Archive for April 15, 2026

NotebookLM alternative kills source caps

Posted in Commentary with tags on April 15, 2026 by itnerd

Recall, an AI encyclopedia that knows users better than the questions they ask, has launched version 2.0, an upgraded version of the original knowledge base.

It’s a major improvement on NotebookLM: Recall automatically captures and connects everything  the user consumes (think YouTube, podcasts, PDFs, TikToks, articles) to create a personal knowledge graph with no source caps. 

What’s new: Recall 2.0 also adds an agentic AI chat that queries both the open internet and a user’s private knowledge base in a single conversation, with model choice among Claude, GPT, and Gemini.

The tech is a direct answer for NotebookLM consumers who want a product that actually grows with them.

Since launching in 2022, Recall now boasts over 600,000 users, $1.1M ARR, and organic acquisition still accounts for roughly 80% of growth.

Recall did a post here that goes into the weeds on this.  

Cookeville Regional Medical Center warns 338,000 people of data breach

Posted in Commentary with tags on April 15, 2026 by itnerd

Comparitech is reporting that Cookeville Regional Medical Center in TN yesterday confirmed it notified over 337K people of a July 2025 data breach that compromised names, SSNs, financial account numbers, medical treatment info, health insurance info, and much more. 

Commenting on this is Rebecca Moody, Head of Data Research at Comparitech:

“This data breach becomes the eighth-largest on a US healthcare provider from 2025 (following a ransomware attack), and highlights how we often don’t realize just how extensive these attacks are until months (or sometimes years) after the event. It can take a considerable amount of time for organizations to investigate what data has been impacted in these breaches, which is why CRMC needs to be applauded for how it approached this attack. 

From the outset, CRMC has been honest about the nature of the incident and was open about the fact it had fallen victim to a ransomware attack at the time. It also confirmed that data had been breached within a couple of months of the attack taking place, while its investigations into exactly who had been involved were ongoing.

While some organizations avoid using the word “ransomware” and don’t issue any form of data breach notification for months, this lack of clarity and confirmation can leave those affected open to identity theft and phishing campaigns. Hopefully, many of the people impacted in this breach were aware of the attack in its early stages, so the letters being issued now are more of a formality than a shock.”

Stop me if you’re heard this before. Health care is a sector that is a prime target for threat actors. This needs to stop via providing this sector with what they need to stop getting pwned like this.

Sparq Designs Named Preferred Marketing Partner for Content Recovery Specialists

Posted in Commentary with tags on April 15, 2026 by itnerd

Sparq Designs (Sparq) has been named the Official Preferred Marketing Partner of Content Recovery Specialists (CRS). The collaboration was announced at the CRS 2026 Annual Conference and establishes Sparq as the approved local marketing execution partner for CRS franchise owners nationwide.

Through this affiliation, Sparq will support local marketing execution across CRS’s network of franchise locations, working within the systems and infrastructure already in place at the corporate level. By working within CRS’s existing HubSpot environment, Sparq will help ensure consistency, visibility, and alignment across all markets while enabling franchise owners to execute effective, localized campaigns.

Franchise owners can engage with Sparq based on their local market needs, within a structured, CRS-approved framework. At a minimum, services include local SEO support such as Google Business Profile optimization and Local Services Ads, ensuring a strong foundation for visibility and lead generation. Additional services include creative design and development, email marketing management, paid search campaigns, and organic marketing efforts.

All marketing initiatives will be executed within CRS’s current HubSpot infrastructure, allowing for seamless lead tracking, campaign integration, and performance visibility across the network.

CRS has built a strong national platform, but like many franchise organizations, it does not manage day-to-day marketing at the individual location level. Sparq fills that gap by providing structured, brand-approved marketing support without adding operational burden to the corporate team. Services will be delivered within CRS-approved engagement frameworks, allowing franchise owners to access scalable, compliant marketing solutions tailored to their local markets. 

For Sparq, the partnership reflects its continued focus on supporting franchise systems with practical, execution-driven marketing solutions. The agency specializes in translating national brand strategy into effective local execution, with services including local SEO, paid media, creative design, email marketing, and ongoing digital support—all delivered within established systems to ensure consistency, visibility, and measurable results across the network.

The partnership represents a national rollout and reinforces both organizations’ commitment to supporting franchise growth through aligned, scalable marketing execution. 

Auctor Raises $20M Led by Sequoia Capital to Build the AI System of Action for the Enterprise Software Implementation Market

Posted in Commentary with tags on April 15, 2026 by itnerd

Hundreds of billions are spent on software implementation each year*, yet 50 percent of projects fail to meet deadlines, and one out of every six exceeds budgets by over 200 percent*.

Today, Auctor emerges from stealth. It enables professional services teams and system integrators to deliver faster, more consistently, and smarter with every project.

Auctor has raised a total of $20 million, including a Series A led by Sequoia Capital with participation from M12, Microsoft’s Venture Fund, HubSpot Ventures, Workday Ventures, OneStream, Y Combinator, Tercera, and Dig Ventures.

Professional services and implementation teams still rely on a patchwork of meetings, spreadsheets, documents, and internal knowledge to manage discovery, scoping, solutioning, and delivery. As a result, requirements, decisions, and context are fragmented across systems and stakeholders, with no single source of truth. This fragmentation leads to misalignment, rework, margin erosion, and delayed time-to-value for customers.

Auctor’s AI-native system of action is purpose-built for how implementation work actually runs in practice. It curates execution-ready artifacts like rough orders of magnitude, resource plans, process flows, user stories, and more – already aligned and ready for delivery.

As a result, users and teams always know what was decided, why it was decided, and how it impacts the rest of the engagement. Most importantly, Auctor helps companies standardize what great looks like, turning their best work into repeatable, reusable practices across every project. 

Auctor is already seeing top teams across leading software ecosystems fundamentally change how they run implementations. Customers are driving upwards of 80% efficiency gains across discovery and design, improving margins and even shifting toward fixed-fee models. 

The results extend across the entire implementation lifecycle. One team used Auctor to respond to an RFP (request for proposal) over a single weekend with just one person, secured the opportunity, and closed it within two days — work that previously required weeks and multiple team members. Separately, a principal consultant at a large enterprise software company produced a comprehensive manufacturing scoping guide in roughly 10 minutes, replacing a three-week manual effort.

The market dynamics driving Auctor’s growth are structural. 

Implementation firms are caught between a talent model that doesn’t scale and a competitive environment that won’t wait. Senior consultants are spread too thin. Junior staff lack institutional knowledge. Mid-project swaps mean someone is always ramping up. The firms that figure out how to run leaner without sacrificing quality will take market share from those that don’t. 

For system integrators stuck in margin-constrained models where delivery costs scale linearly with headcount, the math is straightforward: Auctor can unlock multiple points of EBITDA margin by fundamentally changing the way of operating.

Astrolight contributes laser communication terminal technology to ESA’s HydRON Element 3 mission led by prime contractor Kepler Communications

Posted in Commentary with tags , on April 15, 2026 by itnerd

Kepler Communications is leading a group of industry partners, including Astrolight, a Lithuanian space and defense technology company developing laser communication solutions for space, ground, and maritime applications. The companies have been awarded a multimillion-euro contract under the European Space Agency’s (ESA) High-throughput Optical Network (HydRON) to develop HydRON’s user-terminal segment, known as Element 3. HydRON is a project under ESA’s Optical and Quantum Communications – Scylight programme, within the Agency’s Advanced Research in Telecommunications Systems (ARTES). Led by Kepler as the spacecraft provider and mission operator, Astrolight will provide its latest-generation ATLAS-X laser communication terminal for hybrid optical links across LEO, GEO, and ground.

The HydRON project aims to demonstrate the world’s first optical multi-orbit transport network in space, extending high-capacity, fibre-like connectivity into orbit and bolstering the resilience of European communications infrastructure through a secure, high-capacity, and interoperable optical data relay network.

HydRON’s Element 3 mission focuses on demonstrating the applications of laser communication technology within the user segment by creating a testing environment in real operating conditions. In the long term, it is intended to enable external commercial optical users to connect to the HydRON network and route their data through it.

As part of the mission, Astrolight’s ATLAS-X laser communication terminal will be hosted aboard a Kepler satellite for in-orbit demonstration. The mission will validate inter-satellite and space-to-ground links in LEO and attempt multi-orbit links between LEO and GEO. Following the demonstration, ATLAS-X will serve as a data relay node, enabling the Kepler spacecraft to connect with other elements of the HydRON network.

ATLAS-X is Astrolight’s next-generation low-SWaP (size, weight, and power) laser communication terminal, building on the company’s earlier ATLAS-1 and ATLAS-2 solutions. It is designed for both space-to-space and space-to-ground links and features a coarse pointing assembly, offering greater operational flexibility and easier deployment across a wider range of spacecraft. ATLAS-X is compatible with a subset of the ESA Specification for Terabit/sec Optical Links (ESTOL) standard and is SDA-compatible.

Bitdefender Launches Powerful Email Security Solution for Businesses and MSPs

Posted in Commentary with tags on April 15, 2026 by itnerd

Bitdefender today announced Bitdefender GravityZone Extended Email Security, unifying email and endpoint protection within a single platform. Built for organizations, managed service providers (MSPs) and their customers, it leverages an Integrated Cloud Email Security (ICES) approach to deliver continuous protection before and after delivery against modern email-borne threats including phishing, business email compromise (BEC), ransomware, impersonation, and insider-driven attacks.

“Email threats are growing more sophisticated and effective as total business email compromise-related payments crossed the $6 billion threshold in 2024”, according to Gartner®.¹ In a global survey of 1,200 IT and security professionals, 42% identified BEC as the greatest threat to their organization, while 66% reported an increase in these types of attacks.

Legacy email security solutions often focus on pre-delivery filtering, leaving gaps once threats reach user inboxes. Siloed email and endpoint security tools further create blind spots attackers exploit, increasing dwell time and delaying detection.

Bitdefender GravityZone Extended Email Security is a native email security solution that closes this gap by combining secure email gateway (SEG) filtering with API-based post-delivery protection. This dual-layer approach stops threats before delivery and continuously detects and remediates them after they reach inboxes, helping ensure complete protection across the email threat lifecycle. The solution builds on technology gained through Bitdefender’s acquisition of Mesh Security, further strengthening its email protection capabilities.

Fully integrated into Bitdefender GravityZone, the company’s unified security, risk analytics, and compliance platform, GravityZone Extended Email Security extends protection from endpoint to inbox. It integrates seamlessly into existing environments, enabling rapid deployment and time to value.

Key Benefits of GravityZone Extended Email Security include:

  • Unified email and endpoint protection – GravityZone Extended Email Security uses artificial intelligence (AI) and real-time threat intelligence to stop phishing, BEC, impersonation, ransomware, and other advanced threats. Emails are inspected before delivery and continuously monitored after delivery, enabling automated quarantine and remediation to reduce dwell time and limit user exposure.
  • Consolidates tools and reduces security team workload – The platform streamlines security management by unifying tools and automating detection and response across the email attack chain. Continuous monitoring and automated remediation reduce manual effort and improve response times.
  • Improves efficiency and scales security operations – Built for modern environments and service delivery models, GravityZone Extended Email Security enables efficient, scalable security for businesses and MSPs. Centralized management, continuous policy enforcement, and streamlined workflows support multi-tenant environments and simplify security across distributed infrastructures.
  • Fast, flexible deployment across any environment – Organizations and MSPs can deploy the solution as a SEG across Microsoft 365, hybrid, and diverse environments, with API-based and combined deployment models supported for Microsoft 365.

Availability

Bitdefender GravityZone Extended Email Security is available now as an add-on to GravityZone endpoint security deployments. For more information, visit here.

¹Gartner, How to Develop an Email Security Strategy, Max Taggett, Nikul Patel, August 20, 2025.

Gartner is a registered trademark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved.

CSA issues “Building a Mythos-ready Security Program”

Posted in Commentary with tags on April 15, 2026 by itnerd

“The ‘AI Vulnerability Storm’: Building a Mythos-ready Security Program” was just issued by the Cloud Security Alliance (CSA) CISO Community, co-authored with SANS, [un]prompted, the OWASP Gen AI Security Project and several CISOs. (See direct links at bottom.)

The Strategy Brief recognizes the increased likelihood of attackers discovering new vulnerabilities, creating new exploits, and using them in complex automated attacks at scale, offers advice for dealing with the spike in risk, and offers some immediate steps to ready organizations for the next waves of threats.

Some industry experts have provided commentary below.

George McGregor, VP, Approov (mobile app security expert):

    “While it’s good to raise visibility and encourage CISOs to have a “Mythos ready plan”, the CSA briefing is far from complete in terms of what that plan must contain, and doesn’t give a sense of the priorities of different steps which should be taken.

   “For example, the focus on accelerating finding and patching vulnerabilities (by using AI!)  may take too much time to be effective, and improved incident management is laudable but doesn’t address the immediate problem either.

   “The briefing does mention reviewing identity and access management  – that should be strengthened AND should include an enhanced focus on urgently putting in place additional methods to STOP vulnerabilities being exploited in the short term.

   “There are appropriate and effective Zero Trust approaches which should be put in place immediately, and this should be the first priority  – specifically,  run-time app and device attestation can block AI agents and permit the validation of every request at APIs and defend against API vulnerability exploitation.”

Sunil Gottumukkala, CEO of Averlon:

   “It’s awesome to see so many industry leaders coming together to produce this guide under time pressure. The operational framing, risk register, and board-level talking points are genuinely useful.

   “However, some diagnostic questions address the wrong near-term problem.  The report focuses in part on whether the organization is using AI, whether employees have coding agent access, and whether they can contribute to open source. These are legitimate AI governance questions, but they’re largely irrelevant to the impending crisis. The threat from Mythos is external. Vulnerabilities are about to land in software every organization depends on, regardless of whether that organization has embraced AI internally or banned it. The diagnostic should ask: Can you patch critical systems in near real time? Do you have the ability to assess exploitability of a given vulnerability within your organization? Do you have a complete software inventory including dependencies? Can your team sustain a surge in patching and malicious activity simultaneously? Do you have pre-authorized containment actions? Those questions determine whether an organization survives the next wave. The AI adoption questions belong later, as enabling steps for longer-term resilience, not as the opening diagnostic.

  “In terms of priorities, the strategy report leads with “Point Agents at Your Code and Pipelines” and “Require AI Agent Adoption”- two steps that are premature for most organizations. The first vulnerabilities to hit won’t be in proprietary code at the onset. They’ll be in vendor software and open source components that organizations consume.

   “The fifth, seventh and eighth priorities (Continuous Patching and Inventory, Reducing Attack Surface and Hardening Your Environment), and the 11th (VulnOps) directly address the incoming threat and should be considered first. AI tooling accelerates all of these, but it doesn’t replace any of them.

   “The report correctly identifies AI adoption as how defenders close the gap long-term, but sequencing should reflect what CISOs need first: know what you have, patch it fast, harden what you can’t patch, and build the operational muscle to sustain that pace.”

Doc McConnell, Head of Policy, Finite State (former CISA Branch Chief, former Senior Advisor for Cybersecurity Policy, Office of Management and Budget [OMB], Executive Office of the President):

   “The scenarios that Mythos enables aren’t routine. AI is a ratchet wrench for cybersecurity—it only goes in one direction: faster. It enables security teams to respond to incidents more quickly, but as the CSA report lays out, it also increases the volume and severity of those incidents.

   “Sure, the basics still apply – building security into the product lifecycle, accelerating the patch cycle, making sure that cybersecurity is central to your company’s risk management and long-term strategy. What’s changed is that the traditional advice to “do the basics, but faster” is no longer sufficient. The report is right – regardless of how skilled your technical team, humans simply can’t go fast enough to keep up with AI.

   “We work primarily with connected device manufacturers – companies that are building the technology that underpins critical infrastructure, manufacturing, medical devices. Mythos is particularly important for those types of devices, because malfunctions or malicious behavior can cost lives.

   “Here are three things I believe companies must do.

   “First, security has to move to the very beginning of the product lifecycle. If you’re waiting until a CVE drops to find out whether your product is affected, you’re already behind. Binary analysis and software composition analysis need to happen continuously from the very first stages of design and development – not as a “final check” when the features are final and the release is scheduled.

   “Second, security needs to keep pace with product development, even as companies accelerate development with AI. That means a real-time SBOM, with automated reachability analysis for new vulnerabilities so that they can confidently prioritize the fixes that matter most.

   “Finally, companies need to understand that even in a capable security environment, incidents will still happen. When they do, defenders need to match attacker speed. That means an automated vulnerability and incident response capability that can triage, communicate, and coordinate remediation across a product portfolio without relying on manual investigation at each step. The EU Cyber Resilience Act assumes that companies will have this kind of capability in place when its vulnerability and incident reporting requirements come into force in September of this year.

   “Companies need to act on this immediately: make it the top topic at your next Board meeting. If you don’t have this capability today, partner with a company that does. I applaud Anthropic and its partners in Project Glasswing for their approach to finding and fixing vulnerabilities. But we have to assume that if Anthropic is doing this loudly and responsibly, someone else is doing it quietly – and they may not have any interest in disclosing what they find.”

Uzair Gadit, CEO, Secure.com (developer of AI-native Digital Security Teammates) :

    “Mythos isn’t introducing new classes of risk, it’s compressing the time it takes to exploit them. That is a different problem entirely. The industry keeps responding with better checklists, but the issue isn’t coverage, it’s decision speed.”

    “Mythos is the first credible signal that vulnerability discovery is shifting from human-paced to machine-paced. Most organizations’ defenses aren’t built for or ready for that.

    “The CSA guidance is appropriate but reads like an incremental response to what is absolutely a non-incremental shift. The issues is applying steady-state security thinking to a system that is accelerating. That mismatch is where the risk sits. If your response to Mythos looks like your response to last year’s threats, you’re already behind.

   “Mythos hype vs. reality:  there’s likely some hype in the claims, but not in the direction in which cybersecurity’s traveling, and that distinction matters. Remember that the evidence isn’t fully public yet, so while some skepticism is justified, dismissing the threat certainly isn’t. True, some of the fear may be amplified, but it’s anchored in a real shift. This isn’t synthetic panic. FUD fills the gap when validation lags capability. That’s exactly where we are right now.” 

   ““The constraint for defenders used to be finding issues, but now, it’s deciding what to fix, in what order, and deciding and doing it fast enough. Security teams are about to be measured on response velocity, not just coverage. Automated response with humans in the loop is about to become the minimum table stakes.”

   “Security teams must stop optimizing for visibility and start optimizing for decision speed. The strongest security posture’s architecture will connect detection, prioritization, and action into a single loop.” 

Noelle Murata, Chief Operating Officer, Xcape, Inc.

   “The emergence of Claude Mythos is not a routine product launch; it is a phase change that renders our current human-centric defense models mathematically obsolete. While the industry is used to the steady drip of vulnerabilities, we have never faced a scenario in which an autonomous model can chain exploits and identify thousands of zero-day flaws across every major OS in minutes, including a 27-year-old OpenBSD bug that survived decades of elite manual audits. The Y2K comparison is flawed because Y2K had a fixed deadline; Mythos represents a permanent, exponential acceleration. This is not a sales ploy or hype; it is a documented leap where a model outperformed human experts on the Firefox attack surface by a factor of 90.

   “For security teams, responding with routine patching is a recipe for catastrophic failure. We must get creative and move beyond symmetrical AI defense. This means adopting deceptive infrastructure – deploying AI-generated honey-tokens and dynamic network paths that shift faster than a model can map them – and shifting from periodic scanning to continuous, agent-led remediation. We are entering an era where the only way to survive the speed asymmetry of a sub-24-hour exploit cycle is to automate the defense so thoroughly that the attacker is forced to hack a moving target. This is an issue of asymmetric cyber warfare.  The adversary has to be successful once, whereas the defenders must be successful every time.

   “My takeaway: If your current vulnerability management strategy still involves a human clicking “Approve” on a Tuesday morning, you aren’t defending a network; you are managing a museum.”

If you want a look at this, you can sign up to download the paper here.