Archive for July 23, 2025

Bell Pure Fibre Ranked Fastest Internet in Canada For The Third Year In A Row

Posted in Commentary with tags on July 23, 2025 by itnerd

Ookla’s Canada Speedtest Connectivity Report (H1 2025) has hit the street along with the accompanying Speedtest Awards.

For the third year in a row, Bell Pure Fibre has been named Canada’s Fastest Internet — a Speedtest Award win based on millions of real-world consumer tests from Q1–Q2 2025. In addition to this award, Bell ranked #1 in the Speedtest Connectivity Report for:

  • Median download and upload speeds
  • 90th percentile performance

Bell’s wireless network also continues to show strong performance, with the Speedtest Connectivity Report reaffirming leadership in key mobile categories across the country.

 Full reports are here:

The data of 100 million Swedish citizens has been exposed

Posted in Commentary with tags on July 23, 2025 by itnerd

The Cybernews research team has uncovered a major data leak exposing over 100 million detailed records tied to Swedish citizens and companies.

An unsecured server exposed a large collection of sensitive business intelligence and personal data, with records spanning 2019 to 2024 across 25 indices — some over 200GB in size.

Analysis suggests the data originated from Risika, a leading Nordic data analytics firm. However, metadata indicates the server was likely operated by an unidentified third-party client, not Risika itself.

What data was leaked?

  • Full legal names, including history of previous names
  • Swedish personal identity numbers
  • Date of birth and gender
  • Address history, both in Sweden and abroad
  • Civil status and information about deceased individuals
  • Foreign addresses for emigrants
  • Debt records, payment remarks, bankruptcy history, property ownership indicators
  • Income tax data spanning several years (2019–2023)
  • Activity and event logs (including income statement submissions, migration status, and address updates)

Significance of this leak

  • These records effectively mapped out a five-year financial and behavioral profile of Swedish citizens and organizations, making the scale and precision of this leak especially concerning.
  • The leaked data offered a detailed, time-stamped snapshot of how both individuals and organizations function, tracking everything from address changes and income shifts to debt, tax filings, and business ties.
  • The sheer volume and precision of the information make the dataset extremely valuable and dangerous. Banks, lenders, and compliance teams could use it for risk assessments and credit analysis. 
  • Attackers could weaponize this intelligence for everything from corporate surveillance and competitor profiling to highly targeted phishing campaigns, social engineering, or extortion. 

To read the full research report, please click here.

Abstract Security Introduces Shift Left for Detection, Turning Real-Time Insight into a Strategic Advantage

Posted in Commentary with tags on July 23, 2025 by itnerd

Abstract Security, the pioneer in streaming detection and response, today unveiled its groundbreaking Shift Left strategy for security operations—bringing real-time analytics, correlation, and response closer to the source of data. Abstract’s new model empowers security operations teams to detect threats in stream, before data hits storage—not after the damage is done. 

Read more about the Shift-Left Detections Approach from Abstract Security: www.abstract.security/blog/shift-left-detections-with-abstract.  

Why Shift Left for Detection Matters 

Instead of analyzing logs hours after an event, Abstract enables security teams to detect and respond in the moment: 

  • Real-time correlation across cloud, endpoint, identity, and SaaS sources 
  • In-stream threat intelligence and asset context 
  • Instantaneous detection logic execution, before data hits the SIEM or data lake 

The result: security operations that are not only faster, but smarter, leaner, and more effective. 

A New Standard for ROI in Detection 

Traditional detection requires pushing massive volumes of telemetry into SIEMs just to run rules—an expensive, delayed, and inflexible process. Abstract changes the economics of detection by running analytics in-stream: 

  • Up to 70% reduction in SIEM ingestion volume 
  • 4x faster detection using ready-to-deploy rules with no custom tuning required 
  • Improved signal-to-noise ratio, enabling faster, more confident responses 

To learn more about how companies like Juul Labs are already transforming their journey with Abstract, visit https://www.abstract.security/abstract-canvas.   

Detection-as-Code, Powered by ASTRO

Abstract’s ASTRO team delivers constantly evolving detection logic and threat intelligence as code—built for real-time execution. ASTRO also treats DFIR as code, enabling live incident investigations, timeline reconstruction, and playbook automation directly in the stream. 

  • No manual queries 
  • No stale enrichments 
  • No delays in response 

DFIR becomes just as fast and automated as detection itself. Learn More about the DFIR-As-Code from Abstract in their blog series here. 

A Shift Worth Making 

Abstract’s Shift Left philosophy offers security teams a chance to modernize without overhauling. You don’t need to rip and replace. You just need to move detection to where the action is—before the threat moves past you. 

EnGenius Multi-Gigabit Switch Delivering 2.5G Performance with 90W PoE++ Announced

Posted in Commentary with tags on July 23, 2025 by itnerd

EnGenius Technologies Inc. has announced the launch of the ECS2530FP, a powerful L2+ Multi-Gigabit switch designed to meet the demands of modern enterprises. The ECS2530FP delivers advanced performance and flexibility, offering multiple management options—locally, via EnGenius Private Cloud, or through the EnGenius Cloud platform—empowering IT teams with complete control across any deployment scenario.

The ECS2530FP delivers unmatched flexibility and power with 24 multi-gigabit 2.5GbE PoE+ & PoE++ ports and 6 dual-speed 10G SFP+ uplinks, offering the bandwidth, speed, and fiber connectivity enterprises need to support high-throughput applications such as Wi-Fi 7 access points, AI surveillance systems, and advanced VoIP deployments.

This new switch is engineered with 16×PoE+ (802.3at) and 8×PoE++ (802.3bt) ports, capable of supplying up to 90W per port, ideal for powering the latest high-demand devices. A generous 740W total PoE budget ensures the ECS2530FP can support dense device environments with ease.

Manage the ECS2530FP from anywhere using the intuitive EnGenius Cloud platform. Features include device provisioning, bulk firmware updates, real-time monitoring, alert notifications, and AI-driven insights, giving IT admins full visibility and control from a single pane of glass.

Key Features & Benefits:

  • Multi-Gig Performance for Enhanced Efficiency

Empowers enterprise networks, ECS2530FP supports multi-gig connectivity, delivering high-speed data transfers, lag-free 4K and 8K video streaming, and optimized performance for daily SMB tasks. Whether supporting remote work, video conferencing, or bandwidth-intensive applications, these switches ensure network efficiency and responsiveness.

  • High-Speed Uplinks for Scalable Networks

The ECS2530FP features 6×10G SFP+ uplink ports that deliver high-capacity fiber connectivity for seamless data aggregation and uplinks to core switches. With dual-speed support for both 1G and 10G SFP modules, these ports provide the flexibility needed for scalable network designs and ensure future-ready performance as bandwidth demands grow

  • Unleashing Maximum Power with PoE++ Support

With 16×PoE+ (802.3at) and 8×PoE++ (802.3bt) ports, the ECS2530FP delivers up to 15.4W, 30W and 90W per port respectively, providing robust power for a wide range of high-demand devices. From Wi-Fi 7 access points and PTZ cameras to video conferencing systems, LED displays, and VoIP phones, this switch eliminates the need for separate power sources—simplifying deployment and supporting even the most power-intensive network environments.

  • Robust Power Budget for Scalable Network Deployments

A high total 740W PoE budget allocation supports dense, multi-device environments with power to spare. Ideal for large-scale deployments in enterprise campuses, hotels, retail stores, schools, and smart buildings.

  • Seamless Performance for Data-Intensive Networks

Ensures ultra-fast packet forwarding with minimal latency, delivering a reliable and seamless experience across all connected devices—even under high-traffic loads and during peak usage times.

Availability

The ECS2530FP will be available from EnGenius authorized resellers and distribution partners by the end of July. For additional product specifications and purchasing information, visit: ECS2530FP Product Page

StarTree Opens the Iceberg Lakehouse to the Outside World

Posted in Commentary with tags on July 23, 2025 by itnerd

StarTree today announced support for Apache Iceberg in StarTree Cloud, enabling it to serve as both the analytic and serving layer on top of Iceberg, delivering interactive insights to internal and external applications directly from the data lakehouse. With this launch, StarTree redefines what’s possible with Iceberg, transforming it from a passive storage format into a real-time backend capable of powering customer-facing applications and AI agents with high concurrency serving thousands of simultaneous users with consistent speed and reliability.

While Apache Iceberg and Parquet have become popular open table formats for managing data in the lakehouse, they are not query engines and most existing query engines built around them struggle to meet the performance SLAs required for external-facing, high-concurrency analytical applications. As a result, companies have historically avoided serving data directly from their lakehouse, instead relying on reverse ETL pipelines or transforming the data into proprietary formats for separate serving systems—adding latency, complexity, and cost. StarTree removes these constraints by offering real-time query acceleration directly on native Iceberg tables. By combining open table formats like Parquet and Iceberg with Pinot’s powerful indexing and high-performance serving capabilities, StarTree enables applications to deliver live, interactive insights directly from the lakehouse without data duplication, format conversion, or operational trade-offs.

A Real-Time Serving Layer for Iceberg

StarTree Cloud integrates directly with Iceberg using open standards (Parquet and Iceberg table formats) and enhances performance with powerful indexing, intelligent materialized views (StarTree Index), and localized caching. Unlike traditional tools like Presto, Trino, or ClickHouse that rely on lazy loading and scanning, StarTree is built for low-latency, high-concurrency access, making it ideal for powering interactive dashboards, real-time data products, and operational workloads with strict SLAs.

Key capabilities include:

●        Native support for Apache Iceberg and Parquet in StarTree Cloud

●        Real-time indexing and aggregations, including support for numerical, text, JSON, and geo indexes

●        Intelligent materialized views via the StarTree Index

●        Local caching and pruning for low-latency, high-concurrency queries

●        No data movement required—serve directly from Iceberg

●        Intelligent prefetching from Iceberg, minimizing irrelevant data scans

With StarTree Cloud, companies can now unlock the full potential of their lakehouse investments and deliver modern, intelligent user experiences without architectural sprawl.

Availability
Support for Apache Iceberg in StarTree Cloud is available today in private preview. For more information, visit www.startree.ai.

Supporting Resources

●      StarTree Adds Native Iceberg Support: Serve High-Concurrency Queries Directly from Your Lakehouse

Experity Launches Care Agent: The First Clinical Intelligence Solution for Urgent Care

Posted in Commentary with tags on July 23, 2025 by itnerd

Experity, today announced the launch of Experity Care Agent, the industry’s first clinical intelligence solution designed to put urgent care consumers in control of their healthcare. Utilizing data, analytics, and AI to redefine how patients interact with clinics, Care Agent facilitates the entire care journey while maintaining each clinic’s unique voice and brand identity.

According to Forrester, healthcare organizations are focused on a top initiative in 2025: Implementing technologies that improve patient experiences, support care virtually, and enable clinic decision-making for personalized medicine. Experity Care Agent is the only solution on the market that solves for each of these operational needs as a standalone product.

Experity Care Agent goes far beyond generic healthcare chatbots. With a dual-channel communication approach, it functions using mobile messaging (SMS/RCS) for smart registration, and secure web chat for all substantive interactions including triage assessments, discharge notes, payment collections, and care reminders. This proprietary architecture invented by Experity is HIPAA compliant.

As an emerging leader in urgent care clinical intelligence, these are the top reasons why urgent cares benefit from using Experity Care Agent:

  • Intelligent skills architecture: Modular capabilities span pre-visit preparation, real-time
    assistance, and post-visit follow-up that can be customized to each clinics’ specific
    needs
  • White-labeled brand experience: Patients interact with their clinic’s brand and voice, not a third-party platform
  • Clinical integration: Deep integration with EMR and practice management systems ensures continuity of care information
  • Compliance-first design: HIPAA-compliant dual-channel approach uses mobile messaging for notifications and secure web chat for PHI-related interactions

Experity Care Agent has launched with core skills including digital discharge document delivery and lab results communication, with additional dynamic capabilities planned throughout 2025 and 2026. The platform’s marketplace model allows clinics to select and activate skills that align with their specific operational needs and growth strategies.

In addition to its Care Agent, Experity announced its AI-driven Partner Ecosystem earlier this
year and is on pace to release AI Insurance Matching and AI Scribe before year end. With the
goal of expanding urgent care staff impact, Experity believes AI is the force multiplier behind
every administrator, provider, and employee who can now focus on the real human connections
that heal people.

US Department of Education Credential Phishing Campaign Threat Advisory Issued By BforeAI

Posted in Commentary with tags on July 23, 2025 by itnerd

BforeAI has published a new threat advisory in which the U.S. Department of Education is being targeted through a credential phishing campaign via government impersonation. 

A phishing campaign is currently targeting the U.S. Department of Education’s G5 grant portal, which is used for managing grants and federal education funding. 

Multiple lookalike domains have been observed spoofing the G5 login page in an attempt to harvest login credentials from legitimate users.

These domains attempt to clone or imitate the official G5.gov interface and may be targeting education professionals, grant administrators, or vendors tied to the U.S. Department of Education. 

This activity is particularly alarming given the recent Trump Administration announcement of 1,400 layoffs at the Department of Education, which may create confusion and an opportunity for social engineering.

The advisory can be found here.

Fortra Releases New AI Models, Threat Hunting, and Intelligence Features for Cloud Email Protection

Posted in Commentary with tags on July 23, 2025 by itnerd

Fortra today announced the release of new AI-driven features, enhanced threat hunting capabilities, and deeper intelligence integrations within its Cloud Email Protection (CEP) service—part of the company’s Integrated Cloud Email Security (ICES) solution. These new features improve the detection of sophisticated social engineering attacks that frequently evade traditional defenses. In May alone, these updates disrupted more than 87,000 additional email threats.

Fortra CEP combines artificial intelligence, global threat intelligence, and automated remediation to protect against advanced email threats. The latest release introduces several key AI enhancements:

  • AI Body Content Analysis: Uses a large language model (LLM) optimized for high-throughput message analysis to classify the intent of email body content.
  • AI Campaign Detection: Identifies low-content threats—such as invoice or payment scams—by recognizing shared characteristics across messages sent to multiple recipients.
  • AI Suspicious URL Detection: Analyzes the structural features of URLs in email messages, including embedded redirect links that lead to malicious sites.
  • AI Overall Risk Scoring: Analyzes outputs from all AI models in aggregate to detect targeted attacks that may not be convicted by any single detection method.

This release also strengthens integration between CEP and Fortra Suspicious Email Analysis (SEA), which evaluates user-reported email threats. Previously, CEP integrated indicators sourced by SEA to automatically purge and block email threats. Now, CEP can perform this automated mitigation using email subject and sender combinations, which addresses response-based threats that lack high-fidelity indicators.

In addition, this update introduces several enhancements to the CEP interface, improving search, investigation, and policy workflow tools. These upgrades empower security teams to conduct faster, more effective threat hunting and response.

FBI And CISA Issue Warning About Interlock Ransomware Gang

Posted in Commentary with tags , on July 23, 2025 by itnerd

The CISA and the FBI warned of escalating Interlock ransomware attacks targeting various businesses and critical infrastructure organizations through a double extortion model whereby actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked.

You can find the warning here: https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a

Erich Kron, security awareness advocate at KnowBe4, commented:

“While a fairly new ransomware group, Interlock is working to make a name for themselves. Their use of compromised websites for drive-by malware downloads is not very common in the world of ransomware, but their use of social engineering certainly is. Convincing people to install updates or fixes, really just disguised malware, in ClickFix attacks and is not a new concept as fake updates or antivirus notifications have been around for years.

To counter the threat, organizations need to ensure their employees are aware of the campaigns and are taught to spot them, and that they are aware of the real and legitimate process the organization’s I.T. department uses to install patches or updates so they are not tricked into executing malware. A comprehensive Human Risk Management program is vital when dealing with human-centric attacks such as this, as is a good endpoint protection platform. Patching machines, browsers, and other software can help limit the ability for malware to launch and for bad actors to move around the network or elevate permissions as well.”

Interlock may be new, but they are causing quite the sensation. Likely because they have a track record of success if you want to call it that. You don’t want to be part of their success which means that you need to do everything you can to make sure that you’re not Interlock’s next victim.