Archive for April 21, 2026

Once Agentic Smartphones Act Without User Permission, What Could Go Wrong? 

Posted in Commentary with tags on April 21, 2026 by itnerd

When a smartphone’s AI agent can execute actions across apps, read messages, interpret meaning, pull data from various apps and act autonomously outside of the user’s knowledge or intent, outcomes can potentially go sideways very quickly.

For the last 15 years, smartphones have responded to their users’ commands. Now, Android 17 threatens this user interaction model and its inherent safety guardrails.

Agentic mobile’s risks are explained in “Android 17: Your Phone’s AI is Evolving to be More Autonomous,” new analysis by Approov Senior Manager Joyce Kuo.  The full analysis is embedded at bottom.

Here’s the upshot:

Android 17 represents a major step towards moving toward the agentic mobile model, in which a device can coordinate tasks across apps as a personal agent. The upside is convenience. The downside is a new class of risk where nothing is technically compromised, but the result is unpredictable and potentially quite wrong. Data may be exposed, actions may be triggered, and workflows may be executed based on manipulated or misunderstood context.

Kuo looks at this expansion of the mobile attack surface beyond traditional app boundaries and user interaction norms, and why existing protections like sandboxing and permissions won’t address this new layer of risk.

Android 17 represents more than just a UX update; it’s a fundamental security and architecture shift – for brands on mobile, for their developers, and for users.

The core issues are straightforward: when systems start acting on your behalf, potentially without the user’s knowledge, how do you as a smartphone-using consumer prevent them from doing exactly what they may otherwise be allowed to do at the wrong time and for the wrong reasons? And how to brands and other app publishers (and their developers) contain these risks?

ZionSiphon malware targets Israeli water and desalination systems

Posted in Commentary with tags on April 21, 2026 by itnerd

Researchers at Darktrace have identified a new malware strain dubbed ZionSiphon designed to target Israeli water treatment and desalination systems, with code specifically built to interact with industrial control system (ICS) and operational technology (OT) environments.

The malware was first detected on June 29, 2025, and includes functionality to identify processes associated with reverse osmosis, chlorine handling, and plant control systems.

Researchers said the malware appears designed to activate only when two conditions are met: a geographic trigger and an environmental trigger tied to desalination or water treatment systems.

Once executed, ZionSiphon scans devices on the local network, attempts communications using Modbus, DNP3, and S7comm industrial protocols, and alters configuration settings related to chlorine levels and pressure controls. Analysis found the Modbus-based attack functionality is the most developed, while the DNP3 and S7comm components appear incomplete, suggesting the malware may still be under development.

The malware appears configured to focus on Israeli IP ranges and includes politically themed embedded strings, according to reporting. 

Josh Marpet, Senior Product Security ConsultantFinite State had this to say:

   “The rise of Hacktivist actions is increasing.  From nation-state (stuxnet), to this apparent politically motivated terroristic action, it is becoming easier and easier to build, configure, and deploy malware against Operational Technology (OT) targets. These targets include water, power, sewer, and other utilities and critical infrastructures. Without an OT specific security program and/or partner, it’s almost impossible for the utility companies to protect against these types of attacks.

   “OT devices are fundamentally different from Information Technology (IT) devices. Compare a laptop to a thermostat, or a factory full of valves and switches. Without specialized knowledge and experience, the normal IT security firms are simply not enough. After all, laptops rarely explode. Factories full of chemicals…can.”

Damon Small, Board of Directors, Xcape, Inc. adds this comment:

   “ZionSiphon is an intent-driven Operational Technology (OT) sabotage malware targeting the logic of water desalination and treatment plants. The immediate business risk is physical process disruption, specifically manipulating hydraulic pressure and chemical dosing, with the possibility of infrastructure damage or public health incidents.

   “Technically, it is highly sector-specific, with dual-trigger checks for Israeli IP ranges and process names like “ChlorineCtrl.” Though a current flaw prevents payload activation, functional Modbus sabotage routines and DNP3/S7comm stubs indicate active development. Despite post-Stuxnet awareness, critical infrastructure remains exposed to 45-year-old unauthenticated protocols. Mitigation requires urgent OT/IT network segmentation, deep packet inspection for unauthorized register writes, and verified hard-coded failsafes to prevent dangerous chemical or pressure levels, irrespective of compromised software.

   “Relying on unauthenticated Modbus to protect the water supply is like locking your front door with a Post-it note that says, “Please don’t come in.”

Jacob Krell, Senior Director: Secure AI Solutions & Cybersecurity, Suzu Labs follows up with this comment:

   “AI has compressed the timeline for developing ICS malware from months to days, and ZionSiphon demonstrates exactly where that trajectory leads. The malware’s dual trigger design, requiring both an Israeli IP range and the presence of desalination or water treatment processes before activating, reflects deliberate targeting of infrastructure that is both nationally critical and geopolitically charged.

   “Israel depends on desalination for a significant share of its drinking water, and ZionSiphon’s target list names specific facilities including Mekorot, Sorek, Hadera, and Palmachim. Darktrace’s analysis found the Modbus sabotage path is fully implemented while DNP3 and S7comm remain incomplete. That development gap will close faster than the industry expects when the structured technical knowledge required to build this tooling is exactly what AI models accelerate.

   “The protocols ZionSiphon targets date to the late 1970s. Modbus has no authentication and no encryption. DNP3 and S7comm carry the same fundamental weakness. Any device on the network segment can issue commands that a controller will execute without question. As geopolitical tensions continue to drive threat actors toward critical infrastructure, these protocols represent an expanding attack surface defended by decades old assumptions.

   “When malware can identify processes associated with reverse osmosis, chlorine handling, and plant control systems, and then communicate directly with the controllers managing them, the only meaningful barrier is the network architecture surrounding those protocols.

   “Every ICS protocol should sit behind multiple layers of network segmentation, with strict access controls governing what can reach those segments. If Modbus traffic is reachable from an IT network or an internet facing system, the architecture has already failed before the malware arrives. The industry also needs sustained investment in zero trust solutions layered on top of these legacy protocols. Modbus and DNP3 are not going away. The installed base is too large, and the replacement cost is too high. The security model has to evolve around them.”

This illustrates the fact that critical systems like these are prime targets for threat actors. Which means that everything possible must be done to protect those systems from getting pwned. Otherwise the consequences would potentially be massive.

The CISA adds eight Cisco SD-WAN flaws to KEV and gives organizations four days to fix them

Posted in Commentary with tags on April 21, 2026 by itnerd

The CISA has added eight vulnerabilities to its KEV catalog, including CVE-2026-20133, another flaw affecting Cisco Catalyst SD-WAN Manager that Federal agencies have been given four days to secure their systems against.

CVE-2026-20133 is an information disclosure vulnerability caused by insufficient file system access restrictions, which can allow an unauthenticated remote attacker to access sensitive information on affected systems through the API. 

The KEV addition follows prior exploitation disclosures involving other Cisco SD-WAN vulnerabilities, including CVE-2026-20127, CVE-2026-20122, and CVE-2026-20128, which prompted earlier emergency directives and patching actions. CISA said the latest KEV update reflects continued active targeting of internet-exposed network infrastructure.

John Carberry, Solution Sleuth, Xcape, Inc. had this to say:

   “Cisco SD-WAN flaws, including the addition of CVE-2026-20133 and two other vulnerabilities to the KEV catalog, signal a critical escalation targeting software-defined perimeters. The main threat is not single bugs, but the rapid weaponization of vulnerability chains, using unauthenticated API access to enable severe file-overwrite and credential-extraction attacks.

   “CISA’s unusually short 4-day deadline confirms pervasive, automated exploitation linked to a Five Eyes-identified global campaign. These flaws stem from systemic API-level access control failures. Organizations must go beyond patching to implement the hardening steps in Emergency Directive 26-03: isolate management interfaces and immediately hunt for “rogue peering” or unauthorized root logins that occurred before the patch.

  • What is the real risk here? The risk is vulnerability chaining. CVE-2026-20133 (information disclosure) allows an unauthenticated attacker to scrape the API for system details, configurations, and internal IPs. This data is then used to weaponize more critical bugs, such as the file overwrite in CVE-2026-20122, essentially giving the attacker a ‘key’ to take control of the system.
  • Are we talking about a full-scale attack here? Sophisticated actors, confirmed by CISA and Five Eyes, have targeted SD-WAN management systems globally since at least 2023. This is a critical threat; owning the SD-WAN Manager grants them long-term persistence and control over all network traffic routing.
  • The “4-day deadline” is the most telling part. CISA’s four-day deadline (April 23, 2026), a significant cut from the usual 14–21 days for KEV items, indicates automated, large-scale exploitation is happening now. Patching without prior collection of forensic logs (admin-tech files) risks merely “painting over the mold” on an already backdoored system. 

   “Asking for a 4-day turnaround on a core networking product is Cisco’s subtle way of admitting they’ve left the screen door open during a hurricane.”

Sunil Gottumukkala, CEO, Averlon follows with this:

   “CISA’s KEV addition is a strong reminder that defenders should not treat CVE-2026-20133 as a routine information disclosure. In an SD-WAN manager, ‘sensitive information’ can include credentials and secrets that materially change the security of the entire environment. Public research shows this flaw can expose the vmanage-admin private key, compromise NETCONF used to manage SD-WAN devices, and leak confd_ipc_secret to enable root escalation.

   “When the vulnerable system is the management plane for distributed network infrastructure, the real-world impact is much larger than what its CVSS rating implies.”

Denis Calderone, CTO, Suzu Labs adds this:

   “Since late February, Cisco Catalyst SD-WAN Manager has been the target of a sustained, escalating campaign. CVE-2026-20127 was the CVSS 10.0 authentication bypass that triggered CISA Emergency Directive 26-03 and forced emergency federal patching. That was wave one. Wave two came in March: CVE-2026-20128, which exposes DCA user credentials, and CVE-2026-20122, which allows an attacker with low-level access to overwrite arbitrary files and escalate to full vManage administration. Both confirmed as actively exploited. Now CVE-2026-20133 is joining the KEV, giving an unauthenticated remote attacker access to sensitive files on the underlying OS through the API. Cisco hasn’t confirmed exploitation of this one. CISA clearly disagrees.

   “There’s also a scoring discrepancy here reviewing. Cisco’s PSIRT submitted this CVE to NVD as 6.5 MEDIUM, with low privileges required. NVD did their own independent analysis and scored it 7.5 HIGH, with no privileges required – matching Cisco’s own advisory, which also says 7.5 and no privileges required. So Cisco’s advisory and Cisco’s NVD submission tell different stories about the same vulnerability. NVD caught it. It is suggested, that since NIST announced they’re pulling back from independent CVE enrichment that this kind of vendor self-scoring inconsistency is exactly the gap that independent enrichment was closing. CVE-2026-20133 is that exact situation playing out in real time.

   “A defender running CVSS-based prioritization sees 6.5 MEDIUM and this sits in a longer queue. Meanwhile, exploitation is, according to CISA, already happening.

   “And CVSS still doesn’t score for chainability. CVE-2026-20133 is information disclosure. Add CVE-2026-20128 to harvest DCA credentials and CVE-2026-20122 to escalate those credentials to vManage admin, and you have full administrative control of a management platform capable of pushing configuration changes to thousands of SD-WAN devices simultaneously. The individual scores don’t capture that math. KEV does, because KEV reflects what’s actually happening in attacks, not what a scoring rubric says about a vulnerability in isolation.

   “If Catalyst SD-WAN Manager is in your environment, patch all three of these. Not because any single CVE is a ten. Because together they are.”

So once again, it’s time to patch all the things in order to keep your organization safe. Given the tight timeline, this should be considered to be a today problem.

Hisense Ignites the Countdown to the FIFA World Cup 2026, Showcasing Next-Generation Home Entertainment and Smart Living

Posted in Commentary with tags on April 21, 2026 by itnerd

Hisense today marks the 50-day countdown to the FIFA World Cup 2026TM with the launch of its global campaign. As a three-time FIFA World Cup official sponsor — having first partnered with FIFA in 2018 and continuing in 2022 — Hisense once again leverages the world’s biggest sporting stage to spotlight a new generation of flagship products designed to elevate how fans watch, live and connect.

At the centre of Hisense’s World Cup lineup is its latest display innovation—RGB Mini-LED—led by the flagship UR9 Series alongside the premium UX. Powered by an RGB Mini-LED backlight system and the Hi-View AI Engine RGB processor, the UR9 Series achieves 100% of BT.2020 colour coverage with exceptional accuracy and vibrancy. Equipped with a native 180Hz refresh rate, a Devialet-tuned 4.1.2 Multi-Channel audio system and region-optimized panels, it delivers up to three times deeper blacks and higher contrast, allowing for clearer details even in bright daylight. The Obsidian Panel reduces reflections to just 1.5–1.8% by absorbing ambient light. The UR9 RGB Mini-LED brings stadium-grade sight and sound straight to your living room.

At a recent event held at Home of FIFA in Zurich, Hisense unveiled its new 2026 RGB Mini-LED TV range, while also confirming its role as the official and exclusive Video Assistant Referee (VAR) Review TV Provider for the FIFA World Cup 2026TM in the United States, Canada and Mexico. Hisense has upgraded the display equipment in the FIFA World Cup Video Operation Room (VOR Room) to Hisense RGB Mini-LED TVs, which will deliver ultra-high colour gamut and precise colour reproduction, enabling clear and authentic restoration of live match footage for video assistant referees.

Expanding the Boundaries of Premium Display

Hisense redefines home entertainment with its cutting-edge laser display portfolio — headlined by the XR10 and L9Q — turning living spaces into immersive private stadiums for matchday viewing.

The Laser Projector XR10 introduces next-generation processing with 6,000 lumens brightness and 6,000:1 viewing contrast, as well as an intelligent projection capability of up to 300 inches, enhancing motion clarity and contrast for every thrilling moment of fast-paced football action. Meanwhile, the L9Q Laser TV, which captivated FIFA President Gianni Infantino during his visit to the Hisense booth at CES 2026, creates stunning cinema-grade screens up to 200 inches with ultra-short throw projection and vivid colours. Together, this premium laser ecosystem seamlessly transforms any home into a lively, stadium-like arena, placing the excitement and atmosphere of the FIFA World Cup 2026TM directly into viewers’ living rooms.

Smarter Living, Seamlessly Connected

Extending beyond entertainment, Hisense’s home appliance portfolio enhances the overall matchday experience through smarter, connected living. The U8 air conditioner — recognized by the Red Dot Award — combines refined design with efficient climate control, while the PureFlat Smart Series refrigerator, powered by the ConnectLife platform, enables seamless interaction across devices — supporting meal planning, content sharing and in-home communication, and introducing the concept of a more social, connected kitchen.

Bringing Fans Closer, Everywhere

As the countdown to the FIFA World Cup 2026TM accelerates, Hisense continues to bridge cutting-edge technology with global sporting passion — delivering immersive viewing, connected experiences and smarter living solutions that bring people closer to the game and to each other. Through continuous innovation across both home entertainment and appliances, Hisense remains committed to its vision of “Innovating a Brighter Life” — transforming everyday moments into extraordinary, shared experiences on the world’s biggest stage.

For more information, please visit hisense-canada.com.

86% of Canadians say AI-generated content should be disclosed, new YouGov and Meltwater report finds 

Posted in Commentary with tags , on April 21, 2026 by itnerd

A new report from YouGov and Meltwater reveals that 86% of Canadians say AI-generated content should be disclosed, highlighting a strong expectation for transparency as generative AI becomes more embedded in marketing and communications.

The report, Trust in the Age of Generative AI, draws on insights from nearly 10,000 consumers across seven global markets, including Canada, and examines how the rapid rise of AI-generated content across video, audio, images, and text is shaping perceptions of authenticity, credibility and trust.

While generative AI presents new opportunities for brands, the findings suggest that how AI is used and communicated will be critical to maintaining trust, with Canadians placing strong emphasis on transparency, accountability, and authenticity.

Key Canadian findings from the report include:

  • 84% say they are concerned about the future of AI in everyday life
  • 86% worry they may not be able to distinguish between real and AI-generated content
  • 66% believe they can identify AI-generated content
  • 51% of Canadians say that are not excited about AI, compared to 39% who are
  • 57% say their trust would be reduced if brands used AI-generated content without clearly disclosing it
  • 71% say AI-generated content feels less authentic than human-created content, and 76% say it feels less personal
  • 52% are less likely to engage with social media posts, and 42% are less likely to engage with advertisements, if they know the content is AI-generated
  • For brand storytelling, 51% prefer content created entirely by humans, compared to just 3% who prefer mostly AI-generated content

About the report

The findings are based on a global study of nearly 10,000 consumers across seven markets, exploring attitudes toward generative AI and its impact on trust, media consumption, and brand perception.

Download the full report here. 

Amazon Expands Partnership with NHLPA

Posted in Commentary with tags on April 21, 2026 by itnerd

Amazon Canada and the National Hockey League Players’ Association (NHLPA) today announced an expansion of their ongoing partnership, with Amazon committing more than $1 million CAD to local community organizations in 32 North American cities during the 2026–2027 hockey season.

The partnership reflects Amazon’s broader commitment to supporting the communities it serves, and where its employees live and work. Since launching in 2024, the partnership with the NHLPA has focused on delivering local impact by working closely with players and community organizations across Canada and, more recently, the United States.

As the first event of the expanded partnership, Amazon and the NHLPA are kicking off in Ottawa, where three local organizations with connections to NHLPA Goals & Dreams will each receive a $25,000 CAD donation to support their work making hockey more accessible and inclusive: Ottawa Power Wheelchair Hockey LeagueCanadian Blind Hockey Association, and Next Shift Canada.

Through the 2025–2026 NHL season, the partnership delivered more than $60,000 CAD in donations in Canada and more than $230,000 USD in the U.S., with organizations already seeing the impact–from expanding facilities to increasing access to critical community programs.

As part of the expanded partnership, NHL players will visit Amazon facilities in all 32 cities throughout the 2026–2027 NHL season, connecting with employees and presenting donations to local organizations making a meaningful impact in their communities.

Give the gift of a little time back this Mother’s Day with the help of Samsung

Posted in Commentary with tags on April 21, 2026 by itnerd

Between managing busy mornings, staying on top of family schedules, and carving out a rare moment to herself, most moms aren’t asking for more. They’re asking for a little time back. This Mother’s Day, Samsung’s latest devices are designed to do exactly that: simplify the day-to-day, capture the moments that matter, and create space to recharge.

Below are a few gift ideas perfect for every kind of mom.

Together, Samsung’s ecosystem works seamlessly in the background, helping mom stay organized, connected, and present, without adding more to her plate. And to give mom that extra peace of mind, Samsung also offers Samsung Care+ as a safety blanket.

ProductKey SpecsPricingColours
Galaxy S26 Ultra:
From coordinating family calendars to quickly summarizing long school emails or planning a last-minute trip, the Galaxy S26 Ultra acts like a smart assistant in her pocket. AI-powered features help streamline everyday tasks, while the pro-grade camera ensures she never misses a milestone, without needing to fiddle with settings.
Snapdragon® 8 Elite Gen 5 (3nm), 12GB / 16GB RAM, 256GB / 512GB / 1TB storage, 6.9″ Dynamic AMOLED 2X (QHD+), 5,000 mAh battery, Quad camera (200MP + 50MP UW + Tele x2), 12MP front, DeX (wireless)256GB: $1,899.99 CAD512GB: $2,179.99 CAD1TB: $2,599.99 CADCobalt Violet, Sky Blue, Black
Galaxy A57:The Galaxy A57 is built for the juggle, switching between video calls, messaging, online shopping, and social scrolling throughout the day. With a sleek design and reliable performance, it keeps up from the morning coffee rush to late-night wind-downs, with a battery that won’t quit halfway through.Super AMOLED display +
Refresh rate up to 120 Hz
Vision Booster, 12MP ultra-wide-angle camera, 50MP wide-angle camera, 5MP Macro Camera,12 MP front camera, 5000 mAh, IP68
128GB: $699.99256GB: $799.99Fantastic Navy Blue
Galaxy A37:Whether it’s staying in touch with family group chats, capturing everyday moments, or streaming her favorite shows after a long day, the Galaxy A37 delivers a smooth, dependable experience.Super AMOLED screen,
refresh rate up to 120 Hz, Vision Booster, 8MP ultra-wide-angle camera, 50MP wide-angle camera, 5MP Macro Camera, 12 MP front camera
128GB: $599.99256GB: $699.99Fantastic Charcoal
Galaxy Buds4 Pro:Whether she’s taking a solo walk, squeezing in a workout, or enjoying a quiet cup of coffee before the house wakes up, the Galaxy Buds4 Pro help create a moment of calm. With immersive sound and noise control, they make it easy to tune in, or tune out, whenever she needs it most.2-way speaker (11mm + 6.1mm), enhanced Adaptive ANC (5-level), IP57, Bluetooth 5.1, 6–7 hr playback, AI assistants + gesture controls$329.99 CADBlack, White, Pink Gold (e-Store Exclusive)
Galaxy Book6:Whether she’s working remotely, helping with homework, or finally getting around to that passion project, the Galaxy Book6 is built to keep up. With a lightweight design and seamless connectivity to her Galaxy devices, she can move effortlessly from answering emails at the kitchen table to editing photos or organizing plans for the week ahead all on one powerful, portable device.Intel® Core™ Ultra 7, 14″ / 16″ IPS (WUXGA), 8GB / 16GB / 32GB RAM, 256GB / 512GB / 1TB SSD, Dolby Atmos®, Wi-Fi 6E, 16–18 hr battery$1,449.99 – $2,099.99 CADGrey, Silver
Galaxy Tab S10 Lite:With the Galaxy Tab S10 Lite, mom gets even more flexibility. The Galaxy Tab S10 Lite is perfect for note-taking, streaming, or keeping the kids entertained, making it easy to switch between productivity and downtime, wherever the day takes her.10.9-inch display, 8MP rear camera, 5MP front camera, Exynos 1380 128GB: $399.99 CAD256GB: $489.99 CAD Grey, Silver, CoralRed
Galaxy Ring:Effortlessly blending style with substance, the Galaxy Ring is the kind of low-key, high-impact tech she’ll actually want to wear. Sleek, minimal, and designed to complement her everyday look, it tracks sleep, activity, and wellness insights quietly in the background with no screens or distractions. It’s a subtle flex that keeps her in tune with her health while keeping her on trend.Sizes 5-13, 8MB Memory, Up to 7 days of charge$549.99 CADTitanium Black, Titanium Silver, Titanium Gold

Sage and PwC use agentic AI to get Sage Intacct finance teams up and running faster

Posted in Commentary with tags on April 21, 2026 by itnerd

Sage and PwC today announced a new, agentic AI-powered delivery model for Sage Intacct implementation, designed to help finance teams get live faster and with greater confidence.

By embedding AI directly into the implementation process, Sage and PwC are reducing manual effort across design, configuration and testing. The approach helps shorten deployment timelines, improve consistency and make it easier for customers to move from project kick-off to day-one value.

Announced ahead of Sage Future, taking place in San Francisco from April 28-30, 2026, the initiative reflects Sage’s broader focus on delivering practical, trusted AI that helps businesses simplify complexity and move faster with confidence.

This approach combines Sage’s financial management platform with PwC’s delivery expertise and a more automated, repeatable model to reduce manual effort across design, configuration and testing, improving consistency from day one.

Implementation remains a barrier to progress

As businesses look to modernize finance and access real-time insight, implementation continues to be one of the most complex parts of adopting new systems. Traditional approaches often rely on time-intensive, manual processes, slowing down adoption and placing pressure on internal teams and partners alike.

Sage and PwC are addressing this by introducing a more automated and repeatable approach to delivery. By embedding AI and intelligent workflows into the implementation process, the collaboration reduces manual effort across key stages, helping to streamline deployment and improve readiness from day one.

Early deployments are showing strong potential to streamline implementation and improve overall quality, helping customers adopt Sage Intacct more effectively.

PwC is applying this approach across Sage Intacct implementations globally — bringing agentic AI out of the abstract and into the practical reality of how businesses deploy and begin using their systems.

To find out more about this new approach join Sage and PwC at Sage Future by signing up here.

Peer Software Strengthens Global Partner Program to Unify Fragmented File Environments for the AI Era 

Posted in Commentary with tags on April 21, 2026 by itnerd

Peer Software today announced the launch of its enhanced Partner Program, which aims to strengthen strategic alliances and motivate partners to leverage new resources for accelerated growth across targeted industries, including government, media and financial services. The revamped program provides value-added resellers (VARs) and technology partners with expanded enablement tools, vertical-specific support, and differentiated solutions to attract enterprise customers.

As organizations increasingly modernize their infrastructure to support AI workloads and digital transformation initiatives, Peer Software is optimizing its partner ecosystem to address these demands better. The program now offers larger incentives for revenue growth, enhanced training courses, enablement materials, and new certifications for partners in the Peer Software ecosystem. Areas of focus include channel (system integrators, MSPs and distributors), cloud, and technology partners.

The updated program is built on a solid foundation and integrates the Peer File System Analyzer, enabling partners to conduct rapid assessments of storage infrastructure. This capability enables partners to identify optimization opportunities, qualify customers more quickly, and build compelling value propositions for Peer Software’s solutions.

Key enhancements to the Peer Software Partner Program include:

  • Vertical-Focused Tracks: Tailored resources, use cases, and go-to-market support for government, financial services, media/content, and other priority sectors.
  • Technical Enablement Tools: Access to the Peer File System Analyzer for storage environment assessments and solution recommendations.
  • Co-Sell and Marketing Support: Joint demand generation campaigns, strategic positioning assets, lead referral processes and tradeshow/event participation to boost partner revenue opportunities.
  • Partner Certification and Training: Expanded curriculum to qualify partners in advanced architecture, deployment best practices, and performance optimization.
  • Dedicated Partner Success Team: A centralized support function to accelerate onboarding, deal acceleration, and technical escalation resolution.

The updated program reflects Peer Software’s commitment to driving partner-led success and providing differentiated value across industry ecosystems. With expanded enablement and alignment to market needs, Peer Software and its partners are positioned to capture growing demand for intelligent, resilient data management solutions.

More details on Peer Software Partner Program

Cobalt Says That 1 in 5 have experienced an LLM security incident in last year

Posted in Commentary with tags on April 21, 2026 by itnerd

Cobalt has today released new research that shows how organizations are struggling to keep pace with a rapidly evolving threat landscape shaped by nation-state activity, AI-driven attacks, and expanding supply chain risk. The 2026 State of Pentesting Report reveals that 75% of organizations rank third-party software as a top risk, yet 86% deploy vendor tools without proof of security testing, while AI vulnerabilities are emerging as significantly higher risk and harder to remediate. A new blog from Director of Offensive Security Research, Joe Brinkley, connects these findings to real-world attack scenarios, including the weaponization of trusted third-party tools.

A few highlights:

  • Nation-state threats are rising fast, with 20% of all respondents and 40% of financial services organizations ranking them as a top risk
  • 93% have observed attackers using AI to enhance sophistication, while 32% of AI/LLM vulnerabilities are rated high risk, nearly 2.5x higher than average
  • One in five organizations has already experienced an LLM-related security incident
  • Organizations using continuous, programmatic pentesting are 4.5x more likely to remediate critical issues within three days

The research also digs into a real-world case study involving the weaponization of third-party tools in a destructive supply chain attack, underscoring why “paper trust” models like SOC 2 and annual pentests are no longer sufficient in a threat environment moving at machine speed.

While the report requires a sign up to get it, it’s worth reading and can be found here: State of Pentesting Report 2026 | Cobalt