Archive for the Commentary Category

Car hacking experiment: what can the world’s best hackers do with today’s supercar?

Posted in Commentary with tags on January 22, 2026 by itnerd

Cybernews has released an eye-opening experiment in which security researcher Sam Curry and automotive hacker BusesCanFly demonstrate how easy it is for cybercriminals to take control of any car. Not only are personal vehicles in danger, but ambulances, police cars, and large commercial fleets, with implications that could possibly cause life-threatening harm. 

Modern cars are no longer just machines. They’re more like computers on wheels, and the video shows how easy it is to use a custom-built app to track and unlock vehicles with minimal data, even remotely.

Car data reveals routes, relationships, and allows vehicle hijacking 

According to Curry, alongside improving overall connectivity, the risk of exploiting vulnerabilities grows, including easily accessible personal information, not only from the vehicles, but hacking the car dealerships themselves. 

The documentary shows that with just a VIN (Vehicle Identification Number), it is possible to remotely track where a vehicle was driving and where it is going now. And this can be utilized beyond personal reseasons, reaching political intimidation. 

You can find more information here or see the released video below:

New LLM Runtime Phishing Exploit – Proof of Concept from Unit 42

Posted in Commentary with tags on January 22, 2026 by itnerd

 Unit 42 has published research that raises flags on what could be the next big shift in cybercriminals leveraging LLMs for more effective phishing attacks and the next frontier of web attacks. 

Unit 42’s latest research, The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time, details a novel technique where attackers could use LLMs to assemble phishing attacks in the browser at the moment of execution.

Why this is a game-changer for attackers:

  • Prompt-Based Obfuscation: Malicious code is hidden within text prompts to bypass network analysis, only “translating” into an attack once it reaches the browser.
  • Unique Victim Payloads: The LLM generates a unique, polymorphic variant for every individual victim, making static signatures and blocklists useless.
  • Trusted Domain Delivery: Malicious code is transmitted over legitimate LLM service domains, allowing malicious traffic to blend in with trusted API calls.
  • Bypassing Guardrails: Attackers can “jailbreak” LLM APIs to deliver malicious snippets under the guise of legitimate code.

The most effective defense against this new class of threat is runtime behavioral analysis that can detect and block malicious activity at the point of execution, directly within the browser. 

Read the blog for more details: http://unit42.paloaltonetworks.com/real-time-malicious-javascript-through-llms

Google alums raise $5M pre-seed for Sparkli: The First Multimodal AI-Native Learning Engine for children

Posted in Commentary with tags on January 22, 2026 by itnerd

Children today have an unprecedented ability to explore ideas, yet their digital world gives them so few ways to do it. When an eight-year-old asks how to build a city on Mars, the answer should ignite imagination, not flatten it into a wall of text. Built for this moment, Sparkli is launching a new model of learning shaped for the developing brain, using real-time multimodal AI that gives children the agency to build their own interactive learning expeditions on any topic in minutes. Sparkli transforms these inquiries into multi-disciplinary, real-life journeys that foster future-ready skills, including technology, design thinking, sustainability, financial literacy, entrepreneurship, emotional intelligence, and global awareness.The Zurich-based company has raised a $5 million pre-seed round to bring its multimodal learning engine to families and schools around the world.

The pre-seed round will allow Sparkli to scale its generative learning engine and prepare for a private beta launch in January 2026. The company is currently validating its platform through a strategic pilot with one of the world’s largest private school groups. This partnership provides Sparkli with a powerful testing ground across a network of more than 100 schools and over 100,000 students. 

Sparkli’s approach is shaped by three shifts essential for modern childhood education, a strategy designed to solve the ‘Agency and Curiosity Gap’. First, it forces a Velocity Shift by moving away from static curriculums to real-time relevance where children explore new topics the moment they emerge. Second, it drives an Engagement Shift by replacing the dry ‘AI chatbot wall of text’ and passive screen time (watching videos, playing video games) with a multimodal playground of visuals, voice, and playable simulations. This turns consumption into active, gamified inquiry rooted in educational value. Finally, Sparkli prioritizes a Skills Shift that focuses on capabilities such as creativity and complex problem solving rather than memorization.

Underpinning these interactions is a system that builds an interest and knowledge graph for every child over time, enabling the platform to deliver truly personalized and adaptive learning.In practice, this means if a child asks to build a city on Mars, Sparkli doesn’t just list facts but instantly generates an interactive expedition where they learn age-appropriate physics, simulate the environment, and build their own city. As they design the infrastructure and explore logistics, the platform challenges them to engage in debates, make strategic choices based on real arguments, and ultimately reflect on and defend their decisions.

Sparkli’s early pilots illustrate these shifts in action. In one classroom, eight-year-olds used the platform to simulate building their own mini food cart businesses, where teachers observed students debating concepts like budgeting and customer experience. In another pilot, students took control during an unstructured ‘Freedom Friday’ session, initiating their own expeditions into topics ranging from game design to the Big Bang. Parents testing the consumer version described a notable difference in the quality of their children’s screen time, with one parent remarking that their son returned from a session eager to outline his sustainability plan if he were Mayor for a day.

Realizing the potential to reimagine this learning experience, CEO Lax Poojary and his co-founders, who are veterans of Google Area 120, Search, and YouTube, assembled a team of engineers and designers, including experts from ETH and the education sector. Together, they are building a platform that fuses generative AI, pedagogy, motion design, and game mechanics to address a fundamental failure in how content is delivered. Existing systems are often slow, standardized, and unable to keep pace with discovery. Textbooks take years to update, traditional edtech depends on static libraries and drills, and open-ended AI tools and chatbots, though powerful for adults, are unsafe or overwhelming for young users. This growing gap creates a major market opportunity for Sparkli to deliver a capable yet safe platform that pairs modern generative technology with strong guardrails and age-sensitive design.

By solving this, Sparkli positions itself to disrupt the $7 trillion global education market, a sector widely predicted to be one of the most significant use cases for artificial intelligence. While Duolingo has built the largest consumer EdTech business to date by digitizing rigid language drills, Sparkli targets a significantly larger addressable market by reimagining how the next generation acquires knowledge

Sparkli’s vision is to become the AI-native operating system for childhood development. The company plans to extend its platform from curiosity into creation, giving children tools to build and prototype projects directly inside Sparkli. It seeks to connect classroom learning with home exploration and ultimately support learners as they grow into adolescence and beyond. The long-term goal is to give every child a lifelong AI companion that remembers what they cared about at age six and helps them develop those passions at seventeen.

EnGenius Private Cloud Empowers MSPs with Secure, Scalable On-Prem Network Management

Posted in Commentary with tags on January 22, 2026 by itnerd

EnGenius Technologies has announced the release of EnGenius Private Cloud (EPC)—a fully on-premises network management platform purpose-built for Managed Service Providers (MSPs) and system integrators who require full control over their deployments without relying on public cloud infrastructure. EPC runs on any standard PC, server, or virtual machine, giving partners the ability to manage enterprise-class networks while keeping all data inside their own environment.

Why EPC Is Essential for Today’s MSPs

MSPs and system integrators need EnGenius EPC because many of their customers cannot or do not want to use public cloud platforms due to data privacy, compliance, and security concerns. Many governments agencies mandate that all network management systems, logs, and user data remain strictly within their own infrastructure to meet data sovereignty, privacy, and security regulations. These policies prohibit the use of public cloud controllers, restrict external data transmission, and require full visibility and control over how information is stored, accessed, and audited. As a result, MSPs and system integrators serving government clients must deploy fully on-prem solutions like EnGenius EPC to ensure compliance, maintain operational independence, and protect sensitive information from being processed or stored outside government-controlled environments.

EPC: The Solution for Secure, Controlled Network Management

EPC solves these pain points by delivering a fully on-premises, multi-tenant management platform that keeps all data local, operates reliably even without internet, and significantly reduces long-term operational costs. As a 100% locally hosted and secure solution, EPC ensures that network management, logs, client data, and device credentials never leave the premises—giving partners complete control over customization, backups, policies, and overall performance.

EPC provides:

  • Centralized control of thousands of access points and switches
  • True multi-tenant architecture for managing multiple customers with complete separation
  • Unified configuration and rapid rollout across distributed sites
  • Full data ownership, supporting privacy-sensitive and compliance-driven environments

By combining cloud-level convenience with local, on-prem autonomy, EPC empowers MSPs to deliver premium managed services while maintaining the security, privacy, and performance their customers expect.

Key Features & Capabilities of EnGenius EPC

  • Fully On-Premises Deployment — Runs on local PC, server, or VM with no dependency on public cloud.
  • Complete Data Ownership — All logs, credentials, and client data stay inside the organization.
  • Multi-Tenant Architecture — Easily manage multiple customers or sites with full isolation.
  • Centralized Network Management — Unified dashboard for APs, switches, and multiple networks.
  • Scalable Design — Supports thousands of devices across distributed deployments.
  • Cloud-Like Convenience — Zero-touch provisioning, monitoring, and configuration automation.
  • Offline Operation — Controller continues working even with limited or no internet access.
  • Advanced Security Controls — Localized user authentication, access rights, audit logs, and more.
  • Flexible Deployment Options — Works on standard Linux environments and supports container-based architecture.
  • Customizable Policies & Backups — Full control over retention, updating schedules, and system backups.

With EPC, EnGenius redefines what on-premises network management can achieve—delivering flexibility, privacy, and reliability that the cloud simply cannot match.

The EPC will be available for download on the EnGenius website starting in January 2026 for EnGenius customers. For additional product specifications and purchasing information, visit: EnGenius Private Cloud

BforeAI Threat Advisory: Scam Activity Leveraging U.S. Actions in Venezuela in January 2026

Posted in Commentary with tags on January 22, 2026 by itnerd

PreCrime Labs, the threat research team at BforeAI identified a large cluster of suspicious domain registrations leveraging US military operations in Venezuela and the resulting information vacuum.

When the PreCrime Labs team investigated new domains related to the Venezuela matter and registered from December 1- January 12, 2026, a total of 829 domains were determined to be suspicious. An even more recent surge in domain registrations, primarily in January 2026, dominates the dataset. Approximately 546 domains were registered in the time period between January 3-5, 2026 alone. This represents a significant spike in activity compared to the December 2025 period leading up to the January 2 military action in which 110 related domains were registered over the entire month.  

The link to the live report will be: https://bfore.ai/report/scam-activity-leveraging-united-states-actions-in-venezuela/

Most S&P 500 sites fail CPPA consent rules, now in place as of Jan 1st 2026

Posted in Commentary with tags on January 22, 2026 by itnerd

California’s new CPPA risk-assessment rules took effect January 1, 2026.

Lokker  who are experts in online data privacy and compliance have just released new data showing most S&P 500 U.S. companies are not technically compliant, despite their consent banners and privacy policies.

Lokker’s Quarterly Risk Report – Q1 2026 examines how privacy risk is shifting from written commitments to technical reality. With CPPA risk assessment requirements now in effect, it looks at both what regulators, courts, and plaintiffs are now looking for, and what organizations must be able to demonstrate across their web properties.

Based on continuous scans of S&P 500 websites, Lokker found that over 90 percent load third-party trackers before consent, and roughly 80 percent rely on consent tools that actually fail in practice. As enforcement risk shifts from policy language and public statements to provable technical controls, web tracking technologies are becoming a primary exposure vector.

What Lokker scans reveal: Using continuous scanning across large enterprise websites, Lokker analyzed how tracking technologies behave in real-world conditions, not audit snapshots. The results are sobering.

Across industries, Locker consistently observed that trackers initiate data collection before meaningful consent is obtained. Consent management tools often appear compliant on the surface, yet fail under technical scrutiny. In many cases, third-party scripts activate on page load, across subdomains, or during specific user interactions that bypass consent controls entirely.

These failures are rarely intentional. They arise from complex modern web stacks, fragmented ownership of tracking tools, and constant changes introduced by marketing, analytics, and third-party vendors.

But an absence of intent isn’t a standard that regulators are likely to apply.

Enforcement and litigation risk: The regulatory environment is intersecting with an aggressive litigation landscape that’s often receptive to claims that web tracking technologies operate as unlawful surveillance mechanisms when deployed without proper notice and consent.

Recent cases have seen claims proceed based on the mere presence of certain tracking technologies on a website. This means that a single misconfiguration or script can expose an organization to regulatory inquiry and/or class action litigation.

Quarterly Risk Report – Q1 2026: https://lokker.com/quarterly-risk-report-q1-2026/

/

UK and China establish “Cyber Dialogue”, while EU targets “high-risk” foreign tech suppliers

Posted in Commentary with tags , , on January 21, 2026 by itnerd

British and Chinese security officials are seeking to established a “Cyber Dialogue” to discuss cyberattacks amidst hacking accusations by both sides, according to Bloomberg.

The forum is supposedly designed for security officials to manage threats to each other’s national security, by improving communication, allowing, for the first time, private discussion of deterrence measures, and avoiding and preventing escalation, as communicated by people familiar with the matter who spoke on condition of anonymity.

The collaboration comes after China’s top diplomat Wang Yi and British National Security Adviser Jonathan Powell met in Beijing in November agreeing to “confront and resolve issues” and “further enhance regular dialogues” after British officials said a month earlier that they believed Chinese hackers had spied on UK government computer systems for over a decade, and Chinese state-backed actors had compromised its critical infrastructure.

Meanwhile, the European Commission unveiled an updated cybersecurity framework that would tighten protections for critical infrastructure by targeting “high-risk” foreign suppliers of digital equipment and services. 

The proposed legislation marks a shift from previous voluntary guidelines toward mandatory rules giving the Commission the authority to require removal of these high-risk vendors from key sectors such as telecommunications and other infrastructure essential to the EU’s economy and security. 

Although the proposal doesn’t explicitly name specific companies, officials have previously singled out concerns over equipment from Chinese technology firms like Huawei and ZTE.

The overhaul also includes a revised Cybersecurity Act designed to secure information and communications technology supply chains, streamline certification processes, and improve incident reporting and threat alerts.

The updated law would also empower the EU Agency for Cybersecurity (ENISA) to issue early warnings and support collaboration with Europol and national response teams.

Michael Bell, Founder & CEO, Suzu Labs had this comment:

“The Cyber Dialogue is a pragmatic move, not a naive one.

   “In March 2024, the UK publicly accused China of breaching the Electoral Commission and targeting parliamentarians’ email accounts. They sanctioned individuals linked to APT31. They summoned China’s ambassador. Beijing called the accusations “fabricated and malicious slanders.”

   “Eight months later, Wang Yi and Jonathan Powell met in Beijing and agreed to establish a Cyber Dialogue. That looks like whiplash, but there’s logic to it.

   “Cyber operations exist in a gray zone. They’re not acts of war, but they’re not peacetime activity either. Without communication channels, an incident response could be misread as aggression. Escalation becomes more likely when neither side understands the other’s red lines.

   “There’s precedent. In 2015, Obama and Xi established a cyber agreement with hotlines and joint dialogue mechanisms. US officials reported a drop in certain Chinese intrusions afterward. It wasn’t perfect. The US later accused China of violations. But it created a framework for managing the problem.

   “The UK is trying something similar. They’re not pretending the threat doesn’t exist. They publicly attributed attacks, imposed sanctions, and issued warnings about Volt Typhoon pre-positioning in critical infrastructure. Now they’re opening a channel to discuss deterrence and prevent miscalculation.

   “Whether it works depends on whether both sides actually use it. The 2015 US-China agreement produced results until it didn’t. The UK-China dialogue could follow the same trajectory. But having the channel is better than not having it.

   “The alternative, pure confrontation without communication, creates its own risks. In cyberspace, those risks are harder to see until they materialize.

   “In regards to the EU targeting “high-risk” tech suppliers, honestly, it sounds like Brussels ran out of patience.

   “The 5G Security Toolbox has been voluntary guidance since January 2020. It recommended that member states assess high-risk vendors and impose restrictions where necessary. Six years later, only 10 of 27 member states actually did anything meaningful about Huawei and ZTE. The patchwork approach created exactly the security gaps the Toolbox was supposed to prevent.

   “The new legislation fixes that by making removal mandatory. High-risk suppliers must be phased out within three years of the law taking effect. The scope expands beyond mobile networks to fixed and satellite infrastructure across 18 critical sectors: water, electricity, cloud services, semiconductors, medical devices.

   “The Commission will conduct EU-wide risk assessments based on country of origin and national security implications. ENISA gets real authority: early threat alerts, centralized incident reporting, coordination with Europol. A formal catalogue of high-risk suppliers will follow via implementing act. Huawei and ZTE are expected to be on it.

   “This is expensive. Germany alone faces an estimated €2.5 billion to replace Huawei equipment across Deutsche Telekom, Vodafone, and Telefónica. EU-wide, operators are looking at roughly €3 billion annually in higher infrastructure costs. That’s not a rounding error. It’s why voluntary guidelines failed. Member states and operators kept finding reasons to delay.

   “The legislation removes the option to delay. It’s regulatory coercion, and it’s probably necessary. Security through voluntary compliance only works when everyone complies. When half the member states ignore the guidance, you get exploitable gaps.

   “For enterprises operating in the EU, this means vendor audits, procurement changes, and certification requirements through ENISA. The three-year timeline sounds manageable until you account for supply chain constraints and the reality that everyone will be competing for the same alternative equipment.

   “Both approaches respond to the same underlying reality: Chinese state-affiliated actors have demonstrated capability and intent to compromise Western infrastructure. The UK and EU are choosing different tools to manage that risk.

   “The UK is betting that communication reduces the chance of catastrophic miscalculation. The EU is betting that removing the attack surface is more reliable than trusting dialogue.

   “Neither approach is wrong. They’re addressing different aspects of the same problem. The UK approach manages the state-to-state relationship. The EU approach manages the technical supply chain risk.

   “For enterprises, the implication is clear: you can’t rely on a single approach. You need security architecture that accounts for both diplomatic uncertainty and regulatory mandates. The technology landscape is fragmenting, and your vendor strategy needs to fragment with it.”

John Carberry, Solution Sleuth, Xcape, Inc. follows with this comment:

   “The UK-China cyber dialogue signals a shared understanding that unchecked cyber tensions pose serious escalation risks for global powers. Creating forums for discussing deterrence and intentions could minimize miscalculations, even if persistent accusations of espionage between the two nations remain unresolved.

   “Concurrently, Europe’s implementation of mandatory restrictions on “high-risk” suppliers demonstrates that dialogue doesn’t automatically equate to trust. The EU’s framework signifies a stricter stance on supply-chain security, transitioning from voluntary recommendations to legally binding regulations with tangible economic impacts. This shift from voluntary guidelines to mandatory exclusions for companies like Huawei and ZTE suggests that while the UK pursues dialogue, the wider Western approach is leaning towards complete technological decoupling.

   “ENISA’s augmented responsibilities for early warnings, incident reporting, and cross-border responses further underscore Europe’s focus on cybersecurity as a matter of technological sovereignty rather than mere IT best practices. By granting ENISA and Europol enhanced early-warning capabilities, the EU is fortifying itself against the very state-sponsored actors the UK is now engaging with diplomatically.

   “Collectively, these trends illustrate a two-pronged strategy: diplomatic efforts to influence state conduct, combined with structural defenses to mitigate systemic vulnerabilities. Cybersecurity policy is increasingly serving as both a diplomatic instrument and a component of industrial strategy.

   “You can’t build a bridge of trust with diplomacy while simultaneously bricking up the windows to keep the “partners” out of the house.”

Trust isn’t built overnight. Which I suspect will mean that any real traction on this will take a while to materialize any results. Which is fine as long as everyone sticks to it.

Liquibase Accelerates in FY25 as New ARR Rises More Than 85 Percent

Posted in Commentary with tags on January 21, 2026 by itnerd

Liquibase today announced fiscal year 2025 momentum driven by accelerating new customer demand, record Liquibase Community adoption, and continued operating discipline.

Late 2025 outages across major internet services were a reminder that change can cascade at scale into widespread disruption. As AI pushes more automation downstream, database changes increasingly require enforcement before production and evidence after release.

Database Change Governance is the enforcement and evidence layer for database change. It prevents risky changes from reaching production and produces proof of what ran, where, and when after release, so teams can ship faster without sacrificing control. Without it, a breaking schema change can ripple across applications, data products, and automated workflows.

FY25 momentum highlights

  1. New ARR increased more than 85 percent year over year
  2. Liquibase Community surpassed 15 million downloads in 2025
  3. Liquibase launched Liquibase Secure and Liquibase 5.0 in FY25
  4. Operating efficiency improved dramatically over the last few years, strengthening operating leverage and execution discipline.
  5. Liquibase Secure won the 2025 DevOps Dozen Award for Best DevOps for DataOps and Database Solution
  6. Liquibase was also named a finalist in three DevOps Dozen categories: DevSecOps, Database DevOps, and Mainframe Modernization
  7. Expanded platform partnerships with Databricks and MongoDB to bring governed database change to modern data platforms and AI driven applications.

Liquibase also expanded its ecosystem partnerships to meet teams where database change is happening, inside modern data platforms and AI driven applications. In 2025, Liquibase partnered with Databricks to bring modern change management to the lakehouse and announced a strategic technology integration with MongoDB to bring governance to AI driven database changes.

Governance customers use in real delivery workflows

Liquibase Secure helps teams ship database change with guardrails and proof. Teams use Policy Checks to enforce policies before changes reach production, and Reports to generate audit ready evidence of what was applied, where, and when. Together, these governance capabilities integrate into automated deployments, reducing late stage surprises and making releases more predictable.

Customer feedback reinforces this. As one TrustRadius reviewer, a Senior Configuration Management Advisor, put it: “Liquibase fixes a problem everyone has but doesn’t know there’s an answer for.”

Industry recognition

Liquibase Secure was named the winner of the 2025 DevOps Dozen Award for Best DevOps for DataOps and Database Solution.

Leadership additions to scale the next phase

Liquibase strengthened its leadership team in FY25 to support product velocity, enterprise execution, and international growth.

  1. David De Paula, VP International Sales, former VP Sales, EMEA and APAC at CloudBees
  2. Mike Runco, VP Sales, North America, former VP of Sales at UnifyApps
  3. Ryan McCurdy, VP of Marketing, former SVP of Marketing at Astronomer
  4. Steve Surace, VP of Engineering, former VP of Engineering at Datto

Arcitecta to Showcase its Advanced Research Data Management Platform at Supercomputing Asia 2026

Posted in Commentary with tags on January 21, 2026 by itnerd

Arcitecta today announced that it will demonstrate its advanced Mediaflux® research data management platform in booth #14 at Supercomputing Asia 2026, January 26-29, at the Osaka International Convention Center in Japan. The conference will be held in conjunction with HPC Asia 2026 (SCA/HPCAsia 2026).

Arcitecta is returning to Supercomputing Asia 2026 to share its vision for elegant, intelligent research data management. At a time when data is growing in volume, complexity, and value, Arcitecta’s Mediaflux platform brings balance to the research ecosystem, connecting people, instruments, storage and compute into a unified, metadata-rich environment. Built for HPC-scale workloads and diverse, data-intensive disciplines, Mediaflux transforms data into a living, dynamic resource that accelerates discovery.

Birds of a Feather Session: Managing and Sharing Large Scientific Data Sets

Arcitecta’s Global Business Development Lead, Robert Mollard, will join other distinguished panelists in an informative session to discuss the complexities of sharing large amounts of collected scientific data and to explore sharing techniques, models and software tools that address this challenge. Attendees will gain an understanding of contemporary practices and actionable methods for improving collaboration between research organizations with large data stores used for analysis and with HPC workflows and software.

Topic: Managing and Sharing Large Scientific Data Sets

Date and Time: Thursday, January 29, 2026, 11:30 am – 12:30 pm

Location: 12F Conference Hall of the Osaka International Convention Center

Panelists:

  • Robert Mollard, Arcitecta – Global Business Development Lead
  • Bronis R. de Supinski, CTO for Livermore Computing (LC) at Lawrence Livermore National Laboratory (LLNL)
  • Michael Hennecke, Distinguished Technologist at HPE – DAOS Systems/Software Engineering
  • Chris Maestas, IBM – CTO for Data and AI Storage Solutions
  • Matt Starr, Spectra Logic – CTO, VP APJ Sales, and VP Federal Sales
  • Thomas Metzger, Americas HPC Technical and Business Director at Intel Corporation
  • Werner Scholz, Xenon Systems – CTO and Head of R&D
  • CJ Newburn, NVIDIA Architect – IO and HPC Software Strategy
  • Jake Carroll, Director, Research Computing Centre – University of Queensland

The New Digital Preservation

Long-term data retention was once treated as a niche concern, limited to archives and specialized domains. Today, research data is routinely retained for decades, often by default rather than by design. This shift is reshaping how institutions think about storage, lifecycle management, cost, and sustainability.

Digital preservation is no longer a “future” problem; it is a challenge that organizations must begin addressing now. Mediaflux delivers intelligent, policy-driven data placement across the entire storage hierarchy, from high-performance hot tiers to economical long-term archives.

Cerabyte, the pioneer of ceramic-based data storage solutions, will join Arcitecta in booth #14 to jointly demonstrate how the two companies address the need for data management in conjunction with long-term retention, enabling data storage that is easily accessible, permanent, sustainable and energy-efficient.

To schedule a meeting with the Arcitecta team at SCA/HPCAsia 2026, visit: https://www.arcitecta.com/events/2026/sca/chat/

Cloover secures $1.2 billion financing commitment to build the AI operating system for energy independence

Posted in Commentary with tags on January 21, 2026 by itnerd

The globe is racing to secure its energy future as electricity demand rises, grids come under pressure, and households face growing uncertainty over costs and supply. At the same time, demand for decentralized energy solutions like solar, batteries, heat pumps, and EV charging is surging. The missing piece has been infrastructure that can deliver these systems at scale. Cloover was built to solve this gap by creating the operating system for energy independence – and today the company has announced a landmark financing commitment to accelerate the rollout of residential energy independence.

Cloover has secured $22 million in Series A equity financing alongside a $1.2 billion debt facility, bringing total capital commitments to $1.222 billion. The equity round was led by MMC Ventures and QED Investors, with participation from Lowercarbon Capital, BNVT Capital, Bosch Ventures, Centrotec, and Earthshot Ventures. The debt facility was provided by a leading European bank to fund customer and installer financing on the platform. Cloover also benefits from a €300 million guarantee from the European Investment Fund, which underpins its financing programs and enables scalable, low-cost capital for the energy transition. In total, Cloover has now raised more than $30 million in equity financing and secured over $1.3 billion in debt.

The scale of this commitment reflects the urgency of the problem Cloover is addressing. Europe’s energy transition depends on hundreds of thousands of small and mid-sized installers, yet most operate with fragmented software, manual workflows, and limited access to capital. Traditional banks are ill-equipped to finance residential energy assets at speed and granularity, creating delays that stall installations and price many households out of clean energy. Cloover takes a fundamentally different approach by embedding financing directly into installer workflows and pairing it with an end-to-end software platform built specifically for decentralized energy.

At the heart of this innovation is AI-powered credit underwriting, which evaluates long-term energy savings rather than traditional credit metrics alone. Cloover also pre-finances public subsidies, allowing consumers to benefit immediately from state incentives. For institutional investors, Cloover opens the door to a new impact-aligned infrastructure asset class, backed by real performance data, climate impact tracking, and full transparency across the value chain.

Cloover is building the digital nervous system of the distributed energy economy. Its AI-powered platform integrates workflow management, financing, procurement, and energy optimization into one seamless operating system. It automates complex workflows, detects risks early, and empowers data-driven decisions from the first customer leading to long-term energy-management through Cloover’s EMS and dynamic tariffs. Further, Cloover’s AI Finance co-pilot helps SME installers solve capital flow challenges along the whole value chain and improve liquidity to enable faster growth. By replacing disconnected tools and slow financing processes with one integrated system, Cloover enables installers to close more projects, move faster, and serve a broader customer base.

Installers using Cloover offer financing at the point of sale, increasing conversion rates and unlocking new market segments. Automated workflows reduce administrative burden and improve throughput, while access to capital shortens cash cycles. On average, installer partners generate 30 percent incremental revenue through Cloover by reaching customers they previously could not serve. Homeowners benefit from access to decentralized energy without large upfront investments and see between 20 and 30 percent savings on energy costs through optimized system performance and financing.

By connecting manufacturers, installers, households, and investors in a unified ecosystem, Cloover ensures energy projects scale efficiently, transparently, and collaboratively – mirroring the way software unlocked scale for e-commerce two decades ago.

Cloover was founded after the team conducted extensive research with hundreds of energy installers across Europe and saw the same pattern repeat across markets. Demand for decentralized energy was accelerating, but the industry lacked the infrastructure to support mass adoption. Financing emerged as the most decisive bottleneck. While other sectors such as automotive benefit from thousands of specialized lenders, residential energy assets have only a handful. Cloover was created to close this gap by combining financing with modern software infrastructure and building a platform that supports installers rather than competing with them.

Cloover grew revenues more than 8x in 2025 while remaining profitable, approaching $100 million in sales. The company is projecting $500 million in 2026 and $1 billion in 2027, underscoring the explosive demand for distributed energy solutions.

The company’s growth is driven by powerful market forces. Rising energy demand driven by AI, grid instability, and the expansion of electric mobility are increasing pressure on existing systems. Governments are accelerating policy support for decentralized energy, while households are seeking greater control over their energy costs and supply. These trends are converging to create one of the largest infrastructure opportunities of the coming decade.

With the new capital, Cloover will expand into additional European markets and is considering France, Italy, the UK, and Austria, deepen its platform with further AI-driven workflow automation and financing products. For now, the team’s long-term vision is for Cloover to become the global platform powering decentralized energy, connecting manufacturers, installers, investors, and households through a single operating system designed to deliver affordable, and independent energy at scale.