booking in one continuous experience. Search for hotels near a stadium, compare flights between host cities, or build your full itinerary—all without switching tabs.

With Ask AI, travellers can:

  • Ask questions using natural language and refine their trip in real time
  • Chat while results update live alongside the conversation
  • See up-to-date prices and bookable options from hundreds of travel partners

No restarting searches or juggling tabs—just a faster, more intuitive way to plan and book travel.

Tracking World Cup Travel Trends in Real Time

KAYAK is also launching a new dashboard to track how fans are planning trips around the World Cup. Powered by KAYAK’s search and pricing data, it highlights rising travel interest, shifting prices, and the destinations seeing the biggest spikes in interest.

Early trends show:

  • Toronto is emerging as Canada’s top host city, with flight searches up 19 per cent year-over-year outpacing Vancouver’s 5 per cent increase 
  • Hotel prices are climbing across all host markets: up 55 per cent in Canada, 36 per cent in the U.S., and 119 per cent in Mexico
  • Outside of U.S. and Canada interest, Germany and the UK are the regions searching most for travel to Toronto and Vancouver. 

Together, Ask AI and the World Cup Trends Dashboard help travelers plan and compare trips with real-time data, making it easier to make informed decisions as prices and interest change.

Methodology 

Based on flight and hotel searches made on KAYAK in the period between 12.5.2025 and 4.12.2026 for travel between 6.10.2026 and 7.20.2026. They were compared to searches made in the period between 12.5.2024 and 4.12.2025 with the travel period between 6.10.2025 and 7.20.2025. Percentages for changes in searches and pricing are approximate. 

Unit 42 Research: Fully Autonomous AI Attacks Closer Than Ever

Posted in Commentary with tags on April 23, 2026 by itnerd

Palo Alto Networks has shared new research regarding how effective autonomous AI offensive capabilities are against cloud environments. While Unit 42 did not use frontier AI models in testing, this research is a crucial look at how powerful AI models may ultimately be weaponized in cyberspace.

Building on the November 2025 Anthropic disclosure that showed AI acting as the operator in an espionage campaign, Unit 42 answers the question: Can AI systems operate autonomously end-to-end to attack cloud environments, or do they still require human guidance?

Unit 42’s research & findings include:

  • Unit 42 created “Zealot,” a multi-agent penetration testing proof-of-concept designed to see if AI could independently take down a hardened cloud environment without any human oversight.
  • In sandboxed GCP tests, the multi-agent system autonomously executed a full attack chain, including: Server-Side Request Forgery (SSRF) exploitation, Metadata service credential theft, service account impersonation and privilege escalation and BigQuery data exfiltration.
  • AI-driven attacks have reached functional maturity and current LLMs can chain attacks with minimal human guidance. The window between initial access and data loss is shrinking as tools like Zealot leverage misconfigurations faster and more consistently than a human attacker. 
  • However, creating a purely autonomous multi-agent cyber attack was not entirely possible (manual oversight was needed to prevent the AI from irrelevant rabbit-holing).
  • Current security detection models optimized for human attack patterns will struggle to catch agent-based operations that chain actions across services in seconds.

You can read the research here: https://unit42.paloaltonetworks.com/autonomous-ai-cloud-attacks/