Author Archive

April Patch Tuesday Commentary From Fortra

Posted in Commentary with tags on April 14, 2026 by itnerd

By Tyler Reguly, Associate Director, Security R&D, Fortra

With 165 Microsoft CVEs and another 82 non-Microsoft CVEs combining for a total of 247 CVEs, I can’t help but wonder who angered Microsoft this month. Here’s hoping that admins everywhere are well hydrated with snacks available because I feel like this mess will take a few days to fully detangle.

There are two vulnerabilities that Microsoft has called out as either exploited or disclosed. The first, CVE-2026-32201, is a spoofing vulnerability in Microsoft SharePoint that is seeing active exploitation. SharePoint can definitely be one of the harder systems to patch and maintain, so admins are going to want to pay close attention to this one. The second is CVE-2026-33825, an elevation of privilege vulnerability in Microsoft Defender, which Microsoft has listed as publicly disclosed. This appears to be the BlueHammer vulnerability that everyone was talking about, which Fortra has written about in detail.

Two things caught my attention this month.

The first is that there are 19 vulnerabilities listed as Exploitation More Likely. In the first quarter of the year, we saw 20 vulnerabilities listed as Exploitation More Likely and now, in a single month, we’re seeing only one less than that total. That is something to pay attention to, especially given the nature of the services affected.

The second is a pair of TCP/IP vulnerabilities. It is rare that you see a truly remote TCP/IP vulnerability these days and that’s exactly what CVE-2026-33827 is… unauthorized, network-based code execution against IPv6. The attack complexity is listed as high because the vulnerability is based on a race condition as well as “additional actions”, as Microsoft calls it, but it is still impressive to see these vulnerabilities identified in 2026.

Based on acknowledgements, the team that found the TCP/IP vulnerability, WARP & MORSE team at Microsoft, also found this month’s only CVSS 9.8 vulnerability. Microsoft has labeled it as Exploitation Less Likely, but it is the infamous network remote code execution vulnerability. In this case, Internet Key Exchange (IKE) v2 is impacted and a remote attacker could trigger remote code execution. Importantly here, we’re not talking about the fake remote code execution that Microsoft uses for Office documents and similar, we’re talking about a legitimate, over the network remote code execution.

For CISOs this month, I’d be more worried about the sheer quantity of items that admins are having to review. There are a lot of CVEs and a lot of one-offs that we don’t normally see. While Windows update and automatic updates for some applications will take care of a lot of the heavy lifting here, there’s still testing that is required before deploying updates this large. Additionally, with the likes of .NET, SharePoint, and SQL Server, there’s always the potential for difficult patches and/or version incompatibility that may crop up during testing.

Patience is going to be a keyword this month, followed very quickly by resourcing. Massive patch drops like this and the conversation around next-gen LLMs means that we need to be aware of the pressure on our teams and the amount of work they are expected to complete. If you still see your security teams as a cost centre, it is time to start rethinking that and looking at the value they bring to protecting your data and your systems. Large patch drops mean that you really need to review your teams to ensure they are adequately resourced.

Guardsquare to Address the Growing Piracy Risk Targeting Streaming Apps at NAB Show Las Vegas

Posted in Commentary with tags on April 14, 2026 by itnerd

Guardsquare will present at NAB Show Las Vegas on Monday, April 20, in the Tech Chat Theater at the Las Vegas Convention Center. In a session titled “When Your Streaming App Is the Attack Surface: Stopping Piracy at the Source,” Guardsquare will examine how attackers increasingly target mobile streaming applications to bypass traditional content protection controls.

WHAT: Guardsquare Tech Chat Session at NAB Show Las Vegas
WHEN: Monday, April 20, 2026 | 2:00 – 2:30 PM
WHERE: Tech Chat Theater (W1242), West Hall, Las Vegas Convention Center

Streaming platforms have invested heavily in DRM, watermarking, and backend protections to safeguard premium content. Yet piracy and revenue abuse continue to grow, often without attackers ever touching the video stream itself. Instead, attackers increasingly target the mobile app through repackaged binaries, modified playback logic, credential harvesting, and direct API abuse.

During this Tech Chat session, Amanda Sutliff, Director of Product Marketing at Guardsquare, will explore how attackers manipulate client-side applications to bypass traditional protections and how media and streaming providers can close this gap by protecting app integrity, detecting runtime abuse, and validating trust before content is delivered.

“Streaming providers have invested heavily in protecting the stream, but attackers increasingly exploit the mobile app itself,” said Sutliff. “By protecting app integrity and detecting tampering at runtime, streaming platforms can stop piracy earlier in the attack chain while preserving the viewer experience.”

In addition to the presentation, Guardsquare will be exhibiting at Booth #W1459 during NAB Show 2026. For more information about the event, visit https://www.nabshow.com/las-vegas/.

Today is Identity Management Day

Posted in Commentary on April 14, 2026 by itnerd

Today is Identity Management Day and this year’s theme is “Finding Identity: The Search for You, Me, and the Machines,” reflecting the reality that machine and agentic identities now vastly outnumber human ones.

Identity Management Day used to be a useful prompt to remind people to turn on two-factor authentication and audit their passwords. However, this year, the more urgent conversation is one most organizations haven’t had yet: do you know who, or what, actually has access to your systems?

Commenting on this is Dan Moore, Sr. Director, CIAM Strategy & Identity Standards at FusionAuth

“Machine and agentic identities now vastly outnumber human identities, dramatically expanding the attack surface. Every AI agent, every automated pipeline, every API key, and every service account is an identity. And unlike a human employee, these identities don’t get offboarded when a project ends. Instead, they accumulate, quietly persisting in the systems, rarely seeing the same level of scrutiny as a human login. 

This year’s Identity Management Day theme – Finding Identity: The Search for You, Me, and the Machines – captures this challenge well. Identity is about governing how humans, machines, and intelligent systems interact securely and at scale.

For businesses building or scaling digital products, this has a very practical implication. The identity layer is now the security perimeter. Breaches are often caused by someone (or something) using a legitimate identity to walk through the front door. Stale credentials, over-permissioned service accounts, and machine identities with no defined lifecycle are where the real risk lives. 

The good news is that getting this right doesn’t require starting from scratch. It requires treating identity infrastructure with the same intentionality as any other critical system, instead of an afterthought.”

UPDATE Cameron Matthews, CISO, Radiant Logic adds this comment:

“Identity Management Day is a timely reminder that identity has become the primary control plane for modern security, especially as organizations expand across cloud, SaaS, and now AI-driven environments. The challenge is that most enterprises are still operating with fragmented identity data, making it difficult to see who has access to what, and whether that access is appropriate or risky. This lack of visibility creates blind spots that attackers increasingly exploit, particularly as non-human identities and automated processes multiply. To address this, organizations need to move beyond static identity governance and embrace continuous identity observability that provides real-time insight into access, behavior, and risk. Ultimately, treating identity as a dynamic, data-driven layer of security is imperative to enable Zero Trust to function as intended in today’s environment.”

Orbital sets date for first test mission to put AI data centers in low Earth orbit

Posted in Commentary with tags on April 14, 2026 by itnerd

The demand for AI compute is surging, but the bottleneck is no longer chips, it’s the power required to run them. Orbital was founded on the belief that the only way to scale compute and unlock future progress on artificial intelligence is to stop competing for power on Earth and generate it in orbit.

Today, the company announced funding from a16z Speedrun to support Orbital-1, the company’s first test mission on its aim of deploying data centers in space.

Orbital is designing and manufacturing a constellation of satellites to operate in low Earth orbit, each housing a cluster of NVIDIA-powered servers. Each satellite is powered by solar arrays and cooled by radiating heat directly into space. In orbit, solar power is available 24/7 in sun-synchronous orbit and stronger, with no weather, no night, and no dependence on the power grid. 

Orbital’s compute infrastructure is designed around a specific technical insight. Training large AI models requires thousands of GPUs tightly coupled, communicating at near-zero latency. That architecture does not translate to satellites. Inference is different. Each request is handled independently, and capacity can be distributed across many nodes. Orbital is focused on inference, where orbital compute can scale as a constellation and serve workloads in parallel.

Orbital’s first satellite, Orbital-1, is scheduled to launch on a SpaceX Falcon 9 in April 2027. Its primary goal is to validate sustained GPU operation in orbit, test radiation hardening, and run AI inference workloads commercially in space post-validation. The company is also in the process of filing with the FCC to deploy a constellation of satellites for orbital AI compute infrastructure.

Orbital was founded by Euwyn Poon, a Cornell-educated engineer and lawyer who previously founded Spin, the micromobility company acquired by Ford. At Spin, Poon built and deployed hundreds of thousands of small electric vehicles across 100 cities and scaled the business to over $100 million in revenue. After exiting Spin, he began investing in AI infrastructure and saw the impending constraint clearly.

Triad Nexus Operations Infrastructure Reborn as Threat Actor Distances Activity from FUNNULL CDN

Posted in Commentary with tags on April 14, 2026 by itnerd

Silent Push has released new research revealing that following US Treasury sanctions in 2025, Triad Nexus has matured its operational security, employing geographic fencing to blind US investigators while simultaneously laundering its infrastructure through account muling and a rotating network of “clean” front companies. 

Triad Nexus is responsible for $200M+ in reported losses, driven largely by sophisticated “pig-butchering” and virtual currency scams. Individual victim losses average $150K, highlighting the high conversion nature of its operations. Despite federal sanctions in 2025, the group has reinstated its global fraud engine, shifting its focus toward emerging markets while maintaining a persistent threat to Western enterprise assets. 

Triad Nexus continues to pose a direct risk to corporate brand integrity and customer trust. The group manages an industrialized catalog of impersonation assets targeting: 

Banking and Fintech: Payment portals for more than 25 global institutions (including Wells Fargo and Bank of America) used for large-scale credential harvesting and “pig-butchering” scams. 

Luxury Retail: High-fidelity clones of brands such as Tiffany and Cartier to intercept high-value consumer transactions. 

Global Logistics: Exploitation of services, including the Vietnam Post, to facilitate regional personally identifiable information (PII) theft. 

You can read the research here: https://www.silentpush.com/blog/triad-nexus-funnull-2026

TrustCloud Launches Native ServiceNow Application to Deliver Enterprise-grade Continuous Control Monitoring for GRC and IRM customers

Posted in Commentary with tags on April 14, 2026 by itnerd

TrustCloud today announced the TrustCloud Continuous Control Monitoring for the ServiceNow Store — the first AI native continuous control monitoring engine built and distributed natively through the ServiceNow Store. The application syncs validated, deterministic control signals directly with ServiceNow IRM (Integrated Risk Management), SecOps (Security Operations), Configuration Management Database (CMDB), and AI Control Tower, closing the signal quality gap that has long limited the ability for enterprise security teams to correlate security operations data with risk and GRC outcomes.

This marks a significant expansion of the strategic relationship between TrustCloud and ServiceNow to accelerate AI-native GRC transformation for CISOs, post ServiceNow’s strategic investment in TrustCloud in 2025.

Proven to Deliver Accurate and Continuous Technology Risk Governance for Enterprise CISOs
The TrustCloud Continuous Control Monitoring Application for ServiceNow is already live, bringing value to CISOs across multiple Global 2000 enterprises. A top 10 pharmaceutical customer increased application assessment throughput from 20 apps per year to 200–300 apps per year with the same team and budget. A  Fortune-500 technology software provider eliminated sampling-based technology risk assessments with 100% risk surface monitoring, replacing low-confidence risk workflows with high-confidence risk planning and reporting. .

The Problem: Point-in-Time Manual GRC Workflows Cannot Keep Pace With Modern Risk
Enterprise CISOs that use ServiceNow as their system of record for Enterprise Risk Management (ERM) and IRM came to TrustCloud looking to solve 4 problems that existed in their ServiceNow IRM workflows. 

  1. Difficult to handle Enterprise Scale: CISOs could not analyze millions of records from 100s of security and IT tools for control assurance validation,
  2. Long timelines to handle Complexity: GRC teams need to validate custom technical, documentation, and process controls quickly, and assess many GRC objectives.
  3. Manual Workflows: Users need to replace 10s of 1000s of manual workflows with accurate agents that work 24×7,
  4. Low-confidence output: CISOs want confidence in the risk posture analysis of their IT and business environment. CISOs do not want their security and risk programs to run on snapshots. Point-in-time assessments and attestation-based dashboards were designed for a world where risk moved slowly enough to be captured annually. That world is gone. AI adoption, expanding attack surfaces, and shrinking security teams have made the status quo not just inefficient, but indefensible. ServiceNow IRM is the system of workflows for 60% of the Fortune 500 but the data and signals used for risk assessments has remained subjective, sampled, and slow. CISOs have realized that AI on bad data — is bad AI.  They need a better way

The Solution: A Continuous Assurance Engine for ServiceNow IRM
The TrustCloud Continuous Control Monitoring Application for ServiceNow closes four structural gaps for enterprise CISOs.

  1. Hybrid Data Fabric to sync terabyte and petabyte level enterprise data:  TrustCloud replaces periodic sampling — a statistical slice of the control landscape that leaves material risk unobservable between cycles, with 100% landscape-based continuous testing across applications, infrastructure, vendors, and documents at enterprise scale.
  2. AI-native agents to deliver fast Time-To-Value (TTV):  Where traditional IRM implementations require 12–24 months and millions in spend before producing meaningful signal, the TrustCloud Continuous Control Monitoring Application deploys natively into existing ServiceNow environments. Findings create incidents and tasks inside workflows teams already own, without re-platforming or lengthy SI engagements.
  3. Multi-faceted control testing: The Continuous Control Monitoring Engine analyzes structured and unstructured telemetry from cloud and on-premises environments at millions of records of scale — enabling automated testing of technical, documentation, and process controls.
  4. High-confidence business impact reporting: TrustCloud’s Control Graph connects every finding from control testing to GRC artifacts, business exposure, and prioritized remediation paths. Trusty, TrustCloud’s AI agent, executes deterministic checks, validates evidence with citations, and generates auditable remediation tasks — with no hallucinations.

Availability
The TrustCloud Continuous Control Monitoring Application for ServiceNow is available now through the ServiceNow Store. The integration supports ServiceNow IRM, SecOps, CMDB, and AI Control Tower.

CData on Claude Managed Agents: Anthropic’s Bet on the Meta-Harness

Posted in Commentary with tags on April 13, 2026 by itnerd

In a new blog post, Amit Naik, VP of Artificial Intelligence at CData, explores Anthropic’s “Claude Managed Agents” and what the concept of a “meta-harness” reveals about the next phase of enterprise AI. While much of the market focus remains on model performance, Naik argues that the real shift is happening at the infrastructure layer that enables agents to operate reliably at scale.

The post examines how managed agent platforms abstract the complexity of orchestration, memory, security, and tool integration, allowing organizations to accelerate development without building everything in-house. At the same time, Naik highlights key trade-offs, including potential vendor lock-in and reduced control over data and agent behavior.

In Naik’s opinion, managed agent infrastructure is a critical battleground for enterprise AI, where success will depend not just on model quality, but on how effectively organizations can operationalize and scale intelligent agents.

Read the full blog here: https://www.cdata.com/blog/claude-managed-agents-anthropic-meta-harness

SOCRadar Puts Out A Research Report On The Stealer Ecosystem

Posted in Commentary with tags on April 13, 2026 by itnerd

The stealer ecosystem has matured into a professionalized criminal economy that most organizations are simply not monitoring closely enough.

While the industry fixates on household names like Lumma and RedLine, a growing class of lesser-known, actively deployed stealers, Void, a C++ infostealer that emerged in late 2025, Datura, Misericorde, Saturn, and others, are quietly collecting credentials, session cookies, and crypto wallet data from victims worldwide, feeding logs into underground markets that fuel ransomware, account takeovers, and business email compromise.

In a just-released research report The Unknown Stealers: From Dark Web to Log Markets, SOCRadar researchers identify up to six simultaneous active campaigns running on the Void infrastructure. Each campaign used slightly modified binaries, a natural artifact of different affiliates configuring their own builds, but all shared the same underlying C2 relay architecture and Steam-based resolution mechanism. Some Steam accounts used in earlier campaigns had already been deleted, indicating active infrastructure rotation. Void is a textbook example of how low-profile, under monitored stealers can operate at scale before anyone is paying attention.

You can read the research report here: https://socradar.io/resources/whitepapers/stealer-dark-web-log-markets

DataBee Posts Blog On Context Aware AI For AI Governance

Posted in Commentary with tags on April 13, 2026 by itnerd

DataBee has a new blog post on context-aware AI for AI Governance that aims to help leaders to deliver defensible, audit-ready decisions in real time across expanding attack surfaces and rapidly evolving regulatory landscapes. 

You can read the blog post here: Context-Aware AI for AI Governance, Threat Detection and Defensible Compliance Documentation

OpenText and S3NS Partner to Deliver European Sovereign Cloud Solutions with Google Cloud

Posted in Commentary with tags on April 13, 2026 by itnerd

OpenText today announced a strategic partnership with S3NS, an alliance between Thales, a French leader in cybersecurity in Europe, and Google Cloud, to bring European organizations a trusted cloud platform based on Google Cloud technology, that meets the highest security and compliance criteria in France to offer strict data residency, regulatory compliance, and operational controls. 

The partnership delivers a hybrid trusted cloud architecture for Europe out of France, enabling organizations to keep their most sensitive data workloads within a locally governed environment, while securely leveraging hyperscaler cloud services for non‑sensitive workloads, innovation, and scale. 

This approach is designed to preserve full interoperability with global cloud platforms, ensuring French and European organizations can continue to benefit from hyperscaler innovation while meeting local regulatory obligations. 

The OpenText and S3NS trusted cloud capabilities meet stringent regulatory and operational requirements, leveraging OpenText’s operational and security experience from delivering government-grade cloud environments in multiple jurisdictions including FedRAMP-authorized, IRAP-assessed, and Protected B-aligned deployments and based on S3NS SecNumCloud qualified Platform, PREMI3NS, to create a hybrid trusted cloud offering designed specifically for France’s regulatory and jurisdictional requirements. This enables organizations in highly regulated industries, such as those managing sensitive citizen, patient, or financial data, to adopt cloud services while maintaining full compliance and control. 

With additional solutions to be evaluated for inclusion over time, the initial hybrid sovereign offering will include:

  • Dedicated Private Cloud: OpenText Content Management and Documentum Content Management for highly sensitive data. 
  • Sovereign SaaS: OpenText Core Archive for SAP Solutions offered as a multi-tenant service with European data residency. 
  • Regulatory Compliance: Supports GDPR, SecNum 3.2, and other European data sovereignty requirements.