Nikon Announces the NIKKOR Z 24-70mm f/2.8 S II, Delivering the Fastest AF and Lightest Weight in its Class

Posted in Commentary with tags on August 22, 2025 by itnerd

 Nikon Canada has announced the release of the new NIKKOR Z 24-70mm f/2.8 S II, a standard zoom lens that is compatible with full-frame/FX format mirrorless cameras. This second generation of the acclaimed NIKKOR Z 24-70mm f/2.8 S brings enhancements to image quality, speed and handling, further improving upon a lens that was already a popular choice for all types of imaging professionals.   

As part of the S-Line of NIKKOR Z lenses, the NIKKOR Z 24-70mm f/2.8 S II is a standard zoom lens with a constant maximum aperture of f/2.8, covering the versatile focal length range from wide-angle 24mm to medium-telephoto 70mm for full-frame/FX format cameras. It features a first in its class internal zoom mechanism, and it’s also the lightest in its class, weighing approximately 675 g (1.49 lbs.). Additionally, the internal zoom mechanism increases zooming stability as well as dust- and drip-resistant performance.

It is the first zoom lens to adopt Silky Swift VCM (SSVCM) motors for the AF drive, achieving the fastest autofocusing in Nikon history with extremely precise and quiet AF control. Autofocus is approximately 5x faster than that of the NIKKOR Z 24-70mm f/2.8 S, and AF tracking performance during zooming has been enhanced by approximately 60 per cent, making it even easier to capture decisive moments with fast-moving subjects such as athletes in action.

As a new-generation f/2.8 standard zoom lens that combines outstanding image quality and superior agility, the NIKKOR Z 24-70mm f/2.8 S II is the lens for those seeking high levels of performance in both still image and video recording, even when shooting in a variety of conditions or harsh environments.

Primary features

  • The multi-focusing system, incorporating Silky Swift VCM (SSVCM) technology for the first time in a zoom lens, achieves the fastest autofocusing in Nikon history, delivering extremely precise and quiet AF for both still image and video recording.
  • A compact design with the lightest weight (approximately 675 g) in its class and a 77mm filter attachment size makes it easy to carry and reduces fatigue when shooting handheld.
  • The first lens in its category to feature an internal zoom mechanism that prevents dust and debris from entering the lens during zooming, providing superior dust- and drip-resistant performance. Even when zooming, it maintains its balance for flexible use of a variety of video accessories.
  • A newly developed 11-blade diaphragm enables very circular bokeh.
  • Optimized for video recording with a design that suppresses focus breathing.
  • Equipped with a control ring clicking switch, allowing the tactile “click” of control ring operation to be turned on or off as needed.
  • The lens supports a minimum focus distance of 0.24 m at the wide-angle end and 0.33 m at the telephoto end, with a maximum reproduction ratio of 0.21× at the wide-angle end and 0.32× at the telephoto end, allowing users to get closer to their subjects for dynamic expression.
  • Includes Meso Amorphous Coat, which offers the best anti-reflection performance in Nikon history, and ARNEO Coat for effective suppression of ghosting and flare, resulting in clear images. 
  • The lens hood features a filter adjustment window, enabling users to adjust circular polarizing and variable ND filters without removing the lens hood.

Price and Availability

The new Nikon NIKKOR Z 24-70mm f/2.8 S II lens will be available in September for a Manufacturer’s Suggested Retail Price (MSRP) of $3,499.95*. For more information about the latest Nikon products, including the vast collection of NIKKOR Z lenses and the entire line of Z series cameras, please visit www.nikon.ca.

Abstract Security Launches PAINT Program to Accelerate Channel Growth Through Strategic Partnerships 

Posted in Commentary with tags on August 21, 2025 by itnerd

Abstract Security today announced the launch of its PAINT Partner Program. (Partnerships, Alliances, and INTegrations). The PAINT program is designed to empower resellers, MSPs, MSSPs, and technology integrators to deliver differentiated cybersecurity solutions and accelerate revenue growth through collaboration with one of the industry’s fastest-growing security innovators. 

Since emerging from stealth in 2023, Abstract Security has attracted global attention for its modern take on the security operations stack. The company’s platform decouples data sources and destinations, offering customizable pipelines, real-time analytics and an AI-powered assistant that simplifies threat investigation and detection across environments.  

Now, with the launch of PAINT, Abstract is formally extending its platform to a broader ecosystem of partners ready to bring these capabilities to market. 

Program Highlights 

The PAINT Partner Program is structured to support partners at every stage of growth, from emerging solution providers to global systems integrators. Key benefits include: 

  • Competitive pricing models with very attractive margin structures. Abstract’s pricing offers predictability, making it easier for partners to maximize profitability while providing value to end customers. We adapt to your business model to provide cost-effective scaling without compromising performance. 
  • Flexible deployment models, including SaaS, self-hosted, and region-specific cloud hosting 
  • Joint go-to-market opportunities, such as co-branded campaigns, sales enablement, and events 
  • Rep-to-rep sales collaboration and technical support to accelerate sales cycles 
  • Access to the Abstract Intelligence Gallery, a curated marketplace with integrations from leading threat intelligence providers 
  • Streamlined onboarding and enablement, including certification pathways and training for both sales and technical teams 

Innovatively Differentiated  

  • Data Pipelines: Streamline data management with efficient pipelines for ingestion, processing, and routing of security data. Our pipelines reduce data complexity, making it easier for customers to extract actionable insights. 
  • Real-Time Security Analytics: Our Analytics engine delivers real-time threat detection and monitoring, allowing your customers to quickly respond to security threats. This high-performance analytics capability meets the demand for fast, accurate data-driven security decisions. 
  • Intel Gallery: Access to curated threat intelligence, providing your customers with a robust resource to reveal threats and stay ahead of those emerging. Abstract’s Intel Gallery helps customers boost their intelligence capabilities, positioning you as providers of cutting-edge security solutions. 
  • Abstract LakeVilla: LakeVilla is designed to give you a reliable, cost-effective way to store and access historical data without the high price tag or slow performance of traditional SIEM solutions. It makes cold storage actually work for security teams – no more painful rehydration and no more expensive re-ingestion. 

Built for Channel-Led Growth 

The PAINT program reflects Abstract’s commitment to building a channel-first business model that rewards joint success. With multi-cloud availability, marketplace listings across AWS, Azure, and Google Cloud, and support for regional hosting in markets like the Middle East, partners can tap into new revenue opportunities across verticals and geographies. 

The PAINT Partner Program is open to qualified partners globally. Interested organizations can learn more and apply by visiting Abstract Security’s partner page. 

https://www.abstract.security/partners

New ‘Quishing’ Attacks Split QR Codes to Highjack Conversations

Posted in Commentary with tags on August 21, 2025 by itnerd

Researchers have discovered Gabagool PhaaS attackers implementing split QR codes in an attack that began as a standard fake Microsoft ‘password reset’ scam. The attackers’ use of highly tailored messages suggests they’d previously implemented a successful conversation hijacking attack against the target.

The details are here: https://blog.barracuda.com/2025/08/20/threat-spotlight-split-nested-qr-codes-quishing-attacks

The technique involves splitting the QR code into two separate images and embedding them in a phishing email. When traditional email security solutions scan the message, they see two distinct and benign-looking images rather than one complete QR code.

Barracuda threat analysts recently found Gabagool attackers implementing split QR codes in an attack that began as a standard fake Microsoft ‘password reset’ scam. The attackers’ use of highly tailored messages suggests they’d previously implemented a successful conversation hijacking attack against the target.

Erich Kron, Security Awareness Advocate at KnowBe4, commented:

“The inclusion of tricky little QR codes in some of the phishing kits or phishing services is indicative of the advancement of attacks, even at the commodity level. What might have been expected from a nation state has now made its way into low cost pay-to-play cyber tools and services. QR codes provide a somewhat unique challenge as many individuals are not aware that they can be weaponized, and many mobile devices do not actually show you the URL it is taking you to, but rather simply ask if you want to open the link in the browser.

“It has always been more difficult to view some threats on mobile devices because the limited screen real estate means that things such as the URL bar in a browser may be hidden from view unless a person intentionally looks for it. In addition, mobile devices tend to connect through cellular services, or unsecured Wi-Fi networks like those in restaurants, airports, hotels, and other public places. This means many security tools that can help keep organization-owned computers safe on the corporate network, are not applied to mobile devices. When on the road, people are far more likely to browse the Internet without the use of a VPN on phones and tablets compared to when they use laptops, losing the security controls available through VPN monitoring.

“The attack itself is fairly common, sending a user to a website designed to look like a legitimate login portal. This is not a novel attack and is a part of many phishing kits or phishing services, but the delivery method of splitting QR codes into multiple images or embedding them within each other to bypass filters is clever and can make things difficult for email filters to spot. Once an attacker steals the credentials of cloud services such as Microsoft 365 or Google, it makes it very easy for them to access email accounts which contain sensitive information, or use those accounts to attack others. Attacks like this highlight the importance of having a comprehensive Human Risk Management (HRM) program in place within organizations. When people are aware of these types of fake login portals, it becomes very easy to spot the fakes, even if the emails are able to get past the technology. The use of MFA can mitigate some of the risk; however many types of MFA are vulnerable to being bypassed, making the inconvenience for attackers minimal.”

QR Code based attacks have been around for a while. But clearly they are evolving. Which means that you have to be more careful than ever to not be a victim of one.

KnowBe4 Report Reveals Global Financial Sector Faces Unprecedented Cyber Threat Surge

Posted in Commentary with tags on August 21, 2025 by itnerd

KnowBe4 has released its latest research paper “Financial Sector Threats Report,” uncovering critical insights into the escalating cybersecurity crisis facing the global financial sector. The report shows that financial institutions face a perfect storm of AI-enhanced attacks, credential theft and supply chain vulnerabilities that pose systemic risks to the global financial industry.

The research reveals almost all (97%) of major U.S. banks experienced third-party breaches in 2024, while targeted intrusions against financial institutions increased by 109% year-over-year. Most concerning, tests in large financial institutions found that nearly 45% of employees were likely to click on a malicious link or download an infected file, creating entry points for threat actors. The report highlights how threat actors are leveraging AI tools like FraudGPT and ElevenLabs to create more convincing phishing campaigns, while simultaneously moving away from traditional ransomware encryption toward data exfiltration and multi-stage extortion schemes. This evolution allows attackers to use legitimate credentials, making detection significantly more challenging. According to Federal Reserve Bank of New York Staff Reports, even a single day’s disruption in payments by major banks could affect 38% of network banks globally.

Key findings from the report:

  • Financial service firms globally experience up to 300 times more cyberattacks annually than other industries, with a 25% year-on-year increase in intrusion events for 2024.
  • 97% of the largest U.S. banks suffered third-party breaches in 2024, while 100% of Europe’s top financial firms suffered supplier breaches, highlighting vulnerabilities in vendor ecosystems.
  • Analysis of over three million dark web posts shows stolen credentials far outpace credit card theft; infostealer infection attempts increased 58% in 2024 and 68% of attacks originating from email.
  • The U.S. accounts for 60% of all ransomware attacks against financial institutions, with the U.S. and U.K. together representing over 70% of attacks, with increasing activity targeting emerging markets in South Asia and Latin America.
  • Large financial institutions show 44.7% Phish-proneTM Percentage (PPP) rates initially, but comprehensive security awareness training reduces phishing susceptibility to below 5%.

Download the full KnowBe4 report “Financial Sector Threats: The Shifting Landscape” here

Starburst Announces AI & Datanova 2025, an Exclusive In-Person Summit for Data and AI Leaders

Posted in Commentary with tags on August 21, 2025 by itnerd

Starburst, the data platform for apps and AI, today announced details for AI & Datanova 2025, taking place October 9, 2025, at The Westin New York Times Square. This in-person event will bring together senior data and technology leaders, including CDOs, CIOs, CTOs, chief architects, and Starburst power users to share strategies, innovations, and best practices for turning enterprise data into real-world AI outcomes.

The program will feature a range of keynotes, customer stories, and technical sessions. A highlight will be two keynote addresses by Starburst CEO and Co-founder Justin Borgman, who will draw on his deep experience helping enterprises unlock the value of their data to outline:

  • The emerging era of Enterprise Agents — autonomous, AI-powered systems capable of carrying out complex business tasks across an organization.
  • The data readiness challenge — why high-quality, governed, and accessible data will be the deciding factor in AI success over the next three to five years.
  • The blueprint for enabling AI at enterprise scale — including the role of federated query, governance, and real-time access in powering next-generation applications.
  • Predictions for the AI-driven enterprise — from the transformation of decision-making to entirely new categories of customer experiences.

Borgman’s keynote will expand on these themes, offering concrete strategies and real-world customer examples of how leading organizations are building their data foundations to take full advantage of the AI revolution. Additional featured speakers include executives and senior leaders from Arity, Expedia, OCBC Bank, and more.

Registration details are available at https://www.starburst.io/ai-and-datanova/#register

Submissions Now Open for the 2025 Data Visionary Awards

In conjunction with the event, Starburst also announced that submissions are now open for the 2025 Data Visionary Awards. These awards honor customers and partners who are using data and AI to deliver transformative results and redefine what’s possible in their industries.

Award categories include:

  • AI & Data Visionary Award
  • Executive AI & Data Visionary Award
  • Data AI Award
  • Impact Through AI Award
  • Data Pathfinder Award
  • Data Disruptor Award

In addition, partner-specific awards will recognize outstanding contributions by region, as well as the Implementation Partner of the Year.

Key details:

  • Submission deadline: September 5, 2025
  • Winners announced: October 9, 2025, live at AI & Datanova 2025 in New York
  • Eligibility: Customers, employees, and partners may submit nominations, including multiple categories if desired

Full award details and nomination forms are available at https://www.starburst.io/ai-and-datanova/data-visionary-awards/.

Guest Post – Hackers can spy on you through your own security cameras

Posted in Commentary with tags on August 21, 2025 by itnerd

You should check the security settings

Cameras. They seem to promise peace of mind. Yet a cascade of recent security incidents reveals a troubling truth: Many of these devices are less like tools to help us protect our premises and more like gaping holes in our digital defenses. 

Just last month, cybersecurity researchers disclosed a now-patched critical security flaw in Dahua smart cameras, allowing attackers to hijack the devices and control them remotely. Earlier this year, a shocking 40,000 cameras were discovered streaming their feeds to the open internet, unprotected by even a basic password – revealing everything from office layouts to intimate domestic scenes. 

California and Texas – the most exposed states in the US

Most of those unprotected cameras are in the USA, with California and Texas having the most exposed devices. Attackers need only the right IP address and browser to spy on homes and businesses. They can easily find IPs because IoT search engines constantly scan the internet and flag all the exposed services.

“These cameras – intended for security or convenience – have inadvertently become public windows into sensitive spaces, often without their owners’ knowledge,” reads the Bitsight report.

And then there’s the persistent cloud of doubt surrounding Amazon’s Ring cameras. In recent months, many users reported unauthorized logins. According to Amazon, it was just a “bug that incorrectly displays prior login dates,” but the company’s reassurances did little to quell users’ fears that their personal privacy is at risk.

Don’t leave “the door” unlocked

“It’s entirely understandable to be concerned, especially given the recent news. These devices, while offering convenience and protection, are essentially small computers connected to your network and the internet, making them potential targets. My advice to anyone worried about their privacy is to take a proactive approach,” says Karolis Arbaciauskas, head of business product at NordPass

“First, you should check if your cameras are accessible from the internet and set or change the default username and password. Many devices come with weak or publicly known default credentials. Manufacturers intentionally set simple passwords to make it easy for their owners to configure new devices. However, after doing so, you’re supposed to change the password and login information. The manual even often suggests doing so,” says Arbaciauskas. 

Tips for securing cameras

To prevent hackers from spying on you through your own cameras, Arbaciauskas suggests reviewing  your camera settings as well as your Wi-Fi settings. He offers some tips to help you stay safe:

  • Change default passwords immediately: This is the absolute first and most critical step. Many of the issues we see stem from users not changing the factory-set default passwords (e.g., “admin/admin,” “user/12345”). These are often publicly known and the first options hackers will try. Use a strong, unique password for each device, ideally managed by a reputable password manager.
  • Enable multi-factor authentication (2FA/MFA): If your camera or its associated app/service offers 2FA, or multi-factor authentication, enable it without hesitation. This adds a crucial layer of security, requiring a second verification (like a code from your phone) even if your password is compromised.
  • Keep firmware updated: Think of your camera’s firmware as its operating system. Manufacturers regularly release updates to patch newly discovered security vulnerabilities. Treat these updates with the same importance you would your phone or computer’s updates. Check for and apply them regularly.
  • Secure your home network: Your camera is only as secure as the Wi-Fi network it’s connected to. So:
    • Ensure your router has a strong, unique password (not the default one).
    • Make sure your Wi-Fi is using WPA2 or, even better, WPA3 encryption.
    • Set up a separate guest Wi-Fi network for cameras and other IoT devices. Connecting your smart cameras and other IoT devices to a segregated network can prevent a compromised camera from allowing hackers access to your main home network (where your computers, phones, and sensitive data reside).
    • Ensure your router’s firewall is enabled and configured correctly.
  • Review privacy settings and physical placement:
    • Determine who has access to view your camera feeds and when.
    • If footage is stored in the cloud, read the provider’s security and privacy policies.
    • Avoid placing cameras in highly private areas like bedrooms or bathrooms. Angle cameras carefully to capture only what’s necessary, and avoid inadvertently filming sensitive areas.
  • Do some research on the camera brand. What is its privacy policy? How does it handle data? A reputable brand will have a clear security policy and a history of promptly addressing vulnerabilities.
  • Disable features you don’t use: If your camera has features like remote access via specific ports that you don’t utilize, consider disabling them. Fewer open pathways mean fewer potential entry points for attackers.

“The goal isn’t to live in fear but to implement practical digital hygiene habits. Just as we lock our physical doors, we must also secure our digital ones. So set a strong, unique password, disable remote access if you do not need it, and keep the firmware up to date,” says Arbaciauskas.

ABOUT NORDPASS

NordPass is a password manager for both business and consumer clients. It’s powered by the latest technology for the utmost security. Developed with affordability, simplicity, and ease of use in mind, NordPass allows users to access passwords securely on desktops, mobile devices, and browsers. All passwords are encrypted on the device, so only the user can access them. NordPass was created by the experts behind NordVPN — the advanced security and privacy app. For more information: nordpass.com.

China and Russia-linked VPNs on iOS and Android

Posted in Commentary with tags on August 21, 2025 by itnerd

Earlier this year, the Tech Transparency Project published a report stating that more than 20 out of the top 100 free VPNs on US app stores showed evidence of Chinese ownership. 

After TTP published its report, Apple removed some of the allegedly Chinese-owned apps from the App Store, but others remained. To further investigate the remaining VPN apps’ ties to China and Russia, Comparitech researchers decompiled the app APKs and checked for network fingerprints.

In total, Comparitech analyzed 24 VPN apps provided on iOS and Android. You can find more details on what was found here: https://www.comparitech.com/news/a-deeper-dive-into-the-china-and-russia-linked-vpns-on-ios-and-android/

Fountain launches Frontline OS to cut new hire screening time of frontline workers by up to 98% and boost retention by 50% through agentic AI

Posted in Commentary with tags on August 21, 2025 by itnerd

 Fountain, the AI-native platform for managing the global frontline workforce, announced today the launch of Frontline OS, an AI-native operating system that automates hiring, onboarding and workforce management that is purpose built for the 2.7 billion frontline global workers.

According to McKinsey research, “Losing a single frontline retail employee costs a retailer nearly $10,000.” This cost and other retention and hiring-related challenges extend into food and beverage, hospitality, healthcare, delivery, and other sectors with frontline employees. Frontline OS attacks those struggles with AI-powered automation and centralized workflows. 

At the heart of Frontline OS is Fountain Copilot, whose reasoning is powered in part by Anthropic’s Claude models. Copilot can respond to a team’s natural language prompts to complete tasks such as “find and hire 200 delivery drivers in Atlanta.” It uses multiple Fountain agents to post job listings, screen, and hire strong candidates. Copilot also fills shifts autonomously and runs compliance reports. 

Frontline OS revolutionizes how businesses manage their frontline workforce by combining powerful tools into one platform through four key capabilities:

  • Applications – Products for hiring, sourcing, scheduling, compliance and engagement
  • Automation – Tools to connect systems, create workflows and communicate across channels
  • Intelligence – Insights and analytics that provide complete visibility into your workforce
  • AI Agents – Smart assistants, including Copilot that automate routine tasks 

Data from Fountain’s Copilot customers report strong results, including: 

  • Up to five times faster deployments of new workflows
  • End-to-end hiring execution with zero support tickets, according to Fountain customers’ data. 
  • Up to 60% fewer implementation hours 

Visit www.fountain.com to learn more.

Hackers steal Microsoft logins using legitimate ADFS redirects

Posted in Commentary on August 21, 2025 by itnerd

 Hackers are using a novel technique that combines legitimate office.com links with Active Directory Federation Services (ADFS) to redirect users to a phishing page that steals Microsoft 365 logins.

In our most recent phish kit teardown, we encountered a standard reverse-proxy clone of a Microsoft login page — nothing unusual at first glance. But increasingly, a lot of the innovation comes outside of the phishing page itself. 

The art in detection evasion comes from being able to successfully deliver the page to a user and have them open the page without it being intercepted by an email security, proxy scanner, URL TI feed, or web analysis tool. To achieve this, the attacker found a way to redirect from a legitimate outlook.office.com link to a phishing website. 

This is essentially an open redirect vulnerability — maybe not the classic example where someone has forgotten to do input sanitization on their website, but the outcome is the same.

Commenting on this is Roger Grimes, Data-Driven Defense Evangelist at KnowBe4:

“ADFS has long been used by scammers and hackers to avoid detection. Part of that reason is that it’s an official Microsoft product, but not one that is usually strongly configured or monitored by the organizations that use it. In this case, the attackers are deploying and using it, which is a bit different than I’ve seen before. Nevertheless, using an official Microsoft product along with real Microsoft authentication logon pages is enough to fool people who might look at the logon links to see if they point to a valid Microsoft domain or not. In this case, they do, other than the one or two malicious URLs that are quickly shown to the user before they are moved over to more legit Microsoft domains. It’s an interesting use of ADFS in an attack.”

This highlights the need to always be vigilant. I say that because not paying attention to what a webpage is doing may lead to you getting pwned by a threat actor as is the case here.

UPDATE: Here is an additional comment from Martin Jartelius, CTO at Outpost24:

“Using a password manager with domain-bound credentials, or a FIDO2-capable MFA, would help prevent this. It should be noted that while the attack begins by showing a legitimate URL, the page the user lands on differs, and that is where the credential theft occurs. Since it starts with faked content, in this case malvertising, where a valid domain is part of the chain but not the end destination, the main deception is against automated pre-screening solutions.”

“Abuse of existing redirects is an old technique for creating trusted initial links and producing better-looking URLs to trick users. As the attacker controls the ADFS functionality, there are not many hardening configurations organizations can apply beyond awareness and the technical resilience measures mentioned above.”

“Other important steps are to enable security features in the Microsoft environment, such as impossible travel detection, to quickly identify successful phishing attempts and stolen identities, allowing timely or even automated containment.”

BREAKING: Masimo Sues The US CBP Over Apple Bringing Back The Apple Watch Blood Oxygen Feature In The US

Posted in Commentary with tags on August 20, 2025 by itnerd

If you thought the Masimo/Apple fight over the blood oxygen feature in the app was over when Apple released a workaround last week, you were wrong. Masimo has apparently filed a new complaint in the US District Court for the District of Columbia. Here’s why and who’s getting sued:

This action challenges an unlawful August 2025 ruling by U.S. Customs and Border Protection (“CBP”) allowing Apple Inc. (“Apple”)—via an ex parte process—to bypass a Limited Exclusion Order (“LEO”) from the U.S. International Trade Commission (“ITC”) that prohibits the importation of Apple Watch products that infringe Masimo Corporation’s (“Plaintiff” or “Masimo”) patents.

And:

It has now come to light that CBP thereafter reversed itself without any meaningful justification, without any material change in circumstances, and without any notice to Masimo, let alone an opportunity for Masimo to be heard. CBP changed its position on Apple’s watch-plus-iPhone redesign through an ex parte proceeding. Specifically, on August 1, 2025, CBP issued an3 ex parte ruling permitting Apple to import devices that, when used with iPhones already in the United States, perform the same functionality that the ITC found to infringe Masimo’s patents. Masimo only discovered this ruling on Thursday, August 14, 2025, when Apple publicly announced it would be reintroducing the pulse oximetry functionality through a software update.

Masimo now wants a temporary restraining order and preliminary injunction to block the CBP’s decision, and they also want the original ruling reinstated. It will be interesting to see if any of that actually happens. But what is clear is that this fight is far from over.