Author Archive

Samsung Unveils Galaxy A57 5G and Galaxy A37 5G

Posted in Commentary with tags on April 9, 2026 by itnerd

Samsung today announced the new Galaxy A57 5G and Galaxy A37 5G, the latest Galaxy A series devices that bring Samsung’s newest mobile innovations — including enriched Awesome Intelligence — to more users worldwide. The latest Galaxy A series reflects Samsung’s commitment to expanding AI capabilities across more devices and empowering more users to harness the power of intuitive AI that simplifies everyday tasks. Galaxy A57 5G and Galaxy A37 5G strengthen the experiences users rely on every day with upgrades to performance, camera and display, alongside durability and security features. With long-term security support, the new Galaxy A series is built for the long-haul. Leading the lineup is the Galaxy A57 5G, featuring a slimmer, more refined design and upgraded AI-powered capabilities that make it the most powerful Galaxy A series device yet.

Enriched Awesome Intelligence Designed for Everyday Life

Through the latest One UI 8.5, Galaxy A57 5G and A37 5G extend Samsung’s latest AI innovations to more users, with Awesome Intelligence that helps people get more things done with ease while unlocking new ways to create and stay productive.

Voice Transcription is new to the Voice Recorder app, making it easier to revisit important details from meetings, lectures or calls by quickly transcribing and translating call recordings or turning voicemail audio into text. AI Select is easier to access with a long press on the Edge Panel, surfacing relevant actions directly on the screen to extract text or create content without manually selecting items. AI Select also supports Drag & Drop in Multi-Window layout, allowing users to easily move images into Samsung Notes or Photo Editor for faster editing and improved productivity.

Awesome Intelligence makes everyday photo editing easier than ever. Object Eraser now delivers more natural results when removing unwanted distractions, like a passerby in the background or clutter in a café. On Galaxy A57 5G, Best Face supports more photos and continuous shooting, making it easier to capture the perfect group photos where everyone looks their best. Fan favourite tools like Filters and Edit Suggestions help users quickly refine and share moments without extra effort, while Galaxy A57 5G also features Auto Trim for even easier video editing.

Circle to Search with Google adds multi-object recognition so users can easily explore multiple items in an image at once — from an outfit to surrounding accessories — all in one search.

The new Galaxy A series expands Awesome Intelligence experiences with a choice of agents designed to simplify everyday tasks from search to organizing plans or easily adjusting settings. As a conversational device agent, upgraded Bixby lets users intuitively control Galaxy settings and features using natural language, while Gemini navigates complex tasks across native Galaxy apps and select third-party apps to support faster, more intuitive interactions.

Awesome Camera to Capture Clearer Photos and Videos, Day or Night

As AI becomes more deeply integrated into mobile experiences, camera performance remains essential to delivering the everyday usability and satisfaction users expect.

Galaxy A57 5G and A37 5G deliver brighter, clearer visuals powered by the upgraded camera hardware and an improved Image Signal Processor (ISP). The devices feature a versatile triple-camera system, led by a 50MP main sensor, delivering sharp, detailed images across a wide range of lighting conditions without the need for manual adjustments.

When the lights go down, the Galaxy A57 5G and A37 5G camera adapts seamlessly with Nightography, capturing clear and true-to-life photos and videos even in low light conditions.

Galaxy A57 5G takes photography a step further with enhanced image processing that sharpens detail and reduces noise for even clearer, more vibrant results. It delivers rich contrast and balanced colour even in challenging light, and with a faster shutter speed, users can instantly capture fleeting moments faster and with improved clarity.

Galaxy A57 5G and A37 5G also benefit from AI-based subject recognition and scene optimization to balance portraits, preserve natural skin tones and create clearer background separation. When the moment calls for a wider perspective, the ultra-wide lens captures more in every group photo or landscape view, while the 5MP macro camera reveals fine details up close for added creative flexibility.

Performance for Streaming and Multitasking

Galaxy A57 5G delivers an improved design and performance, combining upgraded CPU, GPU and NPU to deliver improved performance with its sleek and light form. Built for smooth streaming, scrolling and content creation, its refined design features a glossy finish and distinctive triple-camera island for a standout modern look that feels comfortable in-hand.

Despite its slimmer profile, Galaxy A57 5G packs powerful performance. Its 5,000mAh battery supports up to two days of use — powering everything from filming and editing to viewing on the go. Super Fast Charging 2.0 reaches up to 60% in around 30 minutes for a quick boost before heading out, while a 13% larger vapor chamber helps sustain performance during extended gaming or recording. Slimmer bezels and a bright Super AMOLED + display with Vision Booster on both models ensure an immersive, clear viewing experience indoors and outside.

Built for everyday use, Galaxy A57 5G and A37 5G are rated IP68 for water and dust resistance, adding protection in real-world environments and offering users peace of mind when accidents happen.

Long-Term Support and Foundational Security

Galaxy A57 5G and A37 5G reinforce Samsung’s commitment to device longevity, giving users the confidence to rely on their device for years to come.

Samsung provides a fortified layer of device safety, transparency and user choice with Knox Vault, a hardware-based, tamper-resistant security solution. Galaxy A series offers users holistic protection through innovative security and privacy features including Security & Privacy Dashboard, Auto Blocker, Private Sharing, Theft Protection as well as the new Private Album, a Gallery feature that allows users to lock away personal media quickly and easily. Unlike traditional safeguards, the latest A series devices also proactively notify users about potential risks with Privacy Alerts, which are intelligent notifications that offer clearer insight and control over location permissions or suspicious monitoring of sensitive data. Together, these enhancements make security feel as intuitive as the rest of the experience, making device protection easier than ever for everyone.

Availability

Galaxy A57 5G and A37 5G will be available starting April 9 in select markets. Galaxy A57 5G will be offered in Awesome Navy, while Galaxy A37 5G comes in Awesome Charcoal. For added peace of mind, Samsung Care+ offers comprehensive coverage optimized to users’ device needs, including tailored benefits that help protect the device’s value.

New Attack Campaign Weaponizes Trusted Datto RMM, Leaving Businesses Blind to Full Remote Takeover

Posted in Commentary with tags on April 9, 2026 by itnerd

Fortra Intelligence and Research Experts (FIRE) are tracking a previously unseen threat campaign abusing Datto’s legitimate RMM platform as a stealthy command‑and‑control channel. By routing attacker traffic through the legitimate Datto infrastructure, threat actors gain full, persistent remote access to victim systems while evading standard network and endpoint defenses.

For businesses, the impact could be severe: undetected access enables data theft, lateral movement, and ransomware staging, all masked as normal IT activity. The campaign is actively maintained, uses weekly‑recompiled malware, and underscores a growing risk – attackers weaponizing trusted enterprise tools to make compromise effectively invisible.

You can read the details here: https://www.fortra.com/blog/fortra-discovers-datto-living-land-binary

Anthropic restricts release of new AI model after it identifies hundreds of zero-day vulnerabilities

Posted in Commentary with tags on April 9, 2026 by itnerd

Anthropic has unveiled a new AI model, Claude Mythos Preview, capable of identifying hundreds of previously unknown high-severity vulnerabilities, including more than 500 zero-day flaws in open-source software during testing. The model demonstrated the ability to autonomously analyze codebases and surface security weaknesses at scale, significantly accelerating vulnerability discovery.

Testing also showed the model could identify vulnerabilities across major operating systems, web browsers, and widely used software, with some findings involving long-standing flaws that had gone undetected for years.

Due to these capabilities, Anthropic has restricted access to 40 technology companies, including Apple, Amazon and Microsoft, under its “Project Glasswing” initiative rather than releasing the model publicly. The limited group of organizations will use the model to find and patch security vulnerabilities in critical software programs.

Anthropic said the controlled rollout is intended to evaluate both defensive and offensive implications of AI-driven vulnerability discovery, while working with the select partners to manage risks associated with misuse of the technology.

   “The goal is both to raise awareness and to give good actors a head start on the process of securing open-source and private infrastructure and code,” Jared Kaplan, Anthropic’s chief science officer said.

Nick Mo, CEO & Co-founder, Ridge Security Technology Inc.:

   “You can also look at this from another angle: try using Claude to write some code and see how many bugs, or even new zero-days, it produces. Claude Code is already making developers many times more productive than before, which means the number of potential vulnerabilities being introduced is also many times greater. It’s writing code and writing vulnerabilities at the same time. No wonder they’re rushing to get security companies involved first. Digging holes and filling them simultaneously, the question is just which side is faster.”

Noelle Murata, Sr. Security Engineer, Xcape, Inc.:

   “Anthropic’s Claude Mythos Preview has effectively industrialized zero-day discovery, identifying over 500 high-severity vulnerabilities in core open-source software that escaped decades of human and automated scrutiny. These findings include a 27-year-old remote crash bug in OpenBSD and a 16-year-old flaw in FFmpeg, surfaced by a “hypothesize-and-verify” loop that autonomously confirms exploits before reporting them.

   “To manage this massive “vulnerability debt,” Anthropic launched Project Glasswing, a restricted partnership with 40 tech giants like Microsoft and Apple to coordinate global patching. By pledging $100 million in compute credits to open-source maintainers, the initiative aims to bridge the gap between AI-driven discovery and the human speed of remediation, ensuring that the “Glasswing 40” don’t become the only secure entities on an otherwise broken Internet.

   “If Project Glasswing is a “cyber-nuke,” Anthropic is attempting to ensure the “mutually assured destruction” of bugs happens in a controlled vacuum before it hits the production Internet.”

Steven Swift, Managing Director, Suzu Labs:

   “Anthropic has a reputation for exaggerating the capabilities of their models, especially around their ability to find novel vulnerabilities. For example, their models have struggled with line(s) of code that could be vulnerable, but only if you ignored the preceding lines of code, that properly handled the risk and left no residual vulnerability.

   “Looking at what they’ve published so far in their Mythos Preview, they’re again making big claims. Particularly of note, is that the community is not being given access to the model at this time. That means it isn’t possible to audit big claims, and we’re left with Anthropic asking us to trust them, despite having established a pattern of misrepresentation and exaggeration on many of their other publications.

   “Let’s take a closer look at what they’re claiming, and what they’re willing to provide details on. The claim is that Mythos can find and fix novel vulnerabilities in secure code bases, that have been competently hardened via legacy tooling and review processes. To provide evidence of this capability they describe the finding vulnerabilities in the following software packages: OpenBSD, FFMPEG codec H.264, an undisclosed VMM, and “several thousand more.”

   “They estimate they spent $20,000 to find the OpenBSD bug, though they said that was the total run, which found other bugs as well.

   “Great, we have two specific vulnerabilities that they’ve specifically chosen to highlight.

   “They accurately highlight the difference between vulnerability – a POTENTIAL weakness. And an exploit, a functioning piece of code that takes advantage of one or more vulnerabilities.

   “We then move on to exploit development, which is COMPLETELY different than discovering vulnerabilities. Exploits are just code. If you provide any major LLM a sufficient detail of how an exploit works, it should be able to generate a functioning exploit. This is not new. It however relies on two things 1) sufficient detail for the exploit 2) sufficient detail for the system that is being exploited.

   “They describe writing an exploit for FreeBSD which did not require human-in-the-loop interactions. However, they point out that Opus was also able to exploit the same vulnerability, though it did require such human input.

   “Additionally, when looking at the Linux kernel, they admit that they were not able to create functioning exploits with the “vulnerabilities” that were discovered.

   “They also go into great detail about a kernel exploit that Claude wrote. But for this exploit to be possible, they had to provide it PREVIOUSLY DISCOVERED context from a fuzzer. That is again, very much NOT Mythos discovering and exploiting a vulnerability. But merely demonstrating that if you provide sufficient context, these models can write code. This is the capability that they chose to highlight with the longest and most detailed technical breakdown. And while the exploit that was eventually developed is claimed to elevate privileges to root, it needs to be emphasized again here. Mythos did not “discover” this vulnerability. It merely wrote some code, after being provided sufficient technical information into its context as to what code it should write.

   “Anthropic knows what they’re doing. They’re making big claims, because attention is good for their business model. They’re providing just enough detail so that their claims look convincing at first glance. But when you look closer, claims lack substance and rely on implications that all of the examples related prove their claims. This lets the reader naturally jump to conclusions that aren’t explicitly stated, but are easy to make. And they bury this under a lengthy, fairly technical document. Making it yet more challenging for readers to decipher.”

Sunil Gottumukkala, CEO, Averlon:

   “Mythos Preview signals that zero-day discovery is becoming cheaper, faster, and more scalable. Researchers have already shown earlier models can help find serious vulnerabilities, but this represents a real capability jump. Even with restricted access, the broader implication is clear: we should expect more dangerous vulnerabilities to be found across major software platforms, and many organizations still don’t patch fast enough to keep up.

   “Once a patch is released, adversaries often move quickly to reverse engineer it and build exploits. At that point, the impact extends well beyond the small group with direct access to the model, potentially increasing overall breach volume.”

Joshua Marpet, Senior product security consultant, Finite State:

   “Anthropic limiting Mythos access to top defenders via Project Glasswing is a fantastic first step, but it needs to be codified and expanded. Expect a new model to completely break the security landscape every six to twelve months.

   “The speed of this evolution is staggering. Three years ago, LLMs barely wrote functional code. Today, they’re autonomously surfacing zero-days at scale. Tomorrow, they’ll be pointed directly at compiled binaries and firmware, exploiting the products we actually ship, not just source repositories. What does this look like five years from now?

   “Future breakthroughs won’t always come with responsible disclosure. The next leap in offensive AI will easily emerge from adversaries with zero intention of giving us a “head start.”

Security teams are already drowning. When adversaries start using autonomous agents to uncover zero-days, manual triage will completely break. We must shift immediately to defensive systems that cut through the noise and automatically prioritize real, reachable exposure.

   “We have to think beyond corporate consortia. We need a completely new wing of the intelligence community, agencies where humans and autonomous AI agents work side-by-side to acquire, analyze, and counter advanced adversary models.

   “The offensive landscape just went autonomous. We can no longer fight machine-speed threats with manual, point-in-time reviews. Defense must become as continuous and autonomous as the attacks coming our way.”

Bad guys are going to use this technique to pwn you. Thus you really need to put the time and effort into making sure that everything that you use is as secure as possible. And then you need to keep going back and reconfirming that you are still secure because the bad guys are going to do the same thing.

Iranian Cyber Group APT35 Had Already Mapped Every Country Bombed in Operation Epic Fury

Posted in Commentary with tags on April 9, 2026 by itnerd

CloudSEK, a cybersecurity intelligence company, today published a threat intelligence report showing how Iranian state-sponsored hacking group APT35 (also known as Charming Kitten) had already broken into the digital infrastructure of every country Iran attacked with ballistic missiles and drones starting February 28, 2026, during Operation Epic Fury.

The report, titled “The Kitten Had the Map All Along,” is based on the KittenBusters intelligence leak and documents a pattern of cyber infiltration that APT35 carried out across Jordan, the UAE, Saudi Arabia, Kuwait, Bahrain, Qatar, and Israel in the years before the strikes began.

According to CloudSEK’s analysis, every Gulf country subsequently struck by Iran had previously appeared in documented APT35 targeting, reconnaissance, or compromise activity.

CloudSEK assesses that the alignment between cyber reconnaissance and later kinetic targeting is too consistent to dismiss as a coincidence. 

While the company stops short of claiming conclusive proof of a formal intelligence-to-strike handoff, the report argues that the most likely explanation is that cyber operations helped prepare the battlefield by mapping targets, collecting internal data, and maintaining pre-positioned access across multiple countries before the conflict escalated.

The report identifies APT35, also known as Charming Kitten, Phosphorus, Magic Hound, and Mint Sandstorm, as the central actor in this activity. CloudSEK links the group to the IRGC Intelligence Organisation, Unit 1500, Department 40, and says newly examined leaked material indicates the group maintained visibility into government, aviation, energy, legal, financial, and civilian infrastructure across the region in the years leading up to the current crisis.

Key Findings from the Report

CloudSEK’s research says that Jordan, the UAE, Saudi Arabia, Kuwait, Bahrain, Qatar, and Israel all appeared in prior APT35 cyber activity before becoming part of the regional strike pattern.

Among the report’s most significant findings:

  • Jordan was one of the most extensively documented targets, with evidence pointing to prior compromise of the Ministry of Justice and targeting of civil aviation-related infrastructure
  • UAE-linked infrastructure, including aviation-related systems and government assets, appears in the leaked data reviewed by CloudSEK
  • Saudi government and energy-related entities were previously profiled, with the report pointing to compromised policy-related documents and access tied to sectors of strategic importance
  • Kuwait, Bahrain, and Qatar were identified as targets of reconnaissance and operational interest before being drawn into the current conflict environment
  • Israel remained a primary focus, with the report citing prior targeting of industrial systems, modems, civilian digital infrastructure, and influence operations.
     

The report also says the leaked material provides unusually rare insight into the malware, infrastructure, financial records, and operating patterns of APT35. According to CloudSEK, that includes exposed source code for malware families such as BellaCiao and Sagheb RAT, as well as blockchain-verifiable payment trails and infrastructure records that help unify multiple previously distinct personas under one broader operational umbrella.

CloudSEK further assesses that personas historically tracked separately, including Moses-Staff and Al-Qassam Cyber Fighters, may in fact be financially and operationally linked to the same broader APT35 ecosystem.

Cyber Operations Running in Parallel

Beyond historic targeting, CloudSEK warns that the cyber dimension of the conflict is already active.

The report highlights ongoing or likely cyber operations by multiple Iran-linked or Iran-aligned actors, including:

  • Handala Hack, linked in the report to attacks and threats involving Israeli and Jordanian targets
  • Cyber Islamic Resistance, associated with destructive and disruptive operations against military and logistics-related entities
  • APT35 / Department 40, which CloudSEK says may already be positioned for follow-on disruptive or destructive activity
  • APT33 / Elfin, historically associated with attacks on the Saudi energy sector
  • CyberAv3ngers, known for prior targeting of internet-exposed industrial control systems
     

CloudSEK says the immediate risk is not limited to military assets. The company warns that aviation systems, airport operations, ports, financial networks, logistics platforms, telecom, government communications, and industrial control environments may all face heightened exposure as the conflict continues.

Why This Matters

CloudSEK’s central warning is that cyber activity in this conflict should not be viewed as reactive noise or opportunistic hacktivism alone. Instead, the report suggests that pre-conflict cyber collection may have played a strategic role in identifying, understanding, and preparing regional targets well before missiles were launched.

That has serious implications for defenders.

If the report’s assessment is correct, organizations across the Gulf and adjacent geographies may be facing adversaries that already understand their networks, their supply chains, their exposed infrastructure, and in some cases their internal communications or operational dependencies.

Immediate Recommendations

CloudSEK is urging organizations, especially those operating in the GCC, Israel, Jordan, and adjacent sectors supporting regional infrastructure, to take immediate defensive steps, including:

  • Patching exposed internet-facing systems linked to known exploited vulnerabilities
  • Auditing Exchange, VPN, and web-facing infrastructure for compromise
  • Hunting for webshells, suspicious tunneling tools, and malware indicators tied to APT35 activity
  • Rotating privileged credentials and auditing administrative access
  • Reviewing aviation, energy, telecom, logistics, and industrial environments for abnormal activity
  • Blocking known indicators of compromise and validating detection coverage against the malware families referenced in the report
     

Caveat and Analytical Position

CloudSEK notes that while several parts of the dataset reviewed in the report are assessed with high confidence, some elements remain only partially independently verified. The company has therefore framed its conclusions carefully: the evidence strongly supports a pattern of pre-positioning and reconnaissance aligned with later regional strikes, but not every operational detail can yet be confirmed with complete certainty.

Even with that caution, CloudSEK says the risk environment is already severe.

The report concludes that the current period should be treated as critical and active, with the likelihood of further Iranian cyber retaliation remaining elevated in the days and weeks ahead.

 For More Details, Read The Full Report Here

U.S. agencies warn of Iranian hackers targeting water and energy systems

Posted in Commentary with tags , on April 9, 2026 by itnerd

Following up on this alert from the FBI, U.S. cybersecurity and intelligence agencies, including the FBI, NSA, and CISA, have issued a joint warning that Iranian-linked hackers are actively targeting critical infrastructure across the United States, with a focus on water, wastewater, energy, and government systems.

The activity has escalated since last month, with confirmed incidents resulting in operational disruptions and financial losses.

The attacks specifically target internet-exposed programmable logic controllers and industrial control systems used to operate infrastructure, including Rockwell/Allen-Bradley devices. Threat actors have been observed manipulating system data and extracting project files, with the stated intent of causing disruptive effects within U.S. systems.

Officials said the campaign spans multiple sectors and organizations nationwide, though the total number of impacted entities has not been disclosed. The advisory was issued by a coalition of federal agencies, including the Department of Energy and U.S. Cyber Command, as investigations into the activity remain ongoing.

Sunil Gottumukkala, CEO, Averlon:

   “ICS security matters because it underpins physical operations, so a compromise can mean real-world disruption, not just data loss. Many of the systems being targeted were never designed to be secured or updated at the pace modern threats require, and they still rely on legacy infrastructure where monitoring is limited and patching isn’t always feasible without operational impact.

   “Even when these systems aren’t directly exposed, they’re often connected through upstream systems, remote access, or vendor pathways that attackers can leverage as part of a broader attack chain. As threat activity increases and AI accelerates reconnaissance and exploit development, the response window continues to shrink while the ability to safely respond remains constrained.”

Damon Small, Board of Directors, Xcape, Inc.:

   “The targeted disruption of US water and energy utilities is the inevitable outcome of treating critical national infrastructure like a public Wi-Fi hotspot. By leveraging legitimate engineering tools like Rockwell’s Studio 5000 to manipulate project files, Iranian-linked actors have demonstrated that an Internet-exposed programmable logic controller (PLC) is not a poor technical design – it is a pre-staged kinetic weapon. Security leaders must acknowledge that these “nuisance” disruptions are live-fire exercises for more catastrophic escalations that exist entirely outside the bounds of diplomatic ceasefires. The primary business risk has shifted from simple uptime to the physical safety of the communities these utilities serve.

   “Teams must immediately pull every PLC off the public Internet and isolate them behind a Zero Trust gateway or authenticated VPN. For Rockwell CompactLogix and Micro850 series devices, operators should physically set the controller mode switch to the RUN position to block remote logic changes. Organizations must audit for exposed industrial ports such as 44818 and 2222 and rotate all default credentials across the OT environment. Failing to remove these systems from public view is an open invitation for geopolitical adversaries to use your operational uptime as a diplomatic bargaining chip. 

   “In short, the cease-fire will not stop our adversaries from attacking the United States’ critical infrastructure, and this will lead to the unavailability of these services, or worse, to incidents that lead to loss of life and limb.

   “If your water treatment plant or refinery is searchable on the Internet, you are not running a utility; you are hosting a digital sandbox for the IRGC.”

Denis Calderone, CTO, Suzu Labs:

   “When CyberAv3ngers hit Unitronics PLCs back in 2023, it looked like hacktivism. They put political messages on water system displays and moved on. What today’s six-agency advisory describes is different. We warned in March that organizations in energy, water, and government should be actively hunting for pre-positioned access. Today’s advisory confirms that’s exactly what’s been happening, and in some cases has already caused operational disruption and financial loss.

   “Today, we’re seeing the threat actors conducting fairly surgical operations, using Studio 5000 Logix Designer, which is Rockwell Automation’s own PLC programming software, to interact with CompactLogix and Micro850 controllers at the file object level. They’re extracting the programming logic that controls physical processes and manipulating data on HMI and SCADA displays. Think about what that means for a water treatment operator or a power plant engineer. If your display is showing you normal pressure, flow, or chemical dosing levels and the actual values are different, you’re making operational decisions based on false data. That’s how equipment damage and safety incidents happen.

   “Now, the advisory specifically calls out Rockwell Automation and Allen-Bradley, and that makes sense because Rockwell holds roughly 35 to 40 percent of the US PLC market. But don’t let the Rockwell focus distract you. The indicators of compromise in the advisory include traffic on port 102, which is S7comm, and that’s a Siemens protocol. The advisory itself says ‘potentially other branded PLCs’ are at risk.

   “If you’re running Siemens, Schneider, or any other PLC platform and assuming this doesn’t apply to you, look at the port list again: 44818 for EtherNet/IP (Rockwell and others), 102 for S7comm (Siemens), 502 for Modbus (most PLCs). Those protocols are from multiple manufacturers, proving that this is more than just a Rockwell problem.

   “The prescriptive advice here is straightforward. PLCs should never be directly accessible from the internet, period. The advisory confirms that the attackers are simply connecting to internet-exposed devices using overseas IP addresses. But internet isolation alone isn’t enough. Controllers and SCADA infrastructure should sit behind properly segmented OT network zones with monitored firewall boundaries between IT and OT environments.

   “If you have PLCs on flat networks that IT workstations can reach directly, you have a problem. Modbus TCP has essentially zero security controls built in. That protocol originates from 1979 when these were closed systems. Review logs now for suspicious traffic on ports 44818, 2222, 102, 22, and 502. And if you’re running Rockwell devices, reach out to Rockwell through their existing support channels for specific mitigation guidance tied to this advisory.”

The fact that all these agencies are warning about this should show you how serious this problem is. And to be clear, this is a today problem that requires immediate action. Otherwise really bad things will happen.

As Canada doubles down on AI in customer service, customers still want a human 

Posted in Commentary with tags on April 8, 2026 by itnerd

Canadian enterprises are accelerating AI adoption in customer service, but new data suggests they may be pulling back from the channel customers rely on most when it matters. 

According to new ServiceNow research: 

  • 85% of customers prefer a human phone call for complex issues 
  • Just 10% of executives plan to prioritize phone support over the next three years 
  • 59% cite lack of empathy as their top service frustration 

At the same time, two-thirds of customers want self-service for simple issues, and nearly half expect AI to improve speed and efficiency. The tension is clear: customers want automation for convenience, but human connection for resolution and trust. 

As Canadian tech companies build and deploy AI-first CX platforms, are they enabling better human interactions, or quietly optimizing them away? 

Find out more here: https://www.servicenow.com/workflow/crm/cx-shift-study-expectations-ai-era.html

Canada’s First Innovation Space for Accessibility Startups Opens in Toronto

Posted in Commentary with tags on April 8, 2026 by itnerd

Canada’s first innovation hub dedicated to accessibility startups and technologies is launching its flagship location today in Toronto today. With the support of HP Inc., the Access to Success (ATS) Innovation Hub will bring together entrepreneurs, corporations, international networks and government agencies to accelerate connection and unlock new pathways for capital, procurement and technology adoption. 

Located on Toronto’s waterfront at 130 Queens Quay East, the ATS Innovation Hub offers a shared environment that fosters the exchange of ideas, partnerships and problem solving. The hub unites innovators developing solutions across disability sectors including mobility, sensory, cognitive, neurodiversity, and mental health; and thematic areas such as the Future of Work, Active Mobility, Aging in Place and more. With the backing of HP, participants have access to integrated workstations equipped with laptops, monitors, docking stations, printers, and essential workplace technology. This robust infrastructure helps reduce technology access barriers and enables users to focus on building and scaling impactful accessibility solutions. 

The hub will not only drive innovation but also support policy dialogue, promote accessibility technologies, build capital partnerships, and strengthen procurement pathways to speed up market entry in Canada and internationally. It shows how public-private collaborations can boost inclusive innovation and deliver expandable benefits for people with disabilities. 

Representing the first major initiative in an expanded partnership with HP, this launch supports HP’s global mission to accelerate the Future of Work for 150 million people by 2030. The effort began in 2024, when Access to Success was selected for the HP’s Accelerator. Following the success of that program, Access to Success and HP established a long-term strategic partnership focused on expanding accessibility training, advancing inclusive technology standards, and equipping people with disabilities with the skills needed to thrive in the Future of Work. 

For more information, visit accesstosuccess.ca 

Professional Athlete Genie Bouchard Signs Representation Deal with Park Place Technologies 

Posted in Commentary with tags on April 8, 2026 by itnerd

Genie Bouchard, one of the most recognizable names in professional pickleball and 2014 Wimbledon finalist, has signed a representation deal with Park Place Technologies, a global leader in IT infrastructure services.

Bouchard will represent Park Place Technologies with a logo on her uniform, personal appearances, television commercials and support in broad business development and branding opportunities aligned with her growing presence in professional pickleball and her expanding off-court portfolio.As a noted world-class athlete who has successfully transitioned from an elite tennis career to becoming a standout competitor on the professional pickleball circuit, Bouchard continues to build her brand as one of the sport’s most influential ambassadors. Known for her competitive drive, entrepreneurial mindset and strong social media following, she represents a new generation of athletes leveraging performance and personality to create meaningful business impact.

Park Place is both the Official Technology Partner of the Carvana Professional Pickleball Association Tour and Major League Pickleball. Pickleball is one of the fastest-growing sports in the U.S. with nearly 70,000 places to play and nearly 20 million participants.

The partnership reflects Park Place Technologies’ continued investment in its brand and in customer experiences, connecting elite talent with its innovative services and products portfolio. Bouchard is already sporting the company’s logo and hosted an initial “play-with-a-pro” clinic during last month’s Veolia Texas Open. Additional activities, including those tied to next week’s Pickleball Slam 4 to be aired on ESPN on April 15, will be announced.

Nexthink extends DEX to Android and iOS with Mobile Experience

Posted in Commentary with tags on April 8, 2026 by itnerd

Nexthink, the global leader in Digital Employee Experience (DEX) management, today announces Mobile Experience, a natively-built solution that extends Nexthink’s comprehensive experience-level insights to Android and iOS devices.  

 With real-time mobile insights delivered directly to the Nexthink Infinity platform, IT teams can:

  • Detect device performance degradation early: Monitor memory, storage, and deep battery health trends to identify devices at risk of failing before worker productivity is impacted  
  • Understand the root cause of connectivity issues: Continuous Wi-Fi and cellular data network tracking allows IT to distinguish between user-side issues, such as poor signal due to the mobile device antenna, and infrastructure-side issues like weak Wi-Fi coverage in a facility. 
  • Gain continuous visibility into compliance and security posture: Track outdated OS versions, missing patches, and encryption status while adding context from device performance and app connections to better assess risk. 
  • Optimize hardware and battery refresh decisions: IT can move away from blanket refresh cycles by using a data-driven approach to determine which devices need a battery or full replacement and which can remain in use. 
  • Improve visibility into app usage and risks: Gain insights into mobile app activity through network connection trends to better understand app adoption, engagement, AI app usage, and identify any non-compliant apps that could pose potential security risks

Android and iOS add to Nexthink’s growing list of supported technologies. Last year, Nexthink released VDI Experience, which offers enterprises full DEX capabilities for Citrix, Omnissa, AWS WorkSpaces, Azure Virtual Desktop, and Microsoft Windows 365 virtual environments. 

Learn more about Nexthink Mobile Experience or find out how Nexthink can take your IT operations to the next level.  

Iran-linked attacks on U.S. infrastructure surfaced by the U.S.

Posted in Commentary with tags on April 8, 2026 by itnerd

Just before the Iran-U.S. ceasefire deal hit the news, the U.S. announced that Iran-affiliated threat actors attacked critical U.S. infrastructure through internet-facing Operational Technology (OT) systems, which are used to control physical processes such as water systems and energy grids.

Cybernews’ Senior Information Security Researcher Aras Nazarovas provided some extensive commentary on this. He explains what made these attacks possible and what protective measures should be taken with Operational Technology (OT) systems.

This is not just a one-off campaign – it’s a repeatable attack model

“Attackers didn’t rely on anything particularly advanced. They took advantage of OT systems that were supposed to be isolated but ended up exposed to the internet. This is a very common issue in OT systems, and the same kind of attack can be repeated again and again, until the systems are properly secured.”

OT environments often lack the standard security features that IT environments have

“OT environments often don’t have the same security controls as IT systems. Instead, they rely much more on physical security and isolation. These systems are built to stay active 24/7, so a lot of standard protections like encryption or strong authentication aren’t always in place. In some cases, traffic is unencrypted for simplicity, and default passwords are still used.

That’s why isolation is so important. OT systems are supposed to be air-gapped and kept completely separate from IT networks and the internet. In the Iranian attacks on U.S. critical infrastructure, that basic rule wasn’t followed – systems that should have been isolated were exposed online. To avoid this kind of situation, the first step is simple: don’t connect them to the internet in the first place.”