Posted in Commentary with tags Hisense on September 3, 2025 by itnerd
Hisense continues to strengthen its leadership in premium display technology. According to the latest data from international market research firm Omdia, Hisense ranked No. 1 worldwide in shipments of 100-inch and above TVs in the first half of 2025, capturing 58% global volume share.
This milestone underlines Hisense’s long-term investment in large-screen innovations and its pivotal role in shaping the future of home entertainment.
To demonstrate its position at the forefront of display technology, Hisense will showcase its newest RGB Mini-LED technology at IFA 2025 in Berlin starting this week. The centrepiece of Hisense’s exhibit will be the company’s latest version of the world’s largest RGB Mini-LED TV, a striking 116-inch display that brings images to life with purer colours, exceptional brightness and precise contrast, achieving 100 per cent BT.2020 colour gamut coverage for a truly lifelike viewing experience. Beyond the technical performance, Hisense’s RGB Mini-LED is designed to bring users closer to reality, transforming every viewing moment into an emotionally compelling experience.
RGB Mini-LED, along with other display technologies and AI-powered home appliances, will be the focus of Hisense’s media event at IFA 2025. The event will take place on September 5, 2025, from 11 a.m. to 12 p.m. at the City Cube Berlin (Lower Level) under the theme Own the Moment.
Visitors to IFA can explore Hisense’s full range of premium visual and smart home products at Hall 23a of Messe Berlin from September 5–9.
Posted in Commentary with tags Zoho on September 3, 2025 by itnerd
Zoho Corporation, a global technology company, today announced 40% YoY customer growth from global small businesses in the first half of 2025. Zoho’s broad, deep, and integrated product ecosystem uniquely addresses critical technology needs of SMBs: usable, scalable, affordable, and contextual tools. To further support this segment, Zoho is also releasing new developments across its SMB tech portfolio designed to improve productivity, revenue optimization, and operations for customers, allowing them to focus on future growth and opportunity.
In order to boost productivity, alleviate operational pain points, and encourage growth, Zoho is introducing the following developments to six key SMB solutions: Bigin by Zoho CRM, Zoho Commerce, Zoho Solo, Zoho Contracts, Zoho Start, and Zoho Notebook.
New Revenue Optimization Capabilities
Bigin by Zoho CRM was launched in 2020 as a unified platform that small business owners can use to keeps track of customers and sales, regardless of their familiarity with CRM systems. New capabilities to Bigin include built-in booking management, integrations with Quickbooks Online, Shopify, as well as 10+ payment gateways, including Stripe and PayPal. This is in addition to Bigin’s pre-built integrations with Zoho Books and Zoho Payments, which enable businesses in the Zoho ecosystem to manage their finances seamlessly. The platform features on-device AI assistance for mobile apps, powered by Gemini Nano, Apple Intelligence, and Galaxy AI. It supports lead capture from Google Ads, WhatsApp, TikTok, and Meta Ads.
Several new Bigin capabilities will be rolling out in the coming months. They include:
Integration with Zoho MCP, allowing users connect their Bigin account with LLMs like Claude to get contextual insights around their CRM data.
Integration with Zia AgentStudio, allowing users to build custom AI agents for Bigin
Three prebuilt AI agents—Reply Assistant, Cross-sell Genie, and Churn Analyzer
AI-powered writing assistance, live translation, record summary, and dashboard creation
Automated chart and KPI creation powered by Zia
Zoho Commerce—part of the broader Zoho’s Finance platform—helps businesses build, market, and manage their storefronts, allowing users to maximize revenue intake.
With the recently enhanced version of Zoho Commerce, businesses are enabled to sell digital downloads along with physical products, manage loyalty point programs to attract more customers, and prevent revenue leakage by tracking and recovering cart abandonment. It also focuses on end-to-end order lifecycle management and workflow automation, allowing retailers to streamline their entire internal process.
Additional key updates from Zoho Commerce include:
More than 15 new store templates for faster online store creation
Native mobile applications for iOS and Android phones
Social selling is now supported, allowing retailers to sell using multiple channels including WhatsApp. This allows customers to view the catalogue from the business profile, add items to cart, and automatically transition to the online store for a smooth checkout experience.
Businesses who operate in B2B and wholesale can now manage quote requests, price negotiations, and set credit limits.
Zoho Solo is a unified application that allows “solopreneurs” to perform essential business functions such as client management, expense tracking, invoicing, payments, task management, and reporting—all from within a single solution. Zoho Solo is mobile-first and completely optimized for iPads and Android tablets. The app now supports timesheets, notes, reminders, mileage tracking, events, financial reports, and card scanning. There will be more Zoho Solo capabilities rolling out in the coming months, including, multi-currency support, inventory management, and AI insights to help users drive revenue.
New Operations Capabilities
Zoho Contracts streamlines the contract lifecycle, improves compliance, mitigates risks, and now includes an AI assistant to help with every stage of the contract process. Small businesses have access to self-service templates, automated approvals, online negotiations, and built-in e-signatures that accelerate the contract turnaround.
New additions to Zoho Contracts include:
Deeper integration with Zoho CRM
Enhanced digital signature capabilities
Multi-organization support
Integration with ChatGPT
Ability to manage counterparty-initiated contracts
Zoho Notebook, the company’s note-taking app, has seen regular feature updates to centralize information across teams to better serve SMBs. Notebook provides shared workspaces for teams, projects, or departments, a whiteboard feature that includes not just text, but images, drawings, and shapes, and contextual integrations across the Zoho ecosystem, including CRM, Projects, and Mail, allowing Notebook to be the single source of documentation within an organization.
Notebook AI, utilizing the capabilities of Zia, Zoho’s in-house AI engine, is now available within Zoho Notebook. Other new features include:
AI Transcription – automatically converts audio into structured, time-stamped notes with speaker labels and summaries
AI Mind Maps – turns long notes into clean, visual mind maps with a single clickAI writing assistant – summarizes, rewrites, fixes grammar, and changes tone across any note
AI-generated Smart Tags – assists the user in organizing notes faster
Voice Search & Translation – easily find and convert content across languages
In the coming months, Notebook will be rolling out new capabilities, including meeting notes intelligence, integration with Bigin, and a deeper integration with Zoho CRM to provide sales teams with contextual insights.
Posted in Commentary with tags Lumenix on September 3, 2025 by itnerd
Lumenix today announced a groundbreaking multi-year collaboration agreement to deploy its Artificially Intelligent Monitoring System (AIMS) at the McGill University Health Centre (MUHC). The objective of this collaboration is to improve patient and staff safety, support workers, and contribute to the foundation for a personalized, inclusive, and innovative approach to healthcare delivery.
AIMS is an ambient sensing platform designed specifically for clinical use. Using a network of ceiling-embedded devices and infrared-based 3D sensors, the system anonymously perceives human behaviour and positioning, while remaining incapable of recognizing any personal information. AIMS delivers real-time, actionable intelligence that allows healthcare teams to proactively prevent adverse events, such as missed hand hygiene compliance, fall prevention and detection, and patient wandering, which leads to enhanced safety and improved patient outcomes.
This initiative supports the strategic vision of the IMPACT Centre (Initiatives and Methods for Partnerships, Analytics and Clinical Transformation), the MUHC’s AI Centre of Excellence, to accelerate the benefits derived from data and digital technologies. Central to that goal is the integration of novel technologies, such as AIMS, that can improve care outcomes at every stage of life.
The MUHC – Lumenix collaboration includes both the implementation of AIMS and the development of additional applications. These innovations will solve real clinical challenges providing immediate value to patient care and clinical staff at the MUHC, and create scalable solutions for healthcare systems worldwide.
AIMS has been clinically validated through multiple deployments and clinical trials, including a successful comprehensive clinical trial led by the Government of Canada. AIMS’ hand hygiene application has delivered sustained improvement in hand hygiene compliance and significantly reduced outbreaks.
The MUHC – Lumenix collaboration is an investment in the future of healthcare and creates a model for how healthcare systems can advance technology through innovation, shared values and teamwork.
Cybernews researchers have uncovered a massive data exposure affecting more than 250 million identity records across seven countries, including Turkey, Egypt, Saudi Arabia, the United Arab Emirates (UAE), Mexico, South Africa, and Canada.
Three misconfigured servers — hosted on IP addresses in Brazil and the UAE — contained detailed personal information, resembling government-level identity profiles, now confirmed to have been publicly accessible.
What data was exposed?
The leaked information included ID numbers, full names, dates of birth and gender, contact details, and home addresses.
Record numbers exposed:
Turkey (88,396,572 records)
Egypt (77,744,912 records)
Saudi Arabia (26,827,301 records)
UAE (4,856,942 records)
Mexico (8,740,000 records)
South Africa (44,472,288 records)
Canada (9,322,549 records)
Cybernews contacted the hosting providers, and as of now, the data is no longer publicly accessible.
Posted in Commentary with tags Telus on September 3, 2025 by itnerd
Back to school season is here and TELUS is offering a smart tech solution that’s quickly becoming a game-changer for parents: Apple Watch For Your Kids.
Apple Watch For Your Kids is a software feature that lets parents use their iPhone to set up an Apple Watch (GPS + Cellular) for a child or family member. Available on TELUS’ award-winning 5G+ network, this feature allows kids to call, text and stay connected without needing their own smartphone. It’s the perfect option for children who aren’t quite ready for a phone, but still need to stay in touch.
TELUS offers flexible plans for Apple Watch SE, Apple Watch Series 10 and Apple Watch Ultra 2, each with a standalone number. For a limited time, get an Apple Watch SE and plan for $0 upfront (plus tax), starting at $25 per month.
Apple Watch For Your Kids offers freedom for kids and peace of mind for parents thanks to safety-focused communication features:
Connectivity without screen overload: Children can call/text from their own number, all from their wrist.
Focus-friendly design: The Schooltime feature restricts notifications and disables the use of apps during school hours.
Built-in safety: Parents can see their child’s location, set location alerts, approve contacts, and manage the device remotely.
Health & activity tracking: Keeps kids moving and motivated with age-appropriate fitness tools.
With the school year just around the corner, now’s the perfect time to explore how Apple Watch for Your Kids, available at TELUS, can help going back to school easier. Visit their website for more information.
Quorum Cyber, a proactive, threat-led cybersecurity company founded to help organizations defend themselves in an increasingly hostile digital landscape, today released its Relentless Threats: 2025 Mid-Year Global Cyber Risk Outlook Report.
Compiled by Quorum Cyber’s Threat Intelligence team, with insights derived from its frontline engagements and strategic monitoring over the first half of the year, the report highlights the tracking of over 70 cybercriminal groups and Malware-as-a-Service (MaaS) offerings, unveiling sophisticated new tactics shaping the cyber threat landscape. It also includes a ransomware demand trend for Q1 2022 to Q1 2025 inclusive.
What You’ll Learn from Quorum Cyber’s 2025 Mid-Year Global Cyber Risk Outlook Report:
Rising Ransomware Threats: The ransomware group Codefinger has begun exploiting legitimate Amazon Web Services (AWS) features to encrypt cloud storage, marking a troubling trend toward targeting cloud-native infrastructure
Emergence of New Stealware: Following law enforcement crackdowns, a new variant known as Acreed has emerged, highlighting the underground market’s resilience
State and Criminal Convergence: North Korea’s Moonstone Sleet exemplifies the growing convergence of state and criminal capabilities, utilizing a Russian-language Ransomware-as-a-Service (RaaS) platform to target software companies
Quadruple Extortion Tactics: Groups like Qilin and DragonForce are innovating extortion methods by incorporating services such as legal harassment, AI-driven negotiation bots, and call centers, signaling the rise of ‘quadruple extortion’ in ransomware operations
Mature RaaS Ecosystem: The RaaS model has evolved towards greater maturity and scalability, adopting enterprise business strategies. A newly discovered whitelabel model allows cybercriminal affiliates to rebrand ransomware payloads, customizing attacks for specific targets
Increased Ransom Demands: The report reveals a 53% rise in ransom demands from Q1 2022 to Q1 2025, varying across sectors based on financial size and threat actor behaviors
Actionable Recommendations: understand how to defend against evolving cyber threats, including ransomware and stealware.
2025 Mid-Year Intelligence Briefing
Quorum Cyber recently hosted a webinar to explain the key findings of the report and shared actionable advice so that organizations in any sector can counter the growing threats and minimize the risk of becoming the victim of a cyber-attack. You can watchRelentless Threats: 2025 Mid-Year Intelligence Briefing on-demand for free at any time.
Summary: Cryptojacking attacks are rising as threat actors exploit hard-to-detect cryptomining malware. Learn how Darktrace detected and contained a cryptojacking attempt in its early stages using Autonomous Response, with expert analysis of the malware itself revealing insights into a novel cryptomining strain.
Blog Category: On the Case: Incident Analysis
What is Cryptojacking?
Cryptojacking remains one of the most persistent cyber threats in the digital age, showing no signs of slowing down. It involves the unauthorized use of a computer or device’s processing power to mine cryptocurrencies, often without the owner’s consent or knowledge, using cryptojacking scripts or cryptocurrency mining (cryptomining) malware [1]. Unlike other widespread attacks such as ransomware, which disrupt operations and block access to data, cryptomining malware steals and drains computing and energy resources for mining to reduce attacker’s personal costs and increase “profits” earned from mining [1]. The impact on targeted organizations can be significant, ranging from data privacy concerns and reduced productivity to higher energy bills.
As cryptocurrency continues to grow in popularity, as seen with the ongoing high valuation of the global cryptocurrency market capitalization (almost USD 4 trillion at time of writing), threat actors will continue to view cryptomining as a profitable venture [2]. As a result, illicit cryptominers are being used to steal processing power via supply chain attacks or browser injections, as seen in a recent cryptojacking campaign using JavaScript [3][4].
Therefore, security teams should maintain awareness of this ongoing threat, as what is often dismissed as a ‘compliance issue’ can escalate into more severe compromises and lead to prolonged exposure of critical resources.
While having a security team capable of detecting and analyzing hijacking attempts is essential, emerging threats in today’s landscape often demand more than manual intervention.
In July 2025, Darktrace detected and contained an attempted cryptojacking incident on the network of a customer in the retail and e-commerce industry, when a threat actor attempted to use a PowerShell script to download and run NBMiner directly in memory.
In addition to highlighting Darktrace’s successful detection of the malicious activity and the role of Autonomous Response in halting the attack, this blog will also include novel insights from Darktrace’s threat researchers on the cryptominer payload, showing how the attack chain was initiated through the execution of a PowerShell-based payload.
Darktrace’s Coverage of Cryptojacking via PowerShell
The initial compromise was detected on July 22, when Darktrace / NETWORK observed the use of a new PowerShell user agent during a connection to an external endpoint, indicating an attempt at remote code execution.
Specifically, the targeted desktop device established a connection to the rare endpoint, 45.141.87[.]195, over destination port 8000 using HTTP as the application-layer protocol. Within this connection, Darktrace observed the presence of a PowerShell script in the URI, specifically ‘/infect.ps1’.
Darktrace’s analysis of this endpoint (45.141.87[.]195[:]8000/infect.ps1) and the payload it downloaded indicated it was a dropper used to deliver an obfuscated AutoIt loader. This attribution was further supported by open-source intelligence (OSINT) reporting [5]. The loader likely then injected NBMiner into a legitimate process on the customer’s environment – the first documented case of NBMiner being dropped in this way.
Figure 1: Darktrace’s detection of a device making an HTTP connection with new PowerShell user agent, indicating PowerShell abuse for command-and-control (C2) communications.
Script files are often used by malicious actors for malware distribution. In cryptojacking attacks specifically, scripts are used to download and install cryptomining software, which then attempts to connect to cryptomining pools to begin mining operations [6].
Inside the Payload: Technical Analysis of the Malicious Script and Cryptomining Loader
To confidently establish that the malicious script file dropped an AutoIt loader used to deliver the NBMiner cryptominer, Darktrace’s threat researchers reverse engineered the payload. Analysis of the file ‘infect.ps1’ revealed further insights, ultimately linking it to the execution of a cryptominer loader.
Figure 2: Screenshot of the ‘infect.ps1’ PowerShell script observed in the attack.
The ‘infect.ps1’ script is a heavily obfuscated PowerShell script that contains multiple variables of Base64 and XOR encoded data. The first data blob is XOR’d with a value of 97, after decoding, the data is a binary and stored in APPDATA/local/knzbsrgw.exe. The binary is AutoIT.exe, the legitimate executable of the AutoIt programming language. The script also performs a check for the existence of the registry key HKCU:\\Software\LordNet.
The second data blob ($cylcejlrqbgejqryxpck) is written to APPDATA\rauuq, where it will later be read and XOR decoded. The third data blob ($tlswqbblxmmr)decodes to an obfuscated AutoIt script, which is written to %LOCALAPPDATA%\qmsxehehhnnwioojlyegmdssiswak. To ensure persistence, a shortcut file named xxyntxsmitwgruxuwqzypomkhxhml.lnk is created to run at startup.
Figure 3: Screenshot of second stage AutoIt script.
The observed AutoIt script is a process injection loader. It reads an encrypted binary from /rauuq in APPDATA, then XOR-decodes every byte with the key 47 to reconstruct the payload in memory. Next, it silently launches the legitimate Windows app ‘charmap.exe’ (Character Map) and obtains a handle with full access. It allocates executable and writable memory inside that process, writes the decrypted payload into the allocated region, and starts a new thread at that address. Finally, it closes the thread and process handles.
The binary that is injected into charmap.exe is 64-bit Windows binary. On launch, it takes a snapshot of running processes and specifically checks whether Task Manager is open. If Task Manager is detected, the binary kills sigverif.exe; otherwise, it proceeds. Once the condition is met, NBMiner is retrieved from a Chimera URL (https://api[.]chimera-hosting[.]zip/frfnhis/zdpaGgLMav/nbminer%5B.%5Dexe) and establishes persistence, ensuring that the process automatically restarts if terminated. When mining begins, it spawns a process with the arguments ‘-a kawpow -o asia.ravenminer.com:3838 -u R9KVhfjiqSuSVcpYw5G8VDayPkjSipbiMb.worker -i 60’ and hides the process window to evade detection.
Figure 4: Observed NBMiner arguments.
The program includes several evasion measures. It performs anti-sandboxing by sleeping to delay analysis and terminates sigverif.exe (File Signature Verification). It checks for installed antivirus products and continues only when Windows Defender is the sole protection. It also verifies whether the current user has administrative rights. If not, it attempts a User Account Control (UAC) bypass via Fodhelper to silently elevate and execute its payload without prompting the user. The binary creates a folder under %APPDATA%, drops rtworkq.dll extracted from its own embedded data, and copies ‘mfpmp.exe’ from System32 into that directory to side-load ‘rtworkq.dll’. It also looks for the registry key HKCU\Software\kap, creating it if it does not exist, and reads or sets a registry value it expects there.
Zooming Out: Darktrace Coverage of NBMiner
Darktrace’s analysis of the malicious PowerShell script provides clear evidence that the payload downloaded and executed the NBMiner cryptominer. Once executed, the infected device is expected to attempt connections to cryptomining endpoints (mining pools). Darktrace initially observed this on the targeted device once it started making DNS requests for a cryptominer endpoint, “gulf[.]moneroocean[.]stream” [7], one minute after the connection involving the malicious script.
Figure 5: Darktrace Advanced Search logs showcasing the affected device making a DNS request for a Monero mining endpoint.
Though DNS requests do not necessarily mean the device connected to a cryptominer-associated endpoint, Darktrace detected connections to the endpoint specified in the DNS Answer field: monerooceans[.]stream, 152.53.121[.]6. The attempted connections to this endpoint over port 10001 triggered several high-fidelity model alerts in Darktrace related to possible cryptomining mining activity. The IP address and destination port combination (152.53.121[.]6:10001) has also been linked to cryptomining activity by several OSINT security vendors [8][9].
Figure 6: Darktrace’s detection of a device establishing connections with the Monero Mining-associated endpoint, monerooceans[.]stream over port 10001.
Darktrace / NETWORK grouped together the observed indicators of compromise (IoCs) on the targeted device and triggered an additional Enhanced Monitoring model designed to identify activity indicative of the early stages of an attack. These high-fidelity models are continuously monitored and triaged by Darktrace’s SOC team as part of the Managed Threat Detection service, ensuring that subscribed customers are promptly notified of malicious activity as soon as it emerges.
Figure 7: Darktrace’s correlation of the initial PowerShell-related activity with the cryptomining endpoint, showcasing a pattern indicative of an initial attack chain.
Darktrace’s Cyber AI Analyst launched an autonomous investigation into the ongoing activity and was able to link the individual events of the attack, encompassing the initial connections involving the PowerShell script to the ultimate connections to the cryptomining endpoint, likely representing cryptomining activity. Rather than viewing these seemingly separate events in isolation, Cyber AI Analyst was able to see the bigger picture, providing comprehensive visibility over the attack.
Figure 8: Darktrace’s Cyber AI Analyst view illustrating the extent of the cryptojacking attack mapped against the Cyber Kill Chain.
Darktrace’s Autonomous Response
Fortunately, as this customer had Darktrace configured in Autonomous Response mode, Darktrace was able to take immediate action by preventing the device from making outbund connections and blocking specific connections to suspicious endpoints, thereby containing the attack.
Figure 9: Darktrace’s Autonomous Response actions automatically triggered based on the anomalous connections observed to suspicious endpoints.
Specifically, these Autonomous Response actions prevented the outgoing communication within seconds of the device attempting to connect to the rare endpoints.
Figure 10: Darktrace’s Autonomous Response blocked connections to the mining-related endpoint within a second of the initial connection.
Additionally, the Darktrace SOC team was able to validate the effectiveness of the Autonomous Response actions by analyzing connections to 152.53.121[.]6 using the Advanced Search feature. Across more than 130 connection attempts, Darktrace’s SOC confirmed that all were aborted, meaning no connections were successfully established.
Figure 11: Advanced Search logs showing all attempted connections that were successfully prevented by Darktrace’s Autonomous Response capability.
Conclusion
Cryptojacking attacks will remain prevalent, as threat actors can scale their attacks to infect multiple devices and networks. What’s more, cryptomining incidents can often be difficult to detect and are even overlooked as low-severity compliance events, potentially leading to data privacy issues and significant energy bills caused by misused processing power.
Darktrace’s anomaly-based approach to threat detection identifies early indicators of targeted attacks without relying on prior knowledge or IoCs. By continuously learning each device’s unique pattern of life, Darktrace can detect subtle deviations that may signal a compromise.
In this case, the cryptojacking attack was quickly identified and mitigated during the early stages of malware and cryptomining activity. Darktrace’s Autonomous Response was able to swiftly contain the threat before it could advance further along the attack lifecycle, minimizing disruption and preventing the attack from potentially escalating into a more severe compromise.
Credit to Keanna Grelicha (Cyber Analyst) and Tara Gould (Threat Research Lead)
Appendices
Darktrace Model Detections
NETWORK Models:
Compromise / High Priority Crypto Currency Mining (Enhanced Monitoring Model)
The content provided in this blog is published by Darktrace for general informational purposes only and reflects our understanding of cybersecurity topics, trends, incidents, and developments at the time of publication. While we strive to ensure accuracy and relevance, the information is provided “as is” without any representations or warranties, express or implied. Darktrace makes no guarantees regarding the completeness, accuracy, reliability, or timeliness of any information presented and expressly disclaims all warranties.
Nothing in this blog constitutes legal, technical, or professional advice, and readers should consult qualified professionals before acting on any information contained herein. Any references to third-party organizations, technologies, threat actors, or incidents are for informational purposes only and do not imply affiliation, endorsement, or recommendation.
Darktrace, its affiliates, employees, or agents shall not be held liable for any loss, damage, or harm arising from the use of or reliance on the information in this blog.
The cybersecurity landscape evolves rapidly, and blog content may become outdated or superseded. We reserve the right to update, modify, or remove any content without notice.
Scott Stephenson, CEO and Founder of Deepgram, would like to respectfully offer the following thoughts on this news:
“OpenAI’s new model shows progress, but the benchmarks make it clear: latency, turn-taking, and lack of control remain its Achilles’ heel in real conversations,” said Scott Stephenson, CEO and Founder, Deepgram. “When you measure what makes conversations actually work — speed, politeness, and turn-taking — Deepgram still leads the pack. The benchmarks confirm what users feel: conversations with Deepgram just flow more naturally.”
Stephenson continued, “Why does this matter? In real-world deployments, people don’t judge a voice agent by its feature set — they judge it by how the conversation feels. Latency and turn-taking aren’t technical footnotes; they’re the difference between a helpful interaction and a frustrating one. That’s why benchmarks that measure conversational flow, not just functionality, are the true indicator of readiness for production.”
Benchmarks That Back It Up
#1 across all tests: Deepgram ranked highest under every VAQI weighting — equal, politeness-heavy, and latency-heavy.
Politer conversations: Fewest interruptions, meaning agents don’t talk over users.
Faster responses: Sub-second average latency (0.85s) vs. OpenAI’s 2.55s.
Smarter timing: Strong turn-taking with a competitive miss rate (0.427).
Consistent edge: Even when benchmarks shifted priorities, results held — Deepgram stayed on top.
Posted in Commentary with tags Hisense on September 2, 2025 by itnerd
Hisense is redefining the home cinema experience with the official launch of its TriChroma Laser TV L9Q, an innovated product that combines cinematic intensity, rich audio and an award-winning design to transform any space into an unforgettable personal theatre.
The L9Q features 5,000 ANSI lumens of brightness and contrast ratio of 5000:1, producing incredibly vivid images with deep blacks and sharp detail — even in well-lit rooms. With precision light control and vibrant colour accuracy from triple laser technology, every frame comes alive with cinematic intensity.
The L9Q is built for versatility, supporting screen sizes from 80 inches up to a massive 200 inches to turn any room into an epic home theatre. To ensure a perfect picture no matter the light, Hisense pairs the L9Q with an Ambient Light Rejection (ALR) screen, which is available in a variety of sizes and delivers brilliant images even in bright rooms.
Thanks to its IMAX Enhanced and Dolby Vision certifications, the L9Q presents visuals with extraordinary clarity and scale. This technology guarantees stunning, studio-grade immersion, whether enjoying a blockbuster film or binge-watching a favourite series. For audio that truly matches the stunning visuals, the L9Q features the exclusive Opéra de Paris | Devialet edition. Its 6.2.2 channel speaker system with Dolby Atmos creates rich, multidimensional sound that fills the entire room, making it perfect for both movies and music.
With an Ultra Short Throw (0.18 Throw Ratio) design, the L9Q can project a ginormous screen from just inches away, simplifying setup to fit into any space. Beyond its technical performance, the L9Q is a work of art. Its design, inspired by the circular structure of the Royal Opera House and the acoustic chambers of Roman theaters, reflects Hisense’s philosophy of “Timeless Artistry Meets Dynamic Technology.” This iconic design has been recognized with both the 2024 Red Dot and 2025 iF Design Awards, elevating the home cinema experience in both form and function.
According to Omdia Q1 2025 data, Hisense ranked No.1 globally in Laser TV volume share (69.6 per cent), extending its leadership for six consecutive years. As Hisense’s most advanced laser model, the L9Q reflects Hisense’s vision to help users Own the Moment — transforming everyday experiences, from family movie nights to solo concerts and game-day thrills, into unforgettable memories.
The L9Q will be available soon in Canada at authorized retailers.
Today, Comparitech researchers released a study looking at the state of global ransomware attacks in August 2025.
Ransomware attacks continued to climb again in August, rising from 473 in July to 506 last month. August also saw a first-of-a-kind attack on the State of Nevada. While hundreds of US government organizations have suffered ransomware attacks, this is the first-ever statewide attack.
Rebecca Moody, Head of Data Research at Comparitech, commented:
“If we needed a reminder of how dominant a threat ransomware is, August’s statistics provide it. Not only did we see a steady increase in attacks but we also witnessed a first-of-its-kind attack on the State of Nevada. The latter in particular highlights how no one, not even a multi-billion-dollar government organization, is immune to these types of attacks. And, even though numerous countries and governments are looking to ban public entities from making ransom payments, this is doing little to deter hackers.”
“Why? It’s likely due to a number of reasons. Firstly, these attacks are often random, e.g. because the hackers start exploiting a known vulnerability or a staff member happens to click on or download something they shouldn’t. Second, even if the hackers don’t receive the ransom, they’re most certainly going to gain notoriety when they make their claim on the State of Nevada. So, when another entity finds itself facing an attack from the same organization, they’ll instantly recognize the group’s name and may be more inclined to pay up before the attack escalates any further. Finally, it’s more than likely that the hackers will have stolen data in this attack on Nevada, so they’ll always have this to sell on the dark web if needed.”
“While banning public entities from making ransom payments may be a step toward reducing ransomware attacks, it isn’t the silver bullet. Rather, it should be part of a multi-pronged approach and one that makes sure the basics are covered. This includes patching any vulnerabilities as soon as they are flagged, making sure systems are regularly updated, carrying out frequent backups, investing in employee training, and having a step-by-step plan in place should an attack occur.”
Hisense Tops Large-Screen TV Market Again
Posted in Commentary with tags Hisense on September 3, 2025 by itnerdHisense continues to strengthen its leadership in premium display technology. According to the latest data from international market research firm Omdia, Hisense ranked No. 1 worldwide in shipments of 100-inch and above TVs in the first half of 2025, capturing 58% global volume share.
This milestone underlines Hisense’s long-term investment in large-screen innovations and its pivotal role in shaping the future of home entertainment.
To demonstrate its position at the forefront of display technology, Hisense will showcase its newest RGB Mini-LED technology at IFA 2025 in Berlin starting this week. The centrepiece of Hisense’s exhibit will be the company’s latest version of the world’s largest RGB Mini-LED TV, a striking 116-inch display that brings images to life with purer colours, exceptional brightness and precise contrast, achieving 100 per cent BT.2020 colour gamut coverage for a truly lifelike viewing experience. Beyond the technical performance, Hisense’s RGB Mini-LED is designed to bring users closer to reality, transforming every viewing moment into an emotionally compelling experience.
RGB Mini-LED, along with other display technologies and AI-powered home appliances, will be the focus of Hisense’s media event at IFA 2025. The event will take place on September 5, 2025, from 11 a.m. to 12 p.m. at the City Cube Berlin (Lower Level) under the theme Own the Moment.
Visitors to IFA can explore Hisense’s full range of premium visual and smart home products at Hall 23a of Messe Berlin from September 5–9.
Leave a comment »