Peer Software to Showcase Enterprise Data Management Solutions at Leading 2025 Industry Events

Posted in Commentary with tags on September 12, 2025 by itnerd

Peer Software today announced its participation in several industry events throughout Fall 2025, including Autodesk University, GITEX Global, Dell Technologies Forum, and NetApp Insight. These engagements reflect Peer Software’s dedication to delivering enterprise-grade distributed file management and orchestration solutions tailored for edge, data center, and hybrid, multi-cloud environments.

Upcoming Events:

  • IBC2025
    When: September 12-15, 2025
    Where: RAI Amsterdam, Amsterdam, Netherlands
    What: As part of the vibrant tech showcase, Peer Software will be present at Dell’s booth supporting Dell’s distributed global media workflow solutions.
     
  • Autodesk University 2025
    When: September 16–18, 2025
    Where: Music City Center, Nashville, TN – Booth 342
    What: Peer Software will showcase its Active‑Active file service solutions that maximize productivity for distributed teams, support AI-driven workflows, and ensure continuous availability in AEC, manufacturing and media environments.
     
  • Dell Technologies Forum
    When: September 30, 2025
    Where: Royal Maxim Palace Kempinski, Cairo, Egypt
    What: At the Dell Technologies Forum in Cairo, Peer Software joins Dell Technologies as a sponsor to showcase innovative solutions for seamless data integration, optimized media and AI workflows, and maximum availability within Dell storage environments.
     
  • GITEX Global 2025
    When: October 13–17, 2025
    Where: Dubai World Trade Center, Dubai, UAE–Hall 6, Stand A10
    What: At GITEX, Peer is teaming with Dell Technologies to present solutions for powering hybrid data interoperability, media and AI workflows, and high availability across the Dell storage ecosystem.
     
  • NetApp Insight 2025
    When: October 14–16, 2025
    Where: MGM Grand, Las Vegas, NV
    What: Proudly teaming with one of its longest-standing storage partners, Peer is showcasing its hybrid Active-Active replication capabilities across globally distributed NetApp NAS environments, Amazon FSx for NetApp ONTAP and advanced edge data management capabilities designed for mixed NetApp and Windows customers.

Founded in 1993, Peer Software specializes in simplifying enterprise file orchestration across distributed environments—from edge offices to cloud and data centers. Its solutions help organizations maintain resilient, always-on data infrastructure while embracing hybrid architectures, AI workloads, and cross-platform interoperability.

HP Uncovers Ultra-Realistic Adobe Invoice and Chained Living Off The Land Technique Scam

Posted in Commentary with tags on September 12, 2025 by itnerd

HP Wolf Security just released its September Threat Insights Report highlightinig how attackers are modifying and improving old techniques to bypass detection and fool users.

By chaining living-off-the-land (LOTL) tools, using advanced visual deception to boost phishing success, and hiding malware in less obvious file types, like images, attackers are sharpening their edge.

Notable campaigns highlighted in the report include:

  • Fake Adobe Reader invoices – ultra-realistic upload screens (see image below) – including a fake loading bar – used to hide a reverse shell inside a small SVG image, giving attackers remote access to user devices.
  • Malware Hidden in Image Pixels – malicious code embedded in pixel data of Microsoft Compiled HTML Help files, with PowerShell and CMD used to execute and then delete evidence.
  • Resurgent Lumma Stealer – spreading through IMG archive attachments, using LOTL and image-based delivery to bypass filters despite a law-enforcement crackdown earlier this year.

The report is here and there is a blog post as well for your reading pleasure.

Rogers to Offer the New iPhone 17, iPhone Air, iPhone 17 Pro, iPhone 17 Pro Max, Apple Watch Series 11, Apple Watch Ultra 3, and AirPods Pro 3

Posted in Commentary with tags on September 12, 2025 by itnerd

Rogers will offer the latest iPhone generation, the latest Apple Watch lineup, and AirPods Pro 3. All four iPhone models — iPhone 17, iPhone Air, iPhone 17 Pro, and iPhone 17 Pro Max — feature the Center Stage front camera for next level selfies, 48MP Fusion camera systems, the latest-generation chips for incredible performance, and fantastic all-day battery life. The beautiful new designs are even more durable and offer 3x better scratch resistance thanks to Ceramic Shield 2. Apple Watch Series 11 offers sleep score, along with up to 24 hours of battery life and a display that’s 2x more scratch-resistant. AirPods Pro 3 feature a new design and incredible sound quality, the world’s best in-ear Active Noise Cancellation of any wireless headphones, hands-free Live Translation, exceptional in-ear fit and stability, heart rate sensing during workouts, and extended battery life.

Customers will be able to pre-order the latest iPhone models on September 12, with availability beginning September 19. The new Apple Watch lineup and AirPods Pro 3 are available for customers on September 19. For complete pricing and availability details, please visit rogers.com.

Get your whole family on Canada’s most reliable 5G+ network with the latest iPhone generation. Rogers covers over 2,500 communities across the country and has been ranked the most reliable 5G+ wireless network in Canada by umlaut. With Rogers additional line discounts, households can mix and match the right options for everyone while unlocking exclusive perks they won’t find anywhere else — like 2x cashback on Rogers purchases with a Rogers Red credit card and 50% off Roam Like Home on our 5G Ultimate Plan.

With 5G+ mobile plans that bring great value, unmatched perks, and great services for the whole family, Rogers is the #1 choice for Canadians. 

Flashpoint’s New Guidebook on Primary Source Collections Is Out

Posted in Commentary with tags on September 12, 2025 by itnerd

Executives don’t ask for “security data feeds.” They want to know: Are we exposed? What’s the impact? How do we respond? 

Modern threat intelligence teams are under constant pressure to deliver precise, contextual answers to these questions—not just for cybersecurity, but also for fraud, legal, insider risk, physical security, and more. These internal stakeholders demand clarity on issues like whether a brand is being directly targeted, who is behind a disinformation campaign, or what fraud tactics are emerging in closed, non-English-speaking communities. 

Flashpoint has released a guide on primary source collection entitled Upgrade Your Threat Intelligence: Gain the Primary Source Advantage.

Traditional “data-first” frameworks produce breadth without depth, forcing teams into a passive role. Such questions can’t be answered by static dashboards or broad threat feeds; they require direct access to original sources, adaptive collection, and expert analysis that ties threats to business impact.

In this report Flashpoint lays out how Primary Source Collection changes the equation of doing data collection the usual way. Without this approach, organizations risk blind spots—unmonitored closed communities, fast-moving threats missed by rigid collection schedules, and generic context divorced from business needs. 

You can read the report here: http://flashpoint.io/resources/e-book/threat-intelligence-gain-primary-source-advantage

Telegram’s Cybercrime Heyday is Fading Says Netcraft

Posted in Commentary with tags on September 12, 2025 by itnerd

Coming off the heels of Netcraft’s insight into homoglyph swapping scams, here’s some new insight for you to read.

Telegram quickly gained favor with bad actors for distributing ransomware to pulling off romance scams, however, new research from Netcraft finds the messaging app may be losing favor with fraudsters.  

What’s replacing it? Going full circle back to good old-fashioned email.   Among Netcraft researchers’ latest findings:  

  • While the number of websites using Telegram integrations tripled from May to June, the number of phishing sites using Telegram to transmit stolen data dropped sharply 
  • As platforms crack down, the battleground for credential theft is shifting  
  • Simultaneous to the drop in Telegram’s usage, there was a 25% uptick in the use of email for credential delivery   

You can read the research here: https://www.netcraft.com/blog/from-bots-to-inboxes-how-phishing-infrastructure-is-shifting-in-2025

Specops Posts New Report Called “Securing the Service Desk”

Posted in Commentary with tags on September 12, 2025 by itnerd

Service desks have evolved from internal support functions into prime hunting grounds for cybercriminals. Armed with AI vishing technologies and carefully crafted social engineering scripts, attackers are systematically targeting the human element of cybersecurity. 

These cyber criminals are weaponizing people’s instinct to help, turning IT staff into accidental accomplices who hand over password resets, disable multi-factor authentication, and grant privileged access. Unfortunately, too many organizations are leaving their staff open to these threats. Traditional technical defenses that cost thousands to implement can be bypassed with a convincing voice, a few publicly available details, and exploitation of predictable human psychology. It’s a simple but effective attack methodology that demands immediate attention. 

Using forensic analysis of recent high-profile breaches, Specops Software reveals in a newly published report Securing the Service Desk how verification failures cascade into operational disasters.

The new report details: 

  • Real-world case studies from M&S, Clorox, Google, Air France-KLM, MGM Resorts, and other major breaches 
  • Why AI voice cloning and social engineering are so effective against service desks 
  • The three-pillar defense strategy that stops social engineering attacks  
  • Five immediately actionable steps to make a vulnerable process secure  
  • How to implement phishing-resistant verification that can’t be bypassed 

The full report is here.

US Senator Calls for FTC Investigation of Microsoft for Ascension Hospital Ransomware Hack 

Posted in Commentary with tags , on September 11, 2025 by itnerd

In a letter to FTC Chairman Andrew Ferguson, U.S. Senator Ron Wyden urged the FTC to launch an investigation of Microsoft and “hold the company responsible for the serious harm it has caused by delivering dangerous, insecure software to the U.S. government and to critical infrastructure entities, such as those in the U.S. health care sector.” This includes the hack of millions of patient records from Ascension, the major hospital system, in 2024 

You can read the letter here: https://www.wyden.senate.gov/news/press-releases/wyden-calls-for-ftc-investigation-of-microsoft-for-enabling-ascension-hospital-ransomware-hack-with-insecure-software

Ensar Seker, CISO at cybersecurity threat intelligence company SOCRadar, commented:

“The letter underscores a long-standing tension in enterprise cybersecurity, the balance between legacy system support and secure-by-default design. What happened at Ascension isn’t just about one bad click or an old cipher. It’s about systemic risk inherited from default configurations and the architectural complexity of widely adopted software ecosystems like Microsoft’s. When a single vendor becomes foundational to national infrastructure, their security design decisions, or lack thereof, can have cascading consequences.

“From a technical standpoint, allowing deprecated encryption like RC4 to remain enabled by default, even at 0.1% usage, introduces avoidable exposure. The challenge is that many organizations still rely on legacy applications that can break when more secure defaults are enforced. Vendors are often reluctant to force those changes out of fear of business disruption, but in security, inertia can be dangerous.

“This incident also reinforces the importance of zero trust segmentation and endpoint detection. A single compromised contractor laptop should never have been able to reach Active Directory in the first place. That speaks to deeper gaps in lateral movement defenses, privilege boundaries, and user behavior monitoring, not just a software flaw.

“Ultimately, this isn’t about blaming one company. It’s about recognizing that national security is now tightly coupled with the configuration defaults of dominant IT platforms. Enterprises and public sector agencies alike need to demand more secure-by-design defaults and be ready to adapt when they’re offered.”

The EU has proven via strict enforcement and high fines that if you give organizations a reason to care about cybersecurity, they will care because it will get expensive if they don’t. It’s time that this sort of thing comes to North America.

New Phishing Campaign Leverages Google AppSheet to Steal Login Credentials

Posted in Commentary with tags on September 11, 2025 by itnerd

Researchers have uncovered a new phishing campaign targeting Google Workspace organizations through fraudulent AppSheet-branded emails. The attack illustrates how traditional security controls become useless when attackers abuse legitimate infrastructure to deliver malicious content that sails past every deployed security filter.

You can find more details here: https://ravenmail.io/blog/appsheet-phishing-scam

Erich Kron, security awareness advocate at KnowBe4, commented:

“The reliance on commonly used or well-known brands in social engineering attacks is nothing new, however, these attacks still remain quite effective. Leveraging brands that are known to potential victims exploits the trust that these brands have worked so hard to establish. These types of attacks are meant to blend in with normal day-to-day activities, further increasing the trust level of the potential victim.

“While people can be suspicious about emails sent from spoofed accounts, by using a platform that sends from a known and trusted source, many technical filters and controls are bypassed, and a key red flag is taken away from the potential victim. It is important that people learn multiple ways to identify potential social engineering attacks, including identifying potentially harmful URLs and other traps.

“Organizations should be aware of attacks such as this and consider the importance of a strong and well-organized human risk management process. This includes technical controls and education.”

This is another example of why you always need to be on your toes as the bad guys in cyberspace are trying to stay one step ahead of you so that they can make your life miserable.

Trump pushes for sleeker government sites, but 73% have security issues

Posted in Commentary with tags on September 11, 2025 by itnerd

As President Donald Trump calls for sleeker, more user-friendly government websites through a new executive order, the Business Digital Index (BDI) team examined how well each state’s main government website is protected — revealing that cybersecurity, not design, should be the priority.

Here’s the methodology the BDI team used to evaluate the cybersecurity of government websites:

And here are the findings:

Best-performing states

  • Democratic-leaning: Connecticut (96/A), Colorado (87/C), Hawaii (83/C)
  • Republican-leaning: Arkansas (96/A), Kansas (81/C), Oklahoma (80/C)

Most improved states (Feb–Aug 2025):

  • District of Columbia (+28 points, from 38 to 66)
  • Nevada (+27 points, from 60 to 87)
  • Texas (+27 points, from 49 to 72)

Worst-performing states (Aug 2025):

  • Democratic-leaning: Delaware (37/F), Minnesota (42/F), Maine (49/F)
  • Republican-leaning: Indiana (27/F), Wyoming (28/F), Iowa (35/F)

States with the steepest declines (Feb–Aug 2025):

  • North Dakota (–18 points, from 68 to 50)
  • Louisiana (–13 points, from 64 to 51)
  • Tennessee (–13 points, from 65 to 52)

Political trends 

  • Democratic-leaning states: 59 (Feb 2025) → 63 (Aug 2025), +8% improvement
  • Republican-leaning states: 57 (Feb 2025) → 59 (Aug 2025), +4% improvement
  • The three lowest-ranked states — Indiana, Wyoming, and Iowa — are all Republican-leaning, with Indiana at the bottom at just 27/100.

To see the full report, please visit:

https://businessdigitalindex.com/research/trump-pushes-for-sleeker-government-sites-but-73-have-security-issues/ 

New agentic AI to boost scalability and efficiency in Ericsson’s enterprise wireless portfolio

Posted in Commentary with tags on September 11, 2025 by itnerd

Ericsson has unveiled the integration of agentic AI into its NetCloud platform, representing a major leap forward in enterprise 5G networking. As NetCloud evolves to effortlessly manage both Wireless WAN and private 5G solutions, Ericsson is also launching the industry’s first enterprise 5G agentic AI virtual expert that will transform how businesses deploy, optimize and manage their 5G networks.

The integration of agentic AI advances Ericsson’s generative AI-based NetCloud Assistant (ANA) from a user-prompt driven tool into a strategic partner empowered by a team of AI agents. By interpreting high-level intents, ANA will be able to handle complex workflows, execute administrator decisions and learn in real time. This reduces burdens for lean IT and Operational Technology (OT) teams while boosting network reliability and user experience. 

Key AI features include:

  • Agentic organizational hierarchy: ANA will be supported by multiple orchestrator and functional AI agents capable of planning and executing (with administrator direction). Orchestrator agents will be deployed in phases, starting with a troubleshooting agent planned in Q4 2025, followed by configuration, deployment, and policy agents planned in 2026. These orchestrators will connect with task, process, knowledge, and decision agents within an integrated agentic framework.
  • Automated troubleshooting: ANA’s troubleshooting orchestrator will include automated workflows that address the top issues identified by Ericsson support teams, partners, and customers, such as offline devices and poor signal quality. Planned to launch in Q4 2025, this feature is expected to reduce downtime and customer support cases by over 20 per cent. 
  • Multi-modal content generation: ANA can now generate dynamic graphs to visually represent trends and complex query results involving multiple data points.
  • Explainable AI: ANA displays real-time process feedback, revealing steps taken by AI agents in order to enhance transparency and trust.
  • Expanded AIOps Insights: NetCloud AIOps will be expanded to provide isolation and correlation of fault, performance, configuration, and accounting anomalies for Wireless WAN and NetCloud SASE. For Ericsson Private 5G, NetCloud is expected to provide service health analytics including KPI monitoring and user equipment connectivity diagnostics. Planned availability is Q4 2025.

Planned to be available Q4 2025, the integration of Ericsson Private 5G into the NetCloud platform brings powerful advantages to enterprise 5G customers, including access to AI features, real-time feature availability, simplified lifecycle management, greater agility across multisite deployments and better administrator controls with distinct user roles and permissions. NetCloud acts as a foundation for future agentic AI features focused on removing friction and adding value for the enterprise. These innovations directly address critical adoption barriers as more industrial enterprises leverage private 5G for business-critical connectivity. With this integration, Ericsson is empowering businesses to overcome these challenges and unlock the full potential of 5G in IT and OT environments.