Hammerspace Wins “Data Storage Innovation of the Year” for Second Year in a Row in Data Breakthrough Awards Program

Posted in Commentary with tags on April 3, 2025 by itnerd

Hammerspace, today announced that it has been awarded the “Data Storage Innovation of the Year” award in the 6th annual Data Breakthrough Awards program for the second consecutive year. The program is conducted by Data Breakthrough, an independent market intelligence organization that recognizes today’s top companies, technologies and products in the global data technology market. 

Hammerspace’s data-centric architecture is fundamentally different from other solutions in the market, delivering the highest performance shared storage in the industry with its Tier 0 offering while helping to eliminate data silos and making data an instantly accessible resource for compute clusters, applications, and users, no matter where they are located.

Breakthrough features of its Global Data Platform include its Hyperscale NAS storage architecture that combines its high-performance parallel file system with the standards-based pNFS client. This approach enables enterprises, governments and research institutes to simplify and accelerate data architectures. No proprietary client software is needed on servers, no modifications of applications to work with proprietary parallel file system interfaces and no specialized infrastructure or networking is required.

The annual Data Breakthrough Awards is the premier awards program founded to recognize data technology innovators, leaders and visionaries from around the world in a range of categories, including DataOps, Data Analytics, AI, Business Intelligence, Data Privacy, Data Storage and many more. The 6th annual Data Breakthrough Award program attracted thousands of nominations from across the globe.

Nikon Announces the Nikon Z5II

Posted in Commentary with tags on April 3, 2025 by itnerd

Today Nikon Canada Inc. announced the new full-frame / FX format Z5II, an entirely new generation of intermediate-level camera that miraculously manages to fit the latest high-end features into a lightweight camera body that will help kickstart any creative spark. The Nikon Z5II is the easiest way to level up a user’s captures with full-frame image quality, incredibly fast and intelligent autofocus (AF), excellent low-light performance, one-touch film-inspired colour presets and the brightest viewfinder of any competing camera .

The new Nikon Z5II uses the same high-power EXPEED 7 image processing engine as Nikon’s highest calibre professional models, the Z8 and Z9. The benefits of this processor are immediately apparent, affording incredible levels of performance and extremely fast AF with subject detection powered by deep learning (AI) technology.

This highly accurate, high-speed focus is a massive leap from its predecessor, locking in at approximately one-third the time. In addition, the new camera now utilizes a highly sensitive back-illuminated (BSI) CMOS sensor for beautiful rendering of textures and details, even in dimly lit situations such as indoors or nighttime landscapes, with minimal noise. The Z5II further fuels your creative drive with a dedicated Picture Control button and innovative tools like Imaging Recipes and Flexible Colour Picture Controls, all of which help users create a truly distinctive look with unparalleled creative control of colours.

Reliably Fast Focus and Performance

The AF on the Nikon Z5II is remarkably precise and super-fast, effortlessly locking-on and tracking a wide range of moving subjects. From fast-paced portraits to action shots, the system helps you to never miss a crucial moment, even when a subject is backlit. The cutting-edge AF system can detect up to nine types of subjects for stills and video, including people (faces, eyes, heads, and upper bodies), dogs, cats, birds, cars, motorcycles, bicycles, airplanes, and trains. But it’s not just the focus that’s fast—thanks to the next-generation processing power, the Z5II also offers high performance features from pro level Z models, to excel in any shoot.

  • 3D-tracking AF mode keeps the target subject in focus even if it moves rapidly or erratically. This allows for subject tracking, even at high burst speeds, for sharp images again and again when photographing sports, animals or other fast-moving subjects.
  • The first full-frame mirrorless Nikon camera with AF-A focus mode. In this mode, the camera automatically switches between AF-S and AF-C focus modes in response to subject movement or changes in composition with still shooting. This allows the camera to automatically focus on the subject, with no setting adjustments when photographing. This new feature makes it simple to photograph pets, kids or other subjects whose movements are difficult to predict.
  • Fast continuous shooting speeds with a maximum frame rate of 14 frames per second in mechanical shutter mode and up to 15 or 30 frames per second (electronic shutter) with full autofocus.
  • Pre-Release Capture function when shooting in C15 and C30 modes is capable of recording images buffered up to one second before the shutter-release button is fully pressed, capturing the action before a user can react.

Embrace Low Light Like Never Before

There’s no need to be afraid of the dark with the Nikon Z5II. Featuring a powerful combination of the full-frame back-illuminated CMOS sensor and the EXPEED 7 image-processing engine, the Z5II delivers the best low light ability in its class. Images and video are rendered with minimal noise, and incredible AF detection abilities in low light. Whether shooting indoors, twilight cityscapes or the night sky, the Z5II is built to help you capture confidently in nearly any light, preserving details and textures throughout the broad ISO range.

  • Class-leading autofocus detection down to -10EV delivers accurate, reliable focus in dim and dark conditions—great for concerts, live performances, festivities, available light portraiture, astrophotography and more.
  • A broad standard ISO sensitivity range of 100-64,000, expandable to Hi 1.7 (ISO 204,800 equivalent), delivers exceptional low-light capabilities and outstanding image quality with minimal noise. The max ISO is 51,200 for video recording.
  • The 5-axis in-camera vibration reduction (VR) system provides superior image stabilization equivalent to a 7.5-stop increase in shutter speed at the center and a 6.0-stop increase at the peripheral areas of the frame. This allows users to create with confidence in lower light and get sharper results, even when handheld or at lower shutter speeds.
  • Focus-point VR tailors stabilization to the area covered by the active AF point, for sharp rendering of the subject, even when it is positioned near the edge of the frame.
  • Starlight View Mode makes focus and composition simple in extremely low light, while the Warm Colour Display Mode helps preserve night vision when working in complete darkness.
  • Extended shutter speeds up to 900 seconds (15 minutes) in manual exposure mode are perfect for extreme long-exposure nightscapes and star trails.

Engineered to be Used, Made to be Loved

Shooting with the compact and lightweight Z5II is a satisfying and comfortable experience. The electronic viewfinder (EVF) is simply stunning and is 6x brighter than any competing model. At up to 3000 nits brightness, users can easily shoot even in the brightest direct sun with a perfect view of the frame, with real-time exposure information. Additionally, the rear 3.2″ Vari-angle LCD touchscreen rotates freely to nearly any angle, giving full freedom of composition. Get down in the street or hold it high above everyone’s heads and still be able to accurately frame the perfect shot. The grip is deep and comfortable to minimize fatigue. Additionally, the Nikon Z5II’s front, back, and top covers are made from magnesium alloy, which delivers exceptional durability and outstanding dust-and drip-resistance.

Feel the Colour with Picture Controls

The Nikon Z5II is the latest camera to support one-button access to Picture Controls, plus compatibility with the Nikon Imaging Cloud. The dedicated Picture Control button opens new possibilities for expressive colour, with imaginative film-inspired looks that instantly change the colour tone and colour of a scene. In a single press, the user can see in real-time the effects of up to 31 built-in colour presets plus Imaging Recipes downloaded by the user.

Nikon Imaging Cloud connectivity allows users to download a wide variety of free Imaging Recipes by Nikon and created by popular creators, and to apply these recipes when shooting. In addition, the Z5II supports Flexible Colour Picture Control, which allows users to create their own unique colour styles using Nikon’s free NX Studio software. Flexible Colour allows for a wider variety of colour and tone adjustments, including hue, brightness and contrast. What’s more, these settings can also be saved as Custom Picture Controls that can be imported to the Z5II for use while shooting.

Powerful Video Features for Hybrid Users

The Z5II offers an impressive array of video features for content creators:

  • Capture immensely vivid and detailed 4K/30 UHD video, with no crop. This gives creatives the ability to shoot in 4K at full-frame, with more wide-angle freedom. For higher frame rates, the camera can also capture up to 4K/60 with a 1.5x crop.
  • Flexible in-camera video recording options with 12-bit N-RAW, 10-bit H.265, and 8-bit H.264. This is the first camera to be able to record N-RAW to an SD card.
  • N-Log tone modes offer greater flexibility for colour grading. This means Z5II users also have access to the free RED LUTs, which were developed in collaboration with RED for users to enjoy cinematic looks.
  • Full HD/120p for flexibility to create 5x slow motion videos in 8-bit H.264.
  • Hi-Res Zoom uses 4K resolution to zoom up to 2X in-camera during Full HD shooting, without any loss of quality. This is useful when using prime lenses to get closer to a subject and add a dynamic look to footage.
  • Product Review Mode will seamlessly switch focus between the user and any objects that they hold up to the camera. Users can even customize the size of the active AF area.
  • Upgrade streaming while connected via UVC/UAC-compliant USB port, transforming the camera into a high-quality webcam for live streaming.
  • The Z5II also includes ports for headphones and microphones.

Additional Features of the Nikon Z5II

  • Dual SD card slots
  • Bird detection mode makes it easier to detect birds in motion and in flight.
  • Equipped with Nikon’s exclusive portrait functions, including Rich Tone Portrait that realizes radiant and beautiful rendering of skin textures, and Skin Softening that smooths the skin while leaving hair, eyes, and other details sharp.
  • Capture high-resolution images with Pixel Shift shooting to portray stunning depth and rich textures, from architectural details to rocky landscapes and vibrant artwork, creating images at a staggeringly high resolution of up to approx. 96-megapixels (must be processed with free Studio NX software)

Price and Availability

The new Nikon Z5II full-frame mirrorless camera will be available in April 2025 for a manufacturer’s suggested retail price (MSRP) of $2,299.95 for the body only, or with the NIKKOR Z 24-50mm f/4-6.3 lens for an MSRP of $2,699.95.

For more information about the latest Nikon products, including the vast collection of NIKKOR Z lenses and the entire line of Z series cameras, please visit www.nikon.ca.

AI won’t replace low/no-code tools, say 84% of tech leaders

Posted in Commentary with tags on April 3, 2025 by itnerd

The new 2025 App Development Trends Report from App Builder, in participation with third-party research firm Dynata, reveals that more than three-quarters (76%) of tech leaders say that AI will make their existing low-code/no-code tools more efficient instead of replacing them altogether.

Companies’ use of low-code and no-code tools have steadily increased over the past decade and become an integral piece of how 95% of teams now build scalable applications. As AI converges with low-code and no-code, companies’ reliance on these tools is set to increase even more as they’re able to automate app development processes faster, improve collaboration and increase productivity.

Additional findings from the new report include:

  • Companies’ reasons to use low-code/no-code tools have evolved. Improving developer productivity (37%) remains the top reason companies use low-code/no-code tools. But, other reasons have grown in importance since initial implementation of the tools, including allowing developers to focus on more strategic work (25% now vs. 22% initially), increasing end-user satisfaction (20% now vs. 17% initially) and decreasing manual errors (19% now vs. 15% initially). 
  • Time is money–and companies are saving both with low-code/no-code tools. Ninety-eight percent (98%) of tech leaders reported development time savings with low-code and no-code solutions–with nearly 4 out of 5 companies (78%) saving up to 50% of development time. Nearly two-thirds (62%) of companies say they’ve reduced software development costs with the tools. 
  • Custom application development is a priority for companies. Generic applications don’t cut it anymore; companies need to evolve their apps to meet the unique needs of their business and customers. Nearly one-third of tech leaders (29%) say their top reason for using low-code and no-code tools is to increase flexibility to create custom apps that meet specific company needs.

You can read the report here.

Outpost24 Research (Part 2): Unmasking EncryptHub – Help from ChatGPT & OPSEC blunder

Posted in Commentary with tags on April 3, 2025 by itnerd

Today Outpost24’s KrakenLabs published Part 2 of its investigation into EncryptHub, an up-and-coming cybercriminal who has been gaining popularity in recent months and is heavily expanding and evolving operations. Part 1 covered EncryptHub’s campaigns and TPPs, infrastructure, infection methods, and targets.

In part 2 Unmasking EncryptHub: help from ChatGPT & OPSEC blunders, the researchers explore the:

  • Last decade online with a particular focus on EncryptHub’s one-year-old foray into cybercrime
  • OPSEC mistakes EncryptHub made along the way, including the reuse of passwords, the use of personal email accounts and usernames to register and manage several assets tied to his criminal activities
  • Heavy reliance on ChatGPT and a few key errors which lead to his unmasking
  • Most notable ‘developer-related’ mistake: poor access management on his C2 server, leaving confidential parts of the server exposed with directory listing enabled, accessible to anyone without authentication

The researchers hope to reveal a human image beyond the amorphous dark entity that the generic tag of ‘Threat Actor’ usually gives.

Appdome Brings Mobile Account Protection to the New Frontline of Account Takeovers and On-Device Fraud

Posted in Commentary with tags on April 3, 2025 by itnerd

Appdome today announced it is strengthening its Account Takeover Protection suite with 32 new AI-Native dynamic defense plugins that provide Mobile Account Protection to the new frontline of Account Takeovers (ATOs) and On-Device Fraud (ODF). The new plugins are designed to help mobile brands and businesses maintain trust in the mobile experience and combat increasingly sophisticated malware that targets user identity, account creation, and transactions in mCommerce and other applications. Like all Appdome AI-Native defenses, each of the 32 new dynamic defense plugins for Mobile Account Protection is available by choice using the Appdome Platform without the need to integrate code, perform manual coding, implement SDKs, or deploy servers.

The growing complexity of mobile applications, including Super Apps, the sophistication of threats, including those that leverage AI and AI-Agents, as well as the proliferation of on-device malware, have greatly lowered the barrier for attackers to carry out Account Takeovers in mobile businesses.  Further, new tools and techniques are emerging to capture or exploit mobile identities and account data at the point of user entry, download, processing and/or choice in a mobile app. Traditional fraud detection and prevention products don’t safeguard these critical functions in the mobile application. Instead, these point products look for ATOs after the fact, often looking for the same attack vectors as other security and bot defense products to distinguish and mitigate fraud. Appdome’s Mobile Account Protection is designed to go beyond legacy security, anti-fraud and bot detection methods and protect the critical identity and account functions from deep inside the execution layer of the mobile application. If a threat is detected, Appdome’s AI-Native Mobile Account Protection plugins can either defend the user automatically or notify the application (or application backend) when fraudsters and other attackers try to compromise these functions. The result is proactive, pre-emptive defense to stop fraud and ATOs before they are successful.

The 32 new AI-Native Mobile Account Protection plugins for the Appdome Platform fall into three mobile defense categories:

  • Appdome Trusted Execution Environment (TEE). This series of plugins allows Android & iOS applications to use a segmented and secure execution environment to create, store, and retrieve critical account, identity and transaction data within Android and iOS applications. Within Appdome’s TEE, Appdome protects the application memory, state, workers, activities, notifications, IPCs, APIs, and CPCs, performs session management, and provides a dedicated secrets manager for the application to use.
  • Dynamic Memory Protection: Attackers are increasingly targeting the mobile application memory to harvest account credentials, alter critical account information, or manipulate account values such as in program or loyalty abuse. Appdome provides a series of new plugins designed to detect when attackers attempt to access or dump the application memory, manipulate application values in memory, or harvest sensitive data and keys stored in an application’s memory with memory editing tools.
  • Identity Theft Prevention: Appdome’s new Mobile Account Protection suite now includes plugins designed to protect mobile application users from identity theft, including SIM swaps, overlay attacks, fake screens, key logging, tap hijacking, clipboard hijacks and more.

Combined, Appdome’s Mobile Account Protection suite ensures mobile accounts and critical account data in Android and iOS applications is secure and exploit-proof, adding a layer of fraud detection and prevention deep in the execution layer of a mobile app. This level of protection against ATOs and ODF has never existed in the mobile economy before Appdome.

The new plugins combine the power of choice-driven defense in depth, and no-code, no SDK delivery with innovative on-device detection, defense, and intelligence options to satisfy any implementation objective. All Appdome Mobile Application Protection Plugins are available with Appdome’s Threat-Events™ Intelligence and Control Framework and Appdome ThreatScope™ Threat Analytics service. Threat-Events allows mobile brands to gather data on each attack, control the user experience and create beautiful on-brand mobile experiences when attacks happen. Mobile brands can use Threat-Events to create unique workflows and user messages leveraging the power of their brand voice when threats are present. Mobile brands can track and monitor ATO attacks via Appdome’s ThreatScope™, either before or after the deployment of Mobile Account Protection features.

Learn more about Appdome’s Mobile Account Protection.

Inc Ransomware Gang Claims Responsibility For Texas State Bar Data Breach

Posted in Commentary with tags on April 3, 2025 by itnerd

The State Bar of Texas this week confirmed it notified 2,700 Texans about a January 2025 data breach that compromised names, SSNs, financial account info including account numbers, credit and debit card numbers, driver’s licenses or other government-issued ID, medical info, and health insurance info. 

The Ransomware gang Inc claimed responsibility for the attack but the State Bar of Texas has not verified Inc’s claim.

In a blog post reporting this news, Paul Bischoff, Consumer Privacy Advocate at Comparitech, wrote: 

“Inc is a ransomware gang that emerged in July 2023 and targets a wide range of victims in healthcare, education, and government. Its methods involve spear phishing and exploiting known vulnerabilities in software.”

“Inc has claimed responsibility for 86 confirmed ransomware attacks, plus another 280 unconfirmed claims that haven’t been acknowledged by the targeted organizations. In 2025, Inc claimed seven confirmed attacks and 61 unconfirmed.”

“Ransomware attacks on US government agencies and departments can lock down computer and steal data. Those organizations are then forced to either pay a ransom or face extended downtime, data loss, and putting data subjects at increased risk of fraud. Comparitech resea

Honestly, this is a problem that is simply getting worse and not better. That’s not a good place as the focus should be to put gangs like Inc out of business which makes the world a whole lot safer.

UPDATE: Roger Grimes, data-driven defense evangelist at KnowBe4, commented:

“If I was impacted by the breach and I’m still with the organization, I would want to know how it happened and that they are taking steps to make sure it doesn’t happen, at least the same way, again. Most ransomware attacks occur because of social engineering, and after that, unpatched software or firmware. Was that how it happened? Do they know? Because if you don’t know how it happened, you can’t assure me you’ve taken steps to make sure it can’t happen again.”

DuploCloud Wins Two Silver Globee Awards for Cybersecurity Excellence

Posted in Commentary with tags on April 3, 2025 by itnerd

DuploCloud has been named a Silver Winner in two categories at the 21st Annual 2025 Globee® Awards for Cybersecurity: Hot Cybersecurity Company of the Year and SaaS Security Solutions.

The Globee® Awards for Cybersecurity honor organizations that demonstrate excellence in risk management, threat detection, cloud security, and regulatory compliance. Winners are selected through a data-driven review process by more than 2,000 experts and industry leaders worldwide. DuploCloud stood out among a competitive pool of global nominees for its platform’s ability to radically simplify secure infrastructure deployment while accelerating time-to-market for cloud applications.

Hot Cybersecurity Company of the Year (Silver Winner)

DuploCloud was recognized for its record-breaking 62% year-over-year growth, significant new product innovations, and momentum across key industries including fintech, healthcare, and SaaS. The company’s unique approach – putting DevOps and security on autopilot – has resonated with startups and enterprises alike, helping engineering teams reduce operational complexity without compromising on security or compliance.

SaaS Security Solutions (Silver Winner)

DuploCloud also earned recognition for its Advanced Observability Suite, a powerful solution that provides developers with deep insights into cloud infrastructure, security posture, and compliance status in real-time. This integrated capability empowers teams to identify misconfigurations, monitor for policy violations, and maintain continuous compliance with frameworks like SOC 2, PCI-DSS, HIPAA, and ISO standards – without the need for extensive DevSecOps resources.

DuploCloud’s low-code platform automatically translates high-level application specifications into production-grade cloud configurations with embedded security controls. Its support for multi-cloud environments and Kubernetes orchestration makes it a go-to choice for organizations scaling rapidly in regulated industries.

Learn more about DuploCloud’s suite of DevOps solutions at https://duplocloud.com/platform/.

BforeAI Has New Threat Research About Threat Actors Targeting Bybit Users Following Breach

Posted in Commentary with tags on April 3, 2025 by itnerd

BforeAI has published its latest malicious infrastructure attack report on Bybit opportunists. In the three weeks following the Bybit breach announcement, the threat research team at BforeAI collected 596 suspicious domains originating from at least 13 countries. 

The domains reveal a range of methods employed to siphon cryptocurrency assets by targeting Bybit users. Of the almost 600 suspicious domains, 119 (20%) were confirmed by BforeAI as malicious actions. 

The threat research team documented various websites designed to resemble Bybit funds recovery. The websites highlighted the term “unauthorized activities”, creating a sense of urgency around the recent incident and the fear of financial loss to psychologically trigger a victim to take immediate action without considering the source. 

The research team also noted an automated strategy for rapid domain deployment. Ordered “-a,” “-b,” “-c,” “-d,” “-e,” and “-f” suffixes indicate variations of the main domain likely made for phishing attacks while maintaining a naming convention for legitimacy. 

While most Bybit-related domains were successfully detected and mitigated, researchers observed a new evasion tactic: truncated domains using ‘bb, ‘ which allowed phishing campaigns to remain undetected and active.

You can read the report here.

SafeBreach Labs discovers bypass for Google’s Quick Share vulnerability fix

Posted in Commentary with tags on April 2, 2025 by itnerd

As a follow-up to their DEF CON 32 presentation QuickSell: Sharing Is Caring about an RCE Attack Chain on Quick Share the SafeBreach Labs team has discovered a critical bypass to Google’s fix for one of the vulnerabilities they previously identified in the Quick Share data transfer utility for Windows.

After Google addressed the original vulnerabilities discovered by researchers Or Yair and Shmuel Cohen, the team set out to verify the effectiveness of these fixes. They discovered that the solution implemented for CVE-2024-38272 – a critical vulnerability that allowed attackers to send files directly to users’ devices without approval – could be bypassed. Researchers could still deposit unauthorized files onto target devices despite Google’s initial patch by manipulating payload IDs during file transfers.

Even though Google has been responsive to these additional findings and has issued a new CVE along with an updated fix to address the bypass, this research shows the complexity involved in securing data transfer applications and the value of thorough verification testing after security patches are applied.

You can read the research here.

Saviynt Hires Cybersecurity Executive Nitin Varma as SVP and Managing Director for India and SAARC

Posted in Commentary with tags on April 2, 2025 by itnerd

Saviynt today announced that Nitin Varma has joined the company as Senior Vice President and Managing Director for India and SAARC. Saviynt has a significant existing presence in the region, with nearly 600 employees in India serving all corporate functions. Varma’s appointment will strengthen Saviynt’s go-to-market efforts and is emblematic of the company’s overall commitment to the region. Varma will be leading Saviynt’s new customer acquisition efforts, building and enhancing technical and consulting partnerships, and elevating the company’s overall position as a trusted provider of identity security solutions in India and SAARC.

Varma has over two decades of leadership experience in cybersecurity and technology, including with organizations like CrowdStrike, Palo Alto Networks, and Cisco. In his last assignment as Managing Director at CrowdStrike he was responsible for building, scaling, and creating a strong market presence across India and SAARC.

To learn more about Saviynt’s Identity Cloud, please visit the website.