Archive for January 22, 2026

Celebrate connection this Valentine’s Day with Samsung Galaxy

Posted in Commentary with tags on January 22, 2026 by itnerd

Valentine’s Day is more than one moment; it’s the connections that shape everyday life. From late-night calls to shared playlists and weekend adventures, Samsung Galaxy devices are designed to help people stay connected, capture memories and keep life in sync long after February 14.

Whether your readers are shopping early for a partner or looking for something they can enjoy with their Galantines, here are some Valentine’s Day gift ideas from Samsung for everyone: 

  • For the Everyday Love Story: Galaxy S25 FE 
    The Galaxy S25 FE makes it easy to capture and share everyday moments. With Galaxy AI features like Circle to Search and intuitive photo editing, it helps partners stay organized, connected and present, all in a sleek, thoughtfully designed device. 
  • For Shared Wellness Goals: Galaxy Watch8 Series and Galaxy Ring 
    The Galaxy Watch8 Series and Galaxy Ring support healthier routines built together, with advanced sleep tracking, wellness insights and fitness monitoring. They’re meaningful gifts for couples or friends prioritizing well-being.. 
  • For Shared Soundtracks: Galaxy Buds3 Series 
    From favourite playlists to workouts and travel, the Galaxy Buds3 Series delivers immersive sound with active noise cancelling and seamless Galaxy connectivity. Features like Live Translate and Interpreter add extra value for those on the go. 
  • For Cozy Nights In: Galaxy Tab A11+ and Galaxy Tab S11 
    The Galaxy Tab A11+ and Galaxy Tab S11 are ideal for winding down together. With large displays and Galaxy AI tools like Circle to Search, they’re perfect for streaming, planning trips, browsing or getting creative at home. 
  • For the Productivity-Focused Person: Galaxy Z Fold7 and Galaxy Book4 Edge 
    Perfect for couples and friends who create and collaborate, the Galaxy Z Fold7 and Galaxy Book4 Edge combine power and flexibility. The Z Fold7’s expansive screen, Galaxy AI multitasking tools and Samsung DeX mode keep you productive anywhere, while the Galaxy Book4 Edge delivers AI-driven performance for work, streaming and planning together at home or on the go. 

All products are available for purchase at Samsung.com/ca.

Model Link Price 
Galaxy Buds3 Buds3 Lifestyle Image $179 → $149 CAD 
Galaxy Buds3 Pro Buds3 Pro Lifestyle Image $249 → $179 CAD 
Galaxy Buds3 FE Buds3 FE Lifestyle Image $149 CAD 
Galaxy Watch8 Watch8 Product Image $499 CAD 
Galaxy Watch8 Classic Watch8 Classic Product Image $699 CAD 
Galaxy S25 FE S25 FE Product Image $999.9 CAD 
Galaxy Z Fold7 Galaxy Z Fold7 Product Image $2499.99 CAD 
Galaxy Tab A11+ Galaxy Tab A11+ Product Image $449.99 CAD 
Galaxy Tab S11 Galaxy Tab S11 Product Image $1,349.99 CAD 
Galaxy Book4 Edge Galaxy Book4 Edge Product Image $999.99 CAD 
Samsung Galaxy Ring Ring Product Image $549.99 CAD 

New Research: The evolution of online casino spam

Posted in Commentary with tags on January 22, 2026 by itnerd

Today, Forcepoint’s X-Labs Threat Research team released a new blog highlighting a central topic: “Online Casino Spam: How Fake Gambling Sites Steal Financial Data.”

The research uncovers a new type of online casino scam gaining prominence in Vietnam, Thailand, Indonesia and Turkey. It outlines the tactics spammers are using, how the scam is carried out, tips for identifying legitimate activity and a statement on how Forcepoint customers are protected.

A few quick takeaways that may be helpful for anything you are working on tied to this emerging topic:

  • Deceptive lures: Use of high-reputation domains and legitimate cloud services to bypass email filters.
  • Data harvesting: Stealing personal info and credit card details via fake registration forms.
  • Multi-stage scams: Casino hooks frequently lead to fraudulent investment schemes or “pig butchering” scams.
  • Infrastructure sharing: Attackers use the same backend servers for various types of financial fraud.
  • Dynamic redirection: Links use geo-targeting to show victims localized scams based on their IP address.
  • Evasion tactics: Use of URL shorteners and HTML smuggling to hide malicious destinations from security tools.
  • Lead generation: Active users are logged and sold to other cybercriminal groups for future targeting.

The piece is available at:https://www.forcepoint.com/blog/x-labs/online-casino-spam-financial-scams.

Sage partners with Augusta Labs to accelerate the build out of its AI Center of Excellence

Posted in Commentary with tags on January 22, 2026 by itnerd

 Sage today announced a global partnership with Augusta Labs, the applied AI lab that helps enterprises build and scale AI transformation. The partnership accelerates the development and delivery of Sage’s AI Center of Excellence by embedding Augusta Labs’ applied AI engineering teams directly into Sage’s product organization. This expands Sage’s AI and data engineering capacity and strengthens its shift toward becoming an AI first company. 

Businesses now expect more from the software they rely on, including faster insights, smarter automation, and experiences that feel effortless. Delivering that level of performance depends on how quickly AI can be designed, engineered, and deployed into real workflows. McKinsey’s latest The State of AI report notes that companies capturing the most value from AI are those able to move from experimentation to production at speed and scale intelligence across their products.
 
To meet this rising expectation and push its own high-performance goals, Sage is growing its applied AI engineering capacity through its new partnership with Augusta Labs. With Augusta Labs’ multidisciplinary teams working directly inside Sage’s product organization, Sage can build and deploy production ready intelligence faster, deepen automation across its solutions, and bring the benefits of AI to customers at a pace that matches how businesses operate today. 

Scaling Applied AI Across Sage’s Global Product Ecosystem

Through this partnership, Augusta Labs’ multidisciplinary teams are working directly on key global workstreams including Sage Payroll, Sage Active, and Sage 300. Operating as an extension of Sage’s internal engineering organization, these teams help deliver:

  • Agentic workflows that automate end-to-end tasks
  • High-performance data pipelines for real-time insight
  • Production-ready AI features delivered at pace

By working in Portugal’s thriving startup ecosystem, these teams bring a level of agility and high-velocity engineering that strengthens Sage’s global AI delivery model. This helps Sage develop and deploy agentic and applied-AI capabilities at a pace rarely matched in the industry, while maintaining the reliability and governance expected by millions of customers. The result is faster iteration, quicker movement from prototype to production, and real value delivered to businesses far sooner than traditional development models allow.

This integrated execution model ensures AI is built consistently across Sage’s portfolio, aligned with the Sage Platform, and embedded where customers work every day. It brings startup-level velocity to Sage’s product delivery, while maintaining the scale, reliability and governance expected by customers and partners.

To find out more about visit Sage Ai.

Hackers Exploit Training Apps to Breach Fortune 500 Firms

Posted in Commentary with tags on January 22, 2026 by itnerd

Hackers are exploiting securing training applications, including open-source projects such as OWASP Juice Shop, DVWA, and Hackazon, to breach the customer managed cloud environments of Fortune 500 companies and security vendors.

More details can be found here: https://pentera.io/press-release/cloud-training-environments-exploited-crypto-miners/

Martin Jartelius, AI Product Director at Outpost24, provided the following comments:

“In security, it is important to refrain from victim blaming. However, when something is designed to be inherently unsafe, deployed as-is, and exposed directly to the internet, it is not even hacking in the traditional sense. Someone simply built a scanner to look for these applications, just as they do for regularly vulnerable ones, and deployed crypto miners.

What can we deduce from this? Attackers go where the value is—and today, that value is primarily in data. When attackers instead revert to deploying miners, it suggests that these systems sit in isolated networks of little value, most likely test beds for tools or teams. Embarrassing, annoying, and somewhat costly—but, even against my own principle of not blaming the victim, this should not come as a surprise to whoever put it there when it happens.”

This illustrates how quickly the bad guys can pivot in terms of finding new and creative ways to pwn their victims. Which means defenders need to find new and creative ways to match those pivots in order to not get pwned.

Car hacking experiment: what can the world’s best hackers do with today’s supercar?

Posted in Commentary with tags on January 22, 2026 by itnerd

Cybernews has released an eye-opening experiment in which security researcher Sam Curry and automotive hacker BusesCanFly demonstrate how easy it is for cybercriminals to take control of any car. Not only are personal vehicles in danger, but ambulances, police cars, and large commercial fleets, with implications that could possibly cause life-threatening harm. 

Modern cars are no longer just machines. They’re more like computers on wheels, and the video shows how easy it is to use a custom-built app to track and unlock vehicles with minimal data, even remotely.

Car data reveals routes, relationships, and allows vehicle hijacking 

According to Curry, alongside improving overall connectivity, the risk of exploiting vulnerabilities grows, including easily accessible personal information, not only from the vehicles, but hacking the car dealerships themselves. 

The documentary shows that with just a VIN (Vehicle Identification Number), it is possible to remotely track where a vehicle was driving and where it is going now. And this can be utilized beyond personal reseasons, reaching political intimidation. 

You can find more information here or see the released video below:

New LLM Runtime Phishing Exploit – Proof of Concept from Unit 42

Posted in Commentary with tags on January 22, 2026 by itnerd

 Unit 42 has published research that raises flags on what could be the next big shift in cybercriminals leveraging LLMs for more effective phishing attacks and the next frontier of web attacks. 

Unit 42’s latest research, The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time, details a novel technique where attackers could use LLMs to assemble phishing attacks in the browser at the moment of execution.

Why this is a game-changer for attackers:

  • Prompt-Based Obfuscation: Malicious code is hidden within text prompts to bypass network analysis, only “translating” into an attack once it reaches the browser.
  • Unique Victim Payloads: The LLM generates a unique, polymorphic variant for every individual victim, making static signatures and blocklists useless.
  • Trusted Domain Delivery: Malicious code is transmitted over legitimate LLM service domains, allowing malicious traffic to blend in with trusted API calls.
  • Bypassing Guardrails: Attackers can “jailbreak” LLM APIs to deliver malicious snippets under the guise of legitimate code.

The most effective defense against this new class of threat is runtime behavioral analysis that can detect and block malicious activity at the point of execution, directly within the browser. 

Read the blog for more details: http://unit42.paloaltonetworks.com/real-time-malicious-javascript-through-llms

Google alums raise $5M pre-seed for Sparkli: The First Multimodal AI-Native Learning Engine for children

Posted in Commentary with tags on January 22, 2026 by itnerd

Children today have an unprecedented ability to explore ideas, yet their digital world gives them so few ways to do it. When an eight-year-old asks how to build a city on Mars, the answer should ignite imagination, not flatten it into a wall of text. Built for this moment, Sparkli is launching a new model of learning shaped for the developing brain, using real-time multimodal AI that gives children the agency to build their own interactive learning expeditions on any topic in minutes. Sparkli transforms these inquiries into multi-disciplinary, real-life journeys that foster future-ready skills, including technology, design thinking, sustainability, financial literacy, entrepreneurship, emotional intelligence, and global awareness.The Zurich-based company has raised a $5 million pre-seed round to bring its multimodal learning engine to families and schools around the world.

The pre-seed round will allow Sparkli to scale its generative learning engine and prepare for a private beta launch in January 2026. The company is currently validating its platform through a strategic pilot with one of the world’s largest private school groups. This partnership provides Sparkli with a powerful testing ground across a network of more than 100 schools and over 100,000 students. 

Sparkli’s approach is shaped by three shifts essential for modern childhood education, a strategy designed to solve the ‘Agency and Curiosity Gap’. First, it forces a Velocity Shift by moving away from static curriculums to real-time relevance where children explore new topics the moment they emerge. Second, it drives an Engagement Shift by replacing the dry ‘AI chatbot wall of text’ and passive screen time (watching videos, playing video games) with a multimodal playground of visuals, voice, and playable simulations. This turns consumption into active, gamified inquiry rooted in educational value. Finally, Sparkli prioritizes a Skills Shift that focuses on capabilities such as creativity and complex problem solving rather than memorization.

Underpinning these interactions is a system that builds an interest and knowledge graph for every child over time, enabling the platform to deliver truly personalized and adaptive learning.In practice, this means if a child asks to build a city on Mars, Sparkli doesn’t just list facts but instantly generates an interactive expedition where they learn age-appropriate physics, simulate the environment, and build their own city. As they design the infrastructure and explore logistics, the platform challenges them to engage in debates, make strategic choices based on real arguments, and ultimately reflect on and defend their decisions.

Sparkli’s early pilots illustrate these shifts in action. In one classroom, eight-year-olds used the platform to simulate building their own mini food cart businesses, where teachers observed students debating concepts like budgeting and customer experience. In another pilot, students took control during an unstructured ‘Freedom Friday’ session, initiating their own expeditions into topics ranging from game design to the Big Bang. Parents testing the consumer version described a notable difference in the quality of their children’s screen time, with one parent remarking that their son returned from a session eager to outline his sustainability plan if he were Mayor for a day.

Realizing the potential to reimagine this learning experience, CEO Lax Poojary and his co-founders, who are veterans of Google Area 120, Search, and YouTube, assembled a team of engineers and designers, including experts from ETH and the education sector. Together, they are building a platform that fuses generative AI, pedagogy, motion design, and game mechanics to address a fundamental failure in how content is delivered. Existing systems are often slow, standardized, and unable to keep pace with discovery. Textbooks take years to update, traditional edtech depends on static libraries and drills, and open-ended AI tools and chatbots, though powerful for adults, are unsafe or overwhelming for young users. This growing gap creates a major market opportunity for Sparkli to deliver a capable yet safe platform that pairs modern generative technology with strong guardrails and age-sensitive design.

By solving this, Sparkli positions itself to disrupt the $7 trillion global education market, a sector widely predicted to be one of the most significant use cases for artificial intelligence. While Duolingo has built the largest consumer EdTech business to date by digitizing rigid language drills, Sparkli targets a significantly larger addressable market by reimagining how the next generation acquires knowledge

Sparkli’s vision is to become the AI-native operating system for childhood development. The company plans to extend its platform from curiosity into creation, giving children tools to build and prototype projects directly inside Sparkli. It seeks to connect classroom learning with home exploration and ultimately support learners as they grow into adolescence and beyond. The long-term goal is to give every child a lifelong AI companion that remembers what they cared about at age six and helps them develop those passions at seventeen.

EnGenius Private Cloud Empowers MSPs with Secure, Scalable On-Prem Network Management

Posted in Commentary with tags on January 22, 2026 by itnerd

EnGenius Technologies has announced the release of EnGenius Private Cloud (EPC)—a fully on-premises network management platform purpose-built for Managed Service Providers (MSPs) and system integrators who require full control over their deployments without relying on public cloud infrastructure. EPC runs on any standard PC, server, or virtual machine, giving partners the ability to manage enterprise-class networks while keeping all data inside their own environment.

Why EPC Is Essential for Today’s MSPs

MSPs and system integrators need EnGenius EPC because many of their customers cannot or do not want to use public cloud platforms due to data privacy, compliance, and security concerns. Many governments agencies mandate that all network management systems, logs, and user data remain strictly within their own infrastructure to meet data sovereignty, privacy, and security regulations. These policies prohibit the use of public cloud controllers, restrict external data transmission, and require full visibility and control over how information is stored, accessed, and audited. As a result, MSPs and system integrators serving government clients must deploy fully on-prem solutions like EnGenius EPC to ensure compliance, maintain operational independence, and protect sensitive information from being processed or stored outside government-controlled environments.

EPC: The Solution for Secure, Controlled Network Management

EPC solves these pain points by delivering a fully on-premises, multi-tenant management platform that keeps all data local, operates reliably even without internet, and significantly reduces long-term operational costs. As a 100% locally hosted and secure solution, EPC ensures that network management, logs, client data, and device credentials never leave the premises—giving partners complete control over customization, backups, policies, and overall performance.

EPC provides:

  • Centralized control of thousands of access points and switches
  • True multi-tenant architecture for managing multiple customers with complete separation
  • Unified configuration and rapid rollout across distributed sites
  • Full data ownership, supporting privacy-sensitive and compliance-driven environments

By combining cloud-level convenience with local, on-prem autonomy, EPC empowers MSPs to deliver premium managed services while maintaining the security, privacy, and performance their customers expect.

Key Features & Capabilities of EnGenius EPC

  • Fully On-Premises Deployment — Runs on local PC, server, or VM with no dependency on public cloud.
  • Complete Data Ownership — All logs, credentials, and client data stay inside the organization.
  • Multi-Tenant Architecture — Easily manage multiple customers or sites with full isolation.
  • Centralized Network Management — Unified dashboard for APs, switches, and multiple networks.
  • Scalable Design — Supports thousands of devices across distributed deployments.
  • Cloud-Like Convenience — Zero-touch provisioning, monitoring, and configuration automation.
  • Offline Operation — Controller continues working even with limited or no internet access.
  • Advanced Security Controls — Localized user authentication, access rights, audit logs, and more.
  • Flexible Deployment Options — Works on standard Linux environments and supports container-based architecture.
  • Customizable Policies & Backups — Full control over retention, updating schedules, and system backups.

With EPC, EnGenius redefines what on-premises network management can achieve—delivering flexibility, privacy, and reliability that the cloud simply cannot match.

The EPC will be available for download on the EnGenius website starting in January 2026 for EnGenius customers. For additional product specifications and purchasing information, visit: EnGenius Private Cloud

BforeAI Threat Advisory: Scam Activity Leveraging U.S. Actions in Venezuela in January 2026

Posted in Commentary with tags on January 22, 2026 by itnerd

PreCrime Labs, the threat research team at BforeAI identified a large cluster of suspicious domain registrations leveraging US military operations in Venezuela and the resulting information vacuum.

When the PreCrime Labs team investigated new domains related to the Venezuela matter and registered from December 1- January 12, 2026, a total of 829 domains were determined to be suspicious. An even more recent surge in domain registrations, primarily in January 2026, dominates the dataset. Approximately 546 domains were registered in the time period between January 3-5, 2026 alone. This represents a significant spike in activity compared to the December 2025 period leading up to the January 2 military action in which 110 related domains were registered over the entire month.  

The link to the live report will be: https://bfore.ai/report/scam-activity-leveraging-united-states-actions-in-venezuela/

Most S&P 500 sites fail CPPA consent rules, now in place as of Jan 1st 2026

Posted in Commentary with tags on January 22, 2026 by itnerd

California’s new CPPA risk-assessment rules took effect January 1, 2026.

Lokker  who are experts in online data privacy and compliance have just released new data showing most S&P 500 U.S. companies are not technically compliant, despite their consent banners and privacy policies.

Lokker’s Quarterly Risk Report – Q1 2026 examines how privacy risk is shifting from written commitments to technical reality. With CPPA risk assessment requirements now in effect, it looks at both what regulators, courts, and plaintiffs are now looking for, and what organizations must be able to demonstrate across their web properties.

Based on continuous scans of S&P 500 websites, Lokker found that over 90 percent load third-party trackers before consent, and roughly 80 percent rely on consent tools that actually fail in practice. As enforcement risk shifts from policy language and public statements to provable technical controls, web tracking technologies are becoming a primary exposure vector.

What Lokker scans reveal: Using continuous scanning across large enterprise websites, Lokker analyzed how tracking technologies behave in real-world conditions, not audit snapshots. The results are sobering.

Across industries, Locker consistently observed that trackers initiate data collection before meaningful consent is obtained. Consent management tools often appear compliant on the surface, yet fail under technical scrutiny. In many cases, third-party scripts activate on page load, across subdomains, or during specific user interactions that bypass consent controls entirely.

These failures are rarely intentional. They arise from complex modern web stacks, fragmented ownership of tracking tools, and constant changes introduced by marketing, analytics, and third-party vendors.

But an absence of intent isn’t a standard that regulators are likely to apply.

Enforcement and litigation risk: The regulatory environment is intersecting with an aggressive litigation landscape that’s often receptive to claims that web tracking technologies operate as unlawful surveillance mechanisms when deployed without proper notice and consent.

Recent cases have seen claims proceed based on the mere presence of certain tracking technologies on a website. This means that a single misconfiguration or script can expose an organization to regulatory inquiry and/or class action litigation.

Quarterly Risk Report – Q1 2026: https://lokker.com/quarterly-risk-report-q1-2026/

/