Archive for April 9, 2026

Samsung Canada Launches ‘Samsung True North Tunes’ 

Posted in Commentary with tags on April 9, 2026 by itnerd

Samsung Electronics Canada has launched Samsung True North Tunes, an artist-first contest that gives emerging Canadian musicians a new opportunity to share their original music and reach listeners across the country. 

Through the contest, selected artists will be featured on the Samsung True North Tunes website and gain access to opportunities — from curated playlists, exclusive experiences and swag, to mentorship and broader exposure for the top selected artists. Submissions are open to artists of all genres, with a focus on originality and creative expression. 

Samsung True North Tunes is developed in partnership with Collective Arts, bringing together cultural and media voices to amplify emerging talent and connect artists with fans across Canada. 

Open Call for Emerging Canadian Artists 

Starting March 20, emerging artists across Canada can submit their original music through the True North Tunes website: truenorthtunesmusic.ca. Submissions are open to artists of all genres and backgrounds, and are free to enter, with a focus on originality and creative expression. 

The program will take place across three stages. A panel of judges will first select the Top 100 artists, followed by two rounds of public voting to determine the Top 20 and final Top 3. As artists advance, they’ll gain access to mentorship, studio recording time, and live performance opportunities, including a series of live sessions and events curated and hosted by Collective Arts, alongside Samsung technology and additional prizing. For full program details and timing, please visit our website. 

Program timeline: 

  • March 20 – May 15: Artist submissions open 
  • June 15: Top 100 announced, curated by judges 
  • July 14: Top 20 announced following public voting 
  • August 11: Top 3 announced following public voting 

ServiceNow moves beyond the sidecar AI era

Posted in Commentary with tags on April 9, 2026 by itnerd

ServiceNow today announced that its entire product portfolio will be AI-enabled. Every ServiceNow product now includes AI, data connectivity, workflow execution, security, and governance built-in. This shift enables organizations to accelerate their AI ambitions and help ensure they get the most value from AI by bringing together the critical components required for enterprise-scale delivery: a conversational front door (ServiceNow EmployeeWorks), connected data for cross-enterprise context (Workflow Data Fabric), visibility and governance (AI Control Tower), and autonomous workflows that can move from assisting people to acting on their behalf. ServiceNow also unveiled Context Engine, an enterprise context solution that connects relationships, policy, and decision history behind every AI agent decision, and new ServiceNow Build Agent skills that open the platform so that developers can build from any tool they already use and deploy directly to ServiceNow.

The enterprise software landscape has a fragmentation problem. The average enterprise runs hundreds of applications, each with its own data model, security perimeter, and governance logic. Most providers are making it worse, bolting intelligence onto disconnected systems as a sidecar that can’t execute across the enterprise with real context or accountability. ServiceNow is moving beyond a patchwork of AI add-ons towards a unified platform, combining intelligence that understands context with workflows that can act on it.

Context Engine: enterprise context for every AI decision

Every AI agent is only as good as the context it operates in. Context Engine gives ServiceNow AI and workflows the context to sense what’s happening across the enterprise, decide the right course of action, act with precision, and govern every outcome accountably. For example, it knows which asset is tied to a regulated process, which approval chain applies to a given cost threshold, and which vendor history should inform how a request is handled.

With 85 billion workflows and seven trillion transactions, ServiceNow is uniquely positioned to ground LLMs in an organization’s specific strategy and make better decisions with AI. Context Engine compounds intelligence with every human and agent decision made, growing smarter about how a business works, not just about language. Built on ServiceNow’s Service Graph, Knowledge Graph, and data inventory, Context Engine draws from a breadth of enterprise signals, including identity relationships, asset dependencies, business intelligence, and data lineage that AI queries in real time.

ServiceNow SDK and Build Agent skills open ServiceNow to every developer, from any tool

On April 15, developers will be able to build with any tool they already use — including Antigravity, Claude Code, Cursor, OpenAI Codex, Windsurf, and others — and deploy directly to the ServiceNow AI Platform. The ServiceNow SDK and new Build Agent skills work across every major AI development environment, so developers stay in their preferred integrated development environment (IDE) while citizen developers describe a workflow in plain language. The result is a working app on ServiceNow in minutes, based on testing scenarios.

For teams developing on top of the company’s pre-built apps, ServiceNow Studio with embedded Build Agent delivers the deepest AI-native development experience on one platform. Fully instance-connected, it understands live data models, active scopes, table relationships, and business rules in real time, enabling it to surface the right fields, dependencies, and extension points as developers build.

Every custom app and AI agent is governed by AI Control Tower and App Engine Management Center, and inherits the same identity framework. To get started, customers will receive 100 free Build Agent calls, and personal developer instances will include 25 free Build Agent calls.

AI, data, security, and governance now in every product offering for customers of any size

ServiceNow is releasing a new tiered offer model that spans AI assistance, agentic automation, and fully autonomous operations across the entire portfolio. For midsize companies that need enterprise-grade service management without months-long deployment, ServiceNow is introducing Enterprise Service Management (ESM) Foundation. ESM Foundation brings together IT, HR, legal, finance, procurement, and workplace services onto the ServiceNow AI Platform, which can be live in weeks. With AI-driven setup, AI assistance for employees, and automation to improve service team performance, organizations get fast ROI on a scalable foundation that grows with them.

Every ServiceNow customer now starts with a complete AI package — no separate purchase, no procurement project, and no integration required. From AI-powered automation capabilities to more agentic AI features, customers can choose the level that’s right for them. ServiceNow is model agnostic by design, giving customers the flexibility to leverage their preferred provider. Intelligence will keep getting cheaper. Trusted execution will keep getting more valuable.

Availability

ESM Foundation and the new packaging model are now available for all customers. Build Agent skills will be available to developers on April 15. Context Engine is available for preview with select customers, and full availability details will be shared at a later date.

179 internet-exposed ICS devices across 20 countries identified via insecure Modbus protocol

Posted in Commentary with tags on April 9, 2026 by itnerd

Researchers at Comparitech have identified 179 internet-exposed industrial control system (ICS) devices across 20 countries, including systems tied to power grids and railway networks, all accessible via the Modbus protocol. The devices were found responding on port 502, the default communication port for Modbus, which is widely used in critical infrastructure environments.

The exposed systems include equipment from major vendors such as Schneider Electric and ABB, performing functions like logic control, power monitoring, and data logging. The United States had the highest number of exposed devices at 57, followed by Sweden (22) and Turkey (19).

Denis Calderone, CTO, Suzu Labs:

   “During yesterday’s extremely busy cybersecurity news cycle we were all abuzz about the six-agency advisory about Iranian actors targeting US critical infrastructure PLCs.  One thing we pointed out yesterday while conversing with clients and others was to look for any Internet exposure to certain protocols used by PLCs including Modbus TCP on port 502.  

   “Modbus is particularly concerning because it is a protocol developed without security controls. Now, today, Comparitech publishes research showing 179 ICS devices sitting exposed on that exact port across 20 countries, with the United States leading the count at 57 devices. The timing on this could not be more relevant.

   “To put it bluntly, Modbus was designed in 1979 for closed industrial networks and that’s why it lacks any concept of authentication and no encryption. If you can reach port 502, you can read from and write to the device registers. The researchers didn’t just do a Shodan search and look at headers, they performed a Masscan, identified open Modbus ports and were able to chart live energy consumption from an exposed power monitoring device using the manufacturer’s publicly available register list.”

   “We already know the Iranian hackers are looking for this, and these devices are just sitting there waiting to be found. So, what we said yesterday stands today that PLCs and ICS devices need to be behind firewalls and segmented OT network zones, not exposed to the internet. Modbus was never meant to be an internet-facing protocol.

   “The convergence of industrial systems onto IP networks has been causing this kind of exposure for decades now. If your organization runs any industrial control systems, scan your own environment for anything responding on port 502 and take it off the internet today. If you need remote access for maintenance or monitoring, put it behind a VPN. There is no scenario where an unauthenticated industrial control protocol should be directly reachable from the public internet.”

Damon Small, Board of Directors, Xcape, Inc.:

   “Exposing Industrial Control System (ICS) assets directly to the Internet via unauthenticated protocols like Modbus represents a critical failure in perimeter hygiene that invites immediate disruption of physical operations.

   “While the report’s tally of 179 devices is statistically small, the inclusion of programmable logic controllers (PLC) and power monitors in the U.S. and Sweden highlights a persistent gap in securing critical infrastructure. The fundamental issue is that Modbus lacks native encryption or authentication, meaning any device responding on port 502 is effectively an open door for unauthenticated read and write commands.

   “Recent surges in activity from state-affiliated actors targeting similar vulnerabilities underscore that this is no longer a theoretical risk but an active targeting priority. Security teams must move beyond simple port blocking and verify that any necessary remote access is tunneled through a robust VPN or a secure gateway with granular identity controls.

   “Prioritize an immediate scan of external IP ranges for port 502 and audit all Modbus TCP gateways to ensure they are not bridging internal Operation Technology (OT) and industrial control networks directly to the public Internet.  Use the Purdue Model reference architecture for guidance on how to properly segment OT from IT to protect these critical infrastructures. In short, the problem is not with the devices or the protocols that they use, but rather the manner in which operators are deploying them.

   “It is 2026, and we are still arguing about whether a power grid should be a public webpage.”

Larry Pesce, VP of Services, Finite State:

   “This highlights a recurring and concerning issue: internet-exposed industrial control system (ICS) devices, particularly those using legacy protocols like Modbus that were never designed with security in mind.

   “What stands out here isn’t just the exposure itself: it’s where it’s happening.

   “Critical infrastructure organizations such as energy, water, and manufacturing have historically been among the most cautious when it comes to external attack surfaces. These environments typically emphasize segmentation, controlled access, and layered defenses. So seeing these systems directly reachable from the internet suggests a breakdown in foundational security practices.

   “And that’s really the key takeaway:

   “This isn’t a failure of advanced security controls, it’s a failure of fundamentals.

   “The “Back to Basics” Problem

   “What these exposures reinforce is the need to revisit core disciplines such as network perimeter management. If Modbus is reachable from the public internet, something upstream like firewalls, routing, and/or segmentation have failed. Full stop.

   “Also, asset inventory. You can’t protect what you don’t know exists. Internet-wide scans keep finding devices because organizations don’t have a complete, continuously updated view of what’s deployed.

   “Patch and update hygiene. Even when exposure is unavoidable, outdated firmware and unpatched services dramatically increases risk.

   “Redundancy and resilience planning. Many ICS environments assume availability—but exposure introduces fragility. Even “low impact” disruptions can cascade if redundancy isn’t properly designed.

   “The compounding risk effect is the part that tends to get underestimated.

   “Individually, many of these exposed systems might not lead to catastrophic outcomes. Maybe it’s read-only access. Maybe it’s a non-critical site. Maybe exploitation requires additional steps.

   “But security doesn’t fail in isolation.

   “When you stack dozens, or hundreds, of “low impact” exposures, you create systemic risk.

   “Attackers don’t need a single catastrophic vulnerability if they can enumerate environments, chain small weaknesses, and establish footholds across multiple sites. At that point, even minor disruptions can aggregate into operational, safety, or economic consequences.

   “This keeps happening because a lot of organizations still rely on point-in-time scans and assumptions about what’s deployed. But what matters is what’s actually running in the field: the firmware, the configurations, the exposed services.

   “And this is exactly the gap. Traditional approaches often miss “firmware reality”: the full picture of what’s deployed, exposed, and reachable. 

   “Without a continuous, accurate inventory tied to real deployed assets, these exposures slip through, even in mature environments.

   “Honestly, this isn’t about blaming operators or engineers. These environments are complex, often decades in the making, with layers of legacy decisions.

   “But moments like this are a good reset. Not a “we need more AI security tooling” moment or a “zero trust will fix everything” moment.

   “This is a: “Did we lock the front door?” moment. Because in this case… the front door is Modbus on port 502, wide open to the internet.”

My admin page nor anything else that’s tied to administrating my router isn’t exposed to the Internet. I do that because I am paranoid that I will get pwned because I gave a threat actor the means to pwn me. I would suggest we all start to become a lot more paranoid.

Samsung Unveils Galaxy A57 5G and Galaxy A37 5G

Posted in Commentary with tags on April 9, 2026 by itnerd

Samsung today announced the new Galaxy A57 5G and Galaxy A37 5G, the latest Galaxy A series devices that bring Samsung’s newest mobile innovations — including enriched Awesome Intelligence — to more users worldwide. The latest Galaxy A series reflects Samsung’s commitment to expanding AI capabilities across more devices and empowering more users to harness the power of intuitive AI that simplifies everyday tasks. Galaxy A57 5G and Galaxy A37 5G strengthen the experiences users rely on every day with upgrades to performance, camera and display, alongside durability and security features. With long-term security support, the new Galaxy A series is built for the long-haul. Leading the lineup is the Galaxy A57 5G, featuring a slimmer, more refined design and upgraded AI-powered capabilities that make it the most powerful Galaxy A series device yet.

Enriched Awesome Intelligence Designed for Everyday Life

Through the latest One UI 8.5, Galaxy A57 5G and A37 5G extend Samsung’s latest AI innovations to more users, with Awesome Intelligence that helps people get more things done with ease while unlocking new ways to create and stay productive.

Voice Transcription is new to the Voice Recorder app, making it easier to revisit important details from meetings, lectures or calls by quickly transcribing and translating call recordings or turning voicemail audio into text. AI Select is easier to access with a long press on the Edge Panel, surfacing relevant actions directly on the screen to extract text or create content without manually selecting items. AI Select also supports Drag & Drop in Multi-Window layout, allowing users to easily move images into Samsung Notes or Photo Editor for faster editing and improved productivity.

Awesome Intelligence makes everyday photo editing easier than ever. Object Eraser now delivers more natural results when removing unwanted distractions, like a passerby in the background or clutter in a café. On Galaxy A57 5G, Best Face supports more photos and continuous shooting, making it easier to capture the perfect group photos where everyone looks their best. Fan favourite tools like Filters and Edit Suggestions help users quickly refine and share moments without extra effort, while Galaxy A57 5G also features Auto Trim for even easier video editing.

Circle to Search with Google adds multi-object recognition so users can easily explore multiple items in an image at once — from an outfit to surrounding accessories — all in one search.

The new Galaxy A series expands Awesome Intelligence experiences with a choice of agents designed to simplify everyday tasks from search to organizing plans or easily adjusting settings. As a conversational device agent, upgraded Bixby lets users intuitively control Galaxy settings and features using natural language, while Gemini navigates complex tasks across native Galaxy apps and select third-party apps to support faster, more intuitive interactions.

Awesome Camera to Capture Clearer Photos and Videos, Day or Night

As AI becomes more deeply integrated into mobile experiences, camera performance remains essential to delivering the everyday usability and satisfaction users expect.

Galaxy A57 5G and A37 5G deliver brighter, clearer visuals powered by the upgraded camera hardware and an improved Image Signal Processor (ISP). The devices feature a versatile triple-camera system, led by a 50MP main sensor, delivering sharp, detailed images across a wide range of lighting conditions without the need for manual adjustments.

When the lights go down, the Galaxy A57 5G and A37 5G camera adapts seamlessly with Nightography, capturing clear and true-to-life photos and videos even in low light conditions.

Galaxy A57 5G takes photography a step further with enhanced image processing that sharpens detail and reduces noise for even clearer, more vibrant results. It delivers rich contrast and balanced colour even in challenging light, and with a faster shutter speed, users can instantly capture fleeting moments faster and with improved clarity.

Galaxy A57 5G and A37 5G also benefit from AI-based subject recognition and scene optimization to balance portraits, preserve natural skin tones and create clearer background separation. When the moment calls for a wider perspective, the ultra-wide lens captures more in every group photo or landscape view, while the 5MP macro camera reveals fine details up close for added creative flexibility.

Performance for Streaming and Multitasking

Galaxy A57 5G delivers an improved design and performance, combining upgraded CPU, GPU and NPU to deliver improved performance with its sleek and light form. Built for smooth streaming, scrolling and content creation, its refined design features a glossy finish and distinctive triple-camera island for a standout modern look that feels comfortable in-hand.

Despite its slimmer profile, Galaxy A57 5G packs powerful performance. Its 5,000mAh battery supports up to two days of use — powering everything from filming and editing to viewing on the go. Super Fast Charging 2.0 reaches up to 60% in around 30 minutes for a quick boost before heading out, while a 13% larger vapor chamber helps sustain performance during extended gaming or recording. Slimmer bezels and a bright Super AMOLED + display with Vision Booster on both models ensure an immersive, clear viewing experience indoors and outside.

Built for everyday use, Galaxy A57 5G and A37 5G are rated IP68 for water and dust resistance, adding protection in real-world environments and offering users peace of mind when accidents happen.

Long-Term Support and Foundational Security

Galaxy A57 5G and A37 5G reinforce Samsung’s commitment to device longevity, giving users the confidence to rely on their device for years to come.

Samsung provides a fortified layer of device safety, transparency and user choice with Knox Vault, a hardware-based, tamper-resistant security solution. Galaxy A series offers users holistic protection through innovative security and privacy features including Security & Privacy Dashboard, Auto Blocker, Private Sharing, Theft Protection as well as the new Private Album, a Gallery feature that allows users to lock away personal media quickly and easily. Unlike traditional safeguards, the latest A series devices also proactively notify users about potential risks with Privacy Alerts, which are intelligent notifications that offer clearer insight and control over location permissions or suspicious monitoring of sensitive data. Together, these enhancements make security feel as intuitive as the rest of the experience, making device protection easier than ever for everyone.

Availability

Galaxy A57 5G and A37 5G will be available starting April 9 in select markets. Galaxy A57 5G will be offered in Awesome Navy, while Galaxy A37 5G comes in Awesome Charcoal. For added peace of mind, Samsung Care+ offers comprehensive coverage optimized to users’ device needs, including tailored benefits that help protect the device’s value.

New Attack Campaign Weaponizes Trusted Datto RMM, Leaving Businesses Blind to Full Remote Takeover

Posted in Commentary with tags on April 9, 2026 by itnerd

Fortra Intelligence and Research Experts (FIRE) are tracking a previously unseen threat campaign abusing Datto’s legitimate RMM platform as a stealthy command‑and‑control channel. By routing attacker traffic through the legitimate Datto infrastructure, threat actors gain full, persistent remote access to victim systems while evading standard network and endpoint defenses.

For businesses, the impact could be severe: undetected access enables data theft, lateral movement, and ransomware staging, all masked as normal IT activity. The campaign is actively maintained, uses weekly‑recompiled malware, and underscores a growing risk – attackers weaponizing trusted enterprise tools to make compromise effectively invisible.

You can read the details here: https://www.fortra.com/blog/fortra-discovers-datto-living-land-binary

Anthropic restricts release of new AI model after it identifies hundreds of zero-day vulnerabilities

Posted in Commentary with tags on April 9, 2026 by itnerd

Anthropic has unveiled a new AI model, Claude Mythos Preview, capable of identifying hundreds of previously unknown high-severity vulnerabilities, including more than 500 zero-day flaws in open-source software during testing. The model demonstrated the ability to autonomously analyze codebases and surface security weaknesses at scale, significantly accelerating vulnerability discovery.

Testing also showed the model could identify vulnerabilities across major operating systems, web browsers, and widely used software, with some findings involving long-standing flaws that had gone undetected for years.

Due to these capabilities, Anthropic has restricted access to 40 technology companies, including Apple, Amazon and Microsoft, under its “Project Glasswing” initiative rather than releasing the model publicly. The limited group of organizations will use the model to find and patch security vulnerabilities in critical software programs.

Anthropic said the controlled rollout is intended to evaluate both defensive and offensive implications of AI-driven vulnerability discovery, while working with the select partners to manage risks associated with misuse of the technology.

   “The goal is both to raise awareness and to give good actors a head start on the process of securing open-source and private infrastructure and code,” Jared Kaplan, Anthropic’s chief science officer said.

Nick Mo, CEO & Co-founder, Ridge Security Technology Inc.:

   “You can also look at this from another angle: try using Claude to write some code and see how many bugs, or even new zero-days, it produces. Claude Code is already making developers many times more productive than before, which means the number of potential vulnerabilities being introduced is also many times greater. It’s writing code and writing vulnerabilities at the same time. No wonder they’re rushing to get security companies involved first. Digging holes and filling them simultaneously, the question is just which side is faster.”

Noelle Murata, Sr. Security Engineer, Xcape, Inc.:

   “Anthropic’s Claude Mythos Preview has effectively industrialized zero-day discovery, identifying over 500 high-severity vulnerabilities in core open-source software that escaped decades of human and automated scrutiny. These findings include a 27-year-old remote crash bug in OpenBSD and a 16-year-old flaw in FFmpeg, surfaced by a “hypothesize-and-verify” loop that autonomously confirms exploits before reporting them.

   “To manage this massive “vulnerability debt,” Anthropic launched Project Glasswing, a restricted partnership with 40 tech giants like Microsoft and Apple to coordinate global patching. By pledging $100 million in compute credits to open-source maintainers, the initiative aims to bridge the gap between AI-driven discovery and the human speed of remediation, ensuring that the “Glasswing 40” don’t become the only secure entities on an otherwise broken Internet.

   “If Project Glasswing is a “cyber-nuke,” Anthropic is attempting to ensure the “mutually assured destruction” of bugs happens in a controlled vacuum before it hits the production Internet.”

Steven Swift, Managing Director, Suzu Labs:

   “Anthropic has a reputation for exaggerating the capabilities of their models, especially around their ability to find novel vulnerabilities. For example, their models have struggled with line(s) of code that could be vulnerable, but only if you ignored the preceding lines of code, that properly handled the risk and left no residual vulnerability.

   “Looking at what they’ve published so far in their Mythos Preview, they’re again making big claims. Particularly of note, is that the community is not being given access to the model at this time. That means it isn’t possible to audit big claims, and we’re left with Anthropic asking us to trust them, despite having established a pattern of misrepresentation and exaggeration on many of their other publications.

   “Let’s take a closer look at what they’re claiming, and what they’re willing to provide details on. The claim is that Mythos can find and fix novel vulnerabilities in secure code bases, that have been competently hardened via legacy tooling and review processes. To provide evidence of this capability they describe the finding vulnerabilities in the following software packages: OpenBSD, FFMPEG codec H.264, an undisclosed VMM, and “several thousand more.”

   “They estimate they spent $20,000 to find the OpenBSD bug, though they said that was the total run, which found other bugs as well.

   “Great, we have two specific vulnerabilities that they’ve specifically chosen to highlight.

   “They accurately highlight the difference between vulnerability – a POTENTIAL weakness. And an exploit, a functioning piece of code that takes advantage of one or more vulnerabilities.

   “We then move on to exploit development, which is COMPLETELY different than discovering vulnerabilities. Exploits are just code. If you provide any major LLM a sufficient detail of how an exploit works, it should be able to generate a functioning exploit. This is not new. It however relies on two things 1) sufficient detail for the exploit 2) sufficient detail for the system that is being exploited.

   “They describe writing an exploit for FreeBSD which did not require human-in-the-loop interactions. However, they point out that Opus was also able to exploit the same vulnerability, though it did require such human input.

   “Additionally, when looking at the Linux kernel, they admit that they were not able to create functioning exploits with the “vulnerabilities” that were discovered.

   “They also go into great detail about a kernel exploit that Claude wrote. But for this exploit to be possible, they had to provide it PREVIOUSLY DISCOVERED context from a fuzzer. That is again, very much NOT Mythos discovering and exploiting a vulnerability. But merely demonstrating that if you provide sufficient context, these models can write code. This is the capability that they chose to highlight with the longest and most detailed technical breakdown. And while the exploit that was eventually developed is claimed to elevate privileges to root, it needs to be emphasized again here. Mythos did not “discover” this vulnerability. It merely wrote some code, after being provided sufficient technical information into its context as to what code it should write.

   “Anthropic knows what they’re doing. They’re making big claims, because attention is good for their business model. They’re providing just enough detail so that their claims look convincing at first glance. But when you look closer, claims lack substance and rely on implications that all of the examples related prove their claims. This lets the reader naturally jump to conclusions that aren’t explicitly stated, but are easy to make. And they bury this under a lengthy, fairly technical document. Making it yet more challenging for readers to decipher.”

Sunil Gottumukkala, CEO, Averlon:

   “Mythos Preview signals that zero-day discovery is becoming cheaper, faster, and more scalable. Researchers have already shown earlier models can help find serious vulnerabilities, but this represents a real capability jump. Even with restricted access, the broader implication is clear: we should expect more dangerous vulnerabilities to be found across major software platforms, and many organizations still don’t patch fast enough to keep up.

   “Once a patch is released, adversaries often move quickly to reverse engineer it and build exploits. At that point, the impact extends well beyond the small group with direct access to the model, potentially increasing overall breach volume.”

Joshua Marpet, Senior product security consultant, Finite State:

   “Anthropic limiting Mythos access to top defenders via Project Glasswing is a fantastic first step, but it needs to be codified and expanded. Expect a new model to completely break the security landscape every six to twelve months.

   “The speed of this evolution is staggering. Three years ago, LLMs barely wrote functional code. Today, they’re autonomously surfacing zero-days at scale. Tomorrow, they’ll be pointed directly at compiled binaries and firmware, exploiting the products we actually ship, not just source repositories. What does this look like five years from now?

   “Future breakthroughs won’t always come with responsible disclosure. The next leap in offensive AI will easily emerge from adversaries with zero intention of giving us a “head start.”

Security teams are already drowning. When adversaries start using autonomous agents to uncover zero-days, manual triage will completely break. We must shift immediately to defensive systems that cut through the noise and automatically prioritize real, reachable exposure.

   “We have to think beyond corporate consortia. We need a completely new wing of the intelligence community, agencies where humans and autonomous AI agents work side-by-side to acquire, analyze, and counter advanced adversary models.

   “The offensive landscape just went autonomous. We can no longer fight machine-speed threats with manual, point-in-time reviews. Defense must become as continuous and autonomous as the attacks coming our way.”

Bad guys are going to use this technique to pwn you. Thus you really need to put the time and effort into making sure that everything that you use is as secure as possible. And then you need to keep going back and reconfirming that you are still secure because the bad guys are going to do the same thing.

Iranian Cyber Group APT35 Had Already Mapped Every Country Bombed in Operation Epic Fury

Posted in Commentary with tags on April 9, 2026 by itnerd

CloudSEK, a cybersecurity intelligence company, today published a threat intelligence report showing how Iranian state-sponsored hacking group APT35 (also known as Charming Kitten) had already broken into the digital infrastructure of every country Iran attacked with ballistic missiles and drones starting February 28, 2026, during Operation Epic Fury.

The report, titled “The Kitten Had the Map All Along,” is based on the KittenBusters intelligence leak and documents a pattern of cyber infiltration that APT35 carried out across Jordan, the UAE, Saudi Arabia, Kuwait, Bahrain, Qatar, and Israel in the years before the strikes began.

According to CloudSEK’s analysis, every Gulf country subsequently struck by Iran had previously appeared in documented APT35 targeting, reconnaissance, or compromise activity.

CloudSEK assesses that the alignment between cyber reconnaissance and later kinetic targeting is too consistent to dismiss as a coincidence. 

While the company stops short of claiming conclusive proof of a formal intelligence-to-strike handoff, the report argues that the most likely explanation is that cyber operations helped prepare the battlefield by mapping targets, collecting internal data, and maintaining pre-positioned access across multiple countries before the conflict escalated.

The report identifies APT35, also known as Charming Kitten, Phosphorus, Magic Hound, and Mint Sandstorm, as the central actor in this activity. CloudSEK links the group to the IRGC Intelligence Organisation, Unit 1500, Department 40, and says newly examined leaked material indicates the group maintained visibility into government, aviation, energy, legal, financial, and civilian infrastructure across the region in the years leading up to the current crisis.

Key Findings from the Report

CloudSEK’s research says that Jordan, the UAE, Saudi Arabia, Kuwait, Bahrain, Qatar, and Israel all appeared in prior APT35 cyber activity before becoming part of the regional strike pattern.

Among the report’s most significant findings:

  • Jordan was one of the most extensively documented targets, with evidence pointing to prior compromise of the Ministry of Justice and targeting of civil aviation-related infrastructure
  • UAE-linked infrastructure, including aviation-related systems and government assets, appears in the leaked data reviewed by CloudSEK
  • Saudi government and energy-related entities were previously profiled, with the report pointing to compromised policy-related documents and access tied to sectors of strategic importance
  • Kuwait, Bahrain, and Qatar were identified as targets of reconnaissance and operational interest before being drawn into the current conflict environment
  • Israel remained a primary focus, with the report citing prior targeting of industrial systems, modems, civilian digital infrastructure, and influence operations.
     

The report also says the leaked material provides unusually rare insight into the malware, infrastructure, financial records, and operating patterns of APT35. According to CloudSEK, that includes exposed source code for malware families such as BellaCiao and Sagheb RAT, as well as blockchain-verifiable payment trails and infrastructure records that help unify multiple previously distinct personas under one broader operational umbrella.

CloudSEK further assesses that personas historically tracked separately, including Moses-Staff and Al-Qassam Cyber Fighters, may in fact be financially and operationally linked to the same broader APT35 ecosystem.

Cyber Operations Running in Parallel

Beyond historic targeting, CloudSEK warns that the cyber dimension of the conflict is already active.

The report highlights ongoing or likely cyber operations by multiple Iran-linked or Iran-aligned actors, including:

  • Handala Hack, linked in the report to attacks and threats involving Israeli and Jordanian targets
  • Cyber Islamic Resistance, associated with destructive and disruptive operations against military and logistics-related entities
  • APT35 / Department 40, which CloudSEK says may already be positioned for follow-on disruptive or destructive activity
  • APT33 / Elfin, historically associated with attacks on the Saudi energy sector
  • CyberAv3ngers, known for prior targeting of internet-exposed industrial control systems
     

CloudSEK says the immediate risk is not limited to military assets. The company warns that aviation systems, airport operations, ports, financial networks, logistics platforms, telecom, government communications, and industrial control environments may all face heightened exposure as the conflict continues.

Why This Matters

CloudSEK’s central warning is that cyber activity in this conflict should not be viewed as reactive noise or opportunistic hacktivism alone. Instead, the report suggests that pre-conflict cyber collection may have played a strategic role in identifying, understanding, and preparing regional targets well before missiles were launched.

That has serious implications for defenders.

If the report’s assessment is correct, organizations across the Gulf and adjacent geographies may be facing adversaries that already understand their networks, their supply chains, their exposed infrastructure, and in some cases their internal communications or operational dependencies.

Immediate Recommendations

CloudSEK is urging organizations, especially those operating in the GCC, Israel, Jordan, and adjacent sectors supporting regional infrastructure, to take immediate defensive steps, including:

  • Patching exposed internet-facing systems linked to known exploited vulnerabilities
  • Auditing Exchange, VPN, and web-facing infrastructure for compromise
  • Hunting for webshells, suspicious tunneling tools, and malware indicators tied to APT35 activity
  • Rotating privileged credentials and auditing administrative access
  • Reviewing aviation, energy, telecom, logistics, and industrial environments for abnormal activity
  • Blocking known indicators of compromise and validating detection coverage against the malware families referenced in the report
     

Caveat and Analytical Position

CloudSEK notes that while several parts of the dataset reviewed in the report are assessed with high confidence, some elements remain only partially independently verified. The company has therefore framed its conclusions carefully: the evidence strongly supports a pattern of pre-positioning and reconnaissance aligned with later regional strikes, but not every operational detail can yet be confirmed with complete certainty.

Even with that caution, CloudSEK says the risk environment is already severe.

The report concludes that the current period should be treated as critical and active, with the likelihood of further Iranian cyber retaliation remaining elevated in the days and weeks ahead.

 For More Details, Read The Full Report Here

U.S. agencies warn of Iranian hackers targeting water and energy systems

Posted in Commentary with tags , on April 9, 2026 by itnerd

Following up on this alert from the FBI, U.S. cybersecurity and intelligence agencies, including the FBI, NSA, and CISA, have issued a joint warning that Iranian-linked hackers are actively targeting critical infrastructure across the United States, with a focus on water, wastewater, energy, and government systems.

The activity has escalated since last month, with confirmed incidents resulting in operational disruptions and financial losses.

The attacks specifically target internet-exposed programmable logic controllers and industrial control systems used to operate infrastructure, including Rockwell/Allen-Bradley devices. Threat actors have been observed manipulating system data and extracting project files, with the stated intent of causing disruptive effects within U.S. systems.

Officials said the campaign spans multiple sectors and organizations nationwide, though the total number of impacted entities has not been disclosed. The advisory was issued by a coalition of federal agencies, including the Department of Energy and U.S. Cyber Command, as investigations into the activity remain ongoing.

Sunil Gottumukkala, CEO, Averlon:

   “ICS security matters because it underpins physical operations, so a compromise can mean real-world disruption, not just data loss. Many of the systems being targeted were never designed to be secured or updated at the pace modern threats require, and they still rely on legacy infrastructure where monitoring is limited and patching isn’t always feasible without operational impact.

   “Even when these systems aren’t directly exposed, they’re often connected through upstream systems, remote access, or vendor pathways that attackers can leverage as part of a broader attack chain. As threat activity increases and AI accelerates reconnaissance and exploit development, the response window continues to shrink while the ability to safely respond remains constrained.”

Damon Small, Board of Directors, Xcape, Inc.:

   “The targeted disruption of US water and energy utilities is the inevitable outcome of treating critical national infrastructure like a public Wi-Fi hotspot. By leveraging legitimate engineering tools like Rockwell’s Studio 5000 to manipulate project files, Iranian-linked actors have demonstrated that an Internet-exposed programmable logic controller (PLC) is not a poor technical design – it is a pre-staged kinetic weapon. Security leaders must acknowledge that these “nuisance” disruptions are live-fire exercises for more catastrophic escalations that exist entirely outside the bounds of diplomatic ceasefires. The primary business risk has shifted from simple uptime to the physical safety of the communities these utilities serve.

   “Teams must immediately pull every PLC off the public Internet and isolate them behind a Zero Trust gateway or authenticated VPN. For Rockwell CompactLogix and Micro850 series devices, operators should physically set the controller mode switch to the RUN position to block remote logic changes. Organizations must audit for exposed industrial ports such as 44818 and 2222 and rotate all default credentials across the OT environment. Failing to remove these systems from public view is an open invitation for geopolitical adversaries to use your operational uptime as a diplomatic bargaining chip. 

   “In short, the cease-fire will not stop our adversaries from attacking the United States’ critical infrastructure, and this will lead to the unavailability of these services, or worse, to incidents that lead to loss of life and limb.

   “If your water treatment plant or refinery is searchable on the Internet, you are not running a utility; you are hosting a digital sandbox for the IRGC.”

Denis Calderone, CTO, Suzu Labs:

   “When CyberAv3ngers hit Unitronics PLCs back in 2023, it looked like hacktivism. They put political messages on water system displays and moved on. What today’s six-agency advisory describes is different. We warned in March that organizations in energy, water, and government should be actively hunting for pre-positioned access. Today’s advisory confirms that’s exactly what’s been happening, and in some cases has already caused operational disruption and financial loss.

   “Today, we’re seeing the threat actors conducting fairly surgical operations, using Studio 5000 Logix Designer, which is Rockwell Automation’s own PLC programming software, to interact with CompactLogix and Micro850 controllers at the file object level. They’re extracting the programming logic that controls physical processes and manipulating data on HMI and SCADA displays. Think about what that means for a water treatment operator or a power plant engineer. If your display is showing you normal pressure, flow, or chemical dosing levels and the actual values are different, you’re making operational decisions based on false data. That’s how equipment damage and safety incidents happen.

   “Now, the advisory specifically calls out Rockwell Automation and Allen-Bradley, and that makes sense because Rockwell holds roughly 35 to 40 percent of the US PLC market. But don’t let the Rockwell focus distract you. The indicators of compromise in the advisory include traffic on port 102, which is S7comm, and that’s a Siemens protocol. The advisory itself says ‘potentially other branded PLCs’ are at risk.

   “If you’re running Siemens, Schneider, or any other PLC platform and assuming this doesn’t apply to you, look at the port list again: 44818 for EtherNet/IP (Rockwell and others), 102 for S7comm (Siemens), 502 for Modbus (most PLCs). Those protocols are from multiple manufacturers, proving that this is more than just a Rockwell problem.

   “The prescriptive advice here is straightforward. PLCs should never be directly accessible from the internet, period. The advisory confirms that the attackers are simply connecting to internet-exposed devices using overseas IP addresses. But internet isolation alone isn’t enough. Controllers and SCADA infrastructure should sit behind properly segmented OT network zones with monitored firewall boundaries between IT and OT environments.

   “If you have PLCs on flat networks that IT workstations can reach directly, you have a problem. Modbus TCP has essentially zero security controls built in. That protocol originates from 1979 when these were closed systems. Review logs now for suspicious traffic on ports 44818, 2222, 102, 22, and 502. And if you’re running Rockwell devices, reach out to Rockwell through their existing support channels for specific mitigation guidance tied to this advisory.”

The fact that all these agencies are warning about this should show you how serious this problem is. And to be clear, this is a today problem that requires immediate action. Otherwise really bad things will happen.