SIOS Technology Wins Prestigious Industry Awards for High Availability Solutions

Posted in Commentary with tags on August 26, 2025 by itnerd

SIOS Technology Corp. today announced that its flagship product, SIOS LifeKeeper for Linux version 9.9.0, has received two distinguished industry honors recognizing its innovation and leadership in business technology solutions.

SIOS LifeKeeper for Linux was named a Gold Stevie® Award winner in the 2025 American Business Awards® in the Business Technology – Softwarecategory. The American Business Awards are the premier business awards program in the U.S., honoring organizations for outstanding achievement and innovation across industries.

In addition, SIOS LifeKeeper for Linux earned a Silver Titan Business Award in the Business Technology Solutions – Business Continuity Solution category. The Titan Awards celebrate excellence in enterprise products and solutions that drive organizational resilience, agility, and digital transformation.

SIOS LifeKeeper for Linux delivers comprehensive HA/DR protection for both physical and virtual Linux environments, enabling enterprises to safeguard critical workloads with intelligent application-aware monitoring, fast failover, and seamless recovery. Version 9.9.0 introduced significant enhancements, including expanded support for leading enterprise applications, improved automation, and deeper integration with cloud and hybrid IT environments.

With these wins, SIOS continues its long-standing leadership in high availability and resilience technology, helping enterprises worldwide reduce downtime, simplify operations, and achieve business continuity.

Hammerspace Wins the “Data Platform Tech — AI-Optimized Data Platforms” Category in the SiliconANGLE TechForward Awards

Posted in Commentary with tags on August 26, 2025 by itnerd

Hammerspace today announced that it has been named a winner in SiliconANGLE’s 2025 TechForward Awards in the “Data Platform Tech — AI-Optimized Data Platforms” category.

The Hammerspace Data Platform stands out from other solutions in the market with an open, data-centric architecture optimized for high-performance AI and HPC workloads, making all data an instantly accessible resource for AI models, applications, compute clusters and users. By unifying global access to all data across existing storage, silos, sites and clouds, Hammerspace enables organizations to leverage their existing infrastructure without needing to purchase net-new, proprietary storage.

Hammerspace simplifies the AI journey for customers with its ability to extend into cloud-based compute environments, without disruption to existing users/applications or requiring massive data migrations into new silos. By activating the underutilized capacity customers already own in their GPU servers, Hammerspace’s Tier 0 accelerates inferencing and checkpointing and reduces the need to purchase additional external high-performance storage.

The TechForward Awards recognize the technologies and solutions driving business forward. As the trusted voice of enterprise and emerging tech, SiliconANGLE applies a rigorous editorial lens to highlight innovations reshaping how businesses operate in our rapidly changing landscape. This awards program honors both established enterprise solutions and breakthrough technologies defining the future of business, spanning AI innovation, security excellence, cloud transformation, data platform evolution and blockchain/crypto tech. Hammerspace was selected from a competitive field of nominees by a panel of industry experts and technology leaders.

For more information, visit https://siliconangle.com/awards/.

A New Study Finds That 75% Of Dating Apps Are Not Safe

Posted in Commentary with tags on August 26, 2025 by itnerd

Analysis released today finds that most dating apps still have a long way to go to reach A-grade cybersecurity.

The Business Digital Index (BDI) team analyzed the 24 largest dating platforms and found that 75% received a grade of D or F for their digital security. This is not trivial as a lot of people are users of these apps and put a lot of personal information in them that I am certain that they don’t want stolen by threat actors.

You can see the full report here: https://businessdigitalindex.com/research/75-of-dating-apps-are-unsafe-new-study-finds

Foxit Expands in Australia with Local Cloud Server

Posted in Commentary with tags on August 26, 2025 by itnerd

Foxit today announced the the launch of a dedicated cloud server in Australia, expanding its presence to better support local customers – especially those working in industries with strict data privacy and compliance standards. The move brings Foxit’s award-winning cloud-based PDF and eSignature tools much closer to users across Australia and New Zealand. It means faster load times, more responsive applications, and importantly, a way for customers to keep their data onshore – within Australian legal jurisdiction.

Features/Benefits of the New Australian-Based Server:

  • Faster access, less waiting. With data staying closer to home, users will notice quicker load times and smoother performance across Foxit’s cloud-based tools.
  • Keeps your data onshore. For industries that require it, like healthcare, finance, or government, your documents and sensitive info stay within Australia’s borders.
  • Enables compliance. The new infrastructure supports local data privacy and residency rules/regulations – making it easier for organizations to meet regulatory requirements without jumping through hoops.
  • Ensures reliability. Having a server in-region means better uptime, faster recovery, and fewer disruptions if something goes wrong.
  • Built for what’s next. Whether a small business or a larger enterprise the infrastructure is designed to scale with needs, without compromising performance or privacy.

This strategic expansion is part of Foxit’s ongoing global initiative to optimize its cloud infrastructure, ensuring that users worldwide benefit from localized, high-performance, and secure digital document solutions. Australian customers can now leverage Foxit’s full suite of PDF tools, from secure document collaboration to advanced editing and e-signature capabilities, with the added advantages of local cloud hosting.

Guest Post: Dropbox will start disabling its password manager this week — act before you lose access to your accounts

Posted in Commentary with tags on August 26, 2025 by itnerd

Dropbox is not the first company to make such a decision this year

Starting this Thursday, August 28, Dropbox will turn off the autofill functionality and users won’t be able to edit or add new passwords anymore. Though, you will be able to download your credentials for around a week after that. 

Dropbox recently announced that it is focusing on its core product and discontinuing Dropbox Passwords — a security application designed to host and manage login credentials. Users are urged to migrate any saved content to their personal storage solutions by October 28. Otherwise, access to saved passwords could be lost.

Phasing out timeline

  • On August 28, the autofill functionality will be turned off and users won’t be able to edit or add new passwords anymore.
  • On September 11, the mobile app will be closed. But the browser extension will still work for a while.
  • On October 28, the browser extension will be closed and all entries will be deleted.

Starting to look like a trend

“We’ve certainly taken note of Dropbox’s announcement regarding the discontinuation of Dropbox Passwords. For those who relied on it, this news can feel disruptive and leave people wondering how best to secure their online lives going forward. But it’s not the first time this sort of decision has been made this year. Companies abandoning non-core activities and disabling password managers or password management functions is starting to look like a trend in the technology market. Earlier this year, Deutsche Bank turned off the document and password vault in its online banking platform, and Microsoft just finished phasing out password management functionality in its Authenticator app,” says Karolis Arbaciauskas, head of business product at NordPass.

“This development, while challenging for affected individuals, highlights an increasingly crucial aspect of personal and organizational cybersecurity: the need for robust, reliable, and dedicated solutions. In other words, relying on integrated features within a broader service, which might be subject to strategic shifts, can expose users to unexpected vulnerabilities. But in the long run, this shift can be beneficial. Users will likely move from integrated solutions to dedicated cybersecurity tools. Meanwhile, Dropbox, Deutsche Bank and other non-cybersecurity companies will be able to focus on their core products. Keeping services, such as password vaults secure and up to date is costly and requires constant attention,” he adds.

Note for admins

Arbačiauskas notes that businesses, more specifically IT or cybersecurity administrators, should also pay attention to Dropbox’s notification, because each team member will also need to take the action to export their password data.

“Admins: Each team member will need to take the action above to export their password data. To see which of your team members are using Dropbox Passwords, go to the Passwords page in the admin console. If a team member has a Passwords score, then that indicates they’re using Dropbox Passwords. If it says Inactive then that user is not using Dropbox Passwords.” Dropbox informs.

How to export your passwords

Dropbox provides the following instructions:

Browser extension

  • Open the Dropbox Passwords browser extension.
  • Click your avatar (profile picture or initials) in the bottom-left corner.
  • Click “Preferences.”
  • Click the “Account” tab.
  • Click “Export.”
  • Click “Export” to confirm.

Mobile app

  • Open the Dropbox Passwords mobile app.
  • Tap “Settings.”
  • Tap “Export.”
  • Tap “Export” to confirm.

“Just remember to delete the unencrypted CSV file after you import your credentials to another password manager,” says Arbaciauskas.

ABOUT NORDPASS

NordPass is a password manager for both business and consumer clients. It’s powered by the latest technology for the utmost security. Developed with affordability, simplicity, and ease of use in mind, NordPass allows users to access passwords securely on desktops, mobile devices, and browsers. All passwords are encrypted on the device, so only the user can access them. NordPass was created by the experts behind NordVPN — the advanced security and privacy app. For more information: nordpass.com.

CloudSEK Study Shows How AI Summaries Can Be Poisoned With Hidden Malware Instructions

Posted in Commentary with tags on August 25, 2025 by itnerd

CloudSEK’s latest research reveals a novel cyber threat that exploits the trust users place in AI summarization tools, turning them into unintentional delivery mechanisms for ransomware.

The report, titled Trusted My Summarizer, Now My Fridge Is Encrypted, demonstrates how attackers can use invisible prompt injection and prompt overdose techniques to manipulate AI-powered summarizers embedded in email clients, browsers, and productivity apps. By embedding malicious payloads in HTML with CSS-based obfuscation (such as white-on-white text, zero-width characters, and off-screen rendering), attackers can trick AI summarizers into reproducing ClickFix-style step-by-step ransomware instructions in their summaries.

Key Findings

  • Invisible Prompt Injection: Attackers hide malicious text in HTML using CSS tricks, invisible to humans but fully interpretable to AI summarizers.
  • Prompt Overdose: Payloads are repeated dozens of times, overwhelming the summarizer’s context window and ensuring attacker instructions dominate outputs.
  • Weaponized Summarizers: When users rely on summarizers to triage content, the AI may unknowingly echo back attacker-controlled ransomware steps as trusted advice.
  • Real-World Proof-of-Concept: CloudSEK successfully demonstrated how hidden payloads can instruct users to run Base64-encoded PowerShell commands simulating ransomware delivery.
  • Amplified Social Engineering: Because instructions appear to come from a trusted AI assistant rather than an external actor, the likelihood of compliance is significantly higher. 


Potential Impact

  1. Mass Amplification of Attacks — Summarizers in email previews, search snippets, and browser extensions could echo attacker payloads at scale.
  2. Lower Barrier for Ransomware Execution — Even non-technical users could be tricked into executing ransomware payloads.
  3. SEO-Driven Threat Multiplication — Poisoned blogs, forums, and indexed content could spread malicious instructions widely.
  4. Enterprise Risks — Internal copilots and summarizers could inadvertently relay attacker steps into trusted business workflows.
  5. Operational & Reputational Harm — Ransomware incidents delivered via trusted AI tools may cause higher compliance rates, longer downtimes, and financial losses.


Mitigation Strategies

CloudSEK recommends immediate defensive measures, including:

  • Client-Side Sanitization — Strip suspicious CSS elements (opacity:0, zero-width, white-on-white) before processing.
  • Prompt Filtering — Detect and neutralize hidden meta-instructions or excessive repetition.
  • Payload Detection — Use heuristics to identify encoded commands and malicious patterns.
  • User Awareness & Safeguards — Summarizers should indicate whether steps originate from visible or hidden content.
  • Enterprise AI Policy Enforcement — Organizations must screen inbound HTML/documents for hidden text before ingestion.
     

Aspire Rural Health Systems Pwned By Ransomware

Posted in Commentary with tags on August 25, 2025 by itnerd

Aspire Rural Health System has disclosed a ransomware-related data breach impacting nearly 140,000 individuals across its Michigan facilities. Hackers accessed Aspire’s systems between November 2024 and January 2025, stealing files containing personal and health information, as well as financial and HR records. The BianLian ransomware group claimed responsibility in February, though it has since gone dark, leaving questions about the fate of the stolen data. The breach underscores the continuing scale of healthcare-related cyber incidents, which often affect hundreds of thousands to millions of individuals.

Andrew Obadiaru, CISO, Cobalt had this to say:

“Healthcare continues to be one of the most targeted sectors because the data is highly valuable, operations are time-sensitive, and legacy systems often leave gaps for attackers to exploit. What stands out in Aspire’s case is the delay between breach, discovery, and disclosure, which leaves a dangerous window where stolen data can be monetized. Ransomware groups like BianLian exploit these blind spots by exfiltrating sensitive information long before defenses catch up. Closing that gap requires not only preventative measures but ongoing security testing to validate defenses against the techniques attackers are using today.”

BianLian has really been busy as a number of high profile ransomware attacks have been claimed by them. That’s why you need to do everything possible to stop this group and other threat actors from making you their next victim.

KnowBe4 Hires New Chief Information Officer Joel Kemmerer

Posted in Commentary with tags on August 25, 2025 by itnerd

KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management (HRM), today announced it has hired experienced IT executive Joel Kemmerer as the new chief information officer (CIO) to help lead critical digital transformation initiatives.  

Kemmerer is a veteran IT executive and CIO, with over 30 years of experience in various IT leadership positions for technology companies such as N-able Inc., SolarWinds, Advanced Micro Devices (AMD) and others. Kemmerer earned his bachelor of business administration from the McCombs School of Business at the University of Texas and his master of business administration from the Edwin L. Cox School of Business at Southern Methodist University. Previously, his organization was the recipient of a 2022 American Business Awards Gold Stevie for Information Technology Department of the Year. 

For more information on KnowBe4 careers, visit https://www.knowbe4.com/careers

Guest Post: In live sports streaming, some minutes matter more than others

Posted in Commentary with tags on August 25, 2025 by itnerd

By: Sofie Feeney, Regional Leader for Northern Europe at Cisco ThousandEyes

A data driven approach to optimize live sport streaming

Broadcasters have long been awake to the issues of a break in programming or transmission.

Dead air – when silence is mistakenly broadcast instead of regular content – continues to cause maximum discomfort for traditional TV and radio broadcasters, not least because in those crucial seconds of nothingness, people have the chance (and propensity) to switch, either elsewhere or off.

In online streaming, the equivalent experience is glitches – in either network or backend services – that manifest as streams that pixelate, break up, excessively buffer or stop working altogether.

How important those lost seconds or minutes are to a stream depends a lot on the nature of the event. In live sports, an untimely glitch can be the difference between seeing a world record being made, and not.

Visibility into ephemeral connections

Within a live sports broadcast, not all minutes are equal. Proportionally, a minute in the context of the Olympics 100-meter dash carries more weight than a minute in a 90-minute football game.

In the dash, a lost minute could mean missing out on the color commentary preamble as well as the 10-second race in its entirety; in a 90-minute game, the best case scenario is the loss of a comparatively speaking uneventful passage of play.

The exception to that is when a lost minute of the 90-minute game contains a clutch play: where a crucial score is made or a controversial penalty is awarded. Then, that minute is just as important to the broadcast as the one that contains the 100-meter dash final.

The challenge for a streaming provider is that it’s impossible to know ahead of time, of course, with any certainty, which minutes of a live broadcast will be the most crucial: so there’s a need to treat every minute as critical.

One thing that can help streamers – and the service providers that carry streams to customers – is to become more data-driven in their approach, using visibility to understand the ephemeral nature of the connection between the broadcast site and end user audience at any point in time.

This understanding is helpful to make more informed calls that can optimize the streaming experience, such as performing dynamic resource allocation and routing of streams, based on how the live event plays out.

Predicting the Internet path

Top sports streaming providers are increasingly tapping into software agents at different points in the content delivery chain to understand how the stream looks as it makes its way to the consumer.

These software agents can run at the live site, where microwave or satellite links are used to relay content back to a central transmission coordination center; in the data center and cloud, tracing the path content takes as it is sent to a content delivery network (CDN) for onward distribution; and inside consumers’ homes, right up to the point the content reaches the end user’s modem or smart TV.

At all of these different points (hops) in the digital delivery chain, latency and delay can be measured, providing an indication of how the ultimate streaming experience is landing, and whether a performance bottleneck exists that needs to be investigated further.

Visibility and measurement is particularly important wherever content moves off private network links and onto the public Internet. The nature of the Internet and of the underlying network infrastructure means that available paths for traffic are always evolving and constantly changing. Every time a live stream happens, it is likely to encounter a different set of ambient conditions and take a slightly different path to reach the end user.

The predictability of that path depends on how much intelligence the sport or live streaming provider has about it. The greater the visibility, the more predictable the path to the end user is, since the provider can make conscious choices about which network providers they partner with, based on a solid understanding of how each routes or re-routes traffic in a variety of circumstances. It also makes identification of a fault domain easier, in the event a performance bottleneck is identified that requires remediation while the stream is happening.

The best-placed live sports streaming providers are able to validate underlying network conditions before they go live with a broadcast. By setting up tests that show how a stream would perform for different users in different geographic locations, they can be best positioned to understand what is happening ahead of time. They also have a reference point that they can track performance against for the duration of the streaming event.

Gear Up for Back-to-School with Samsung Tech for Every Age & Stage 

Posted in Commentary with tags on August 22, 2025 by itnerd

As the new school year approaches, Samsung is making it easier for students of all ages—from elementary to university—to stay connected, productive, and ahead of the curve. Whether it’s capturing content on-the-go, managing assignments across devices, or staying on top of a busy schedule, Samsung’s latest innovations are designed to meet the diverse needs of students today.

Here are three standout picks for back-to-school season in Canada:

ProductWhat it DoesWhy it Matters
Galaxy Z Flip7Portable, pocketable and ideal for on-the-go access—whether checking class schedules, capturing lecture highlights, or making plans between classes, the Galaxy Z Flip7’s Gemini integration helps students conduct seamless actions across apps – so they never skip a beat. Plus, for study sessions on the go, DeX support lets you connect to an external monitor and use your phone like a mini‑computer—ideal for writing essays or running split‑screen research apps.While 42% of Grade 4 students use a tablet or computer daily for schoolwork, many older students rely on their phones for homework and scheduling accommodations.
Galaxy Book5 Pro Optimized for multitasking: This slim, high-performance laptop is perfect for essay writing, research, or content creation—from the library, lecture hall or coffee shop. Use multi-control to use several Galaxy devices simultaneously, Recall to browse past documents, meetings and emails, and AI Select to circle any on-screen content to instantly search or interpret it.Studies show 60% of Canadian students say that managing multiple assignments at once is a top academic challenge. With its long battery life, fast performance, and seamless cross-device connectivity, the Galaxy Book5 Pro helps students stay productive and focused wherever learning happens, helping them juggle assignments and their busy schedules.
Galaxy Watch8 Smarter schedules, healthier habits: With advanced health tracking and customizable notifications, the Galaxy Watch8 helps students balance their academic, personal, and wellness goals. Pro tip: this is the first ever smartwatch with Gemini built in!Canadian University Health Survey found that 51% of students report feeling stressed regularly. With mindfulness features and fitness tracking, the Watch8 is a personal wellness coach right on the wrist.