Ivanti Warns of New Zero-Day Attacks Hitting Connect Secure Among Other Products

Posted in Commentary with tags on January 9, 2025 by itnerd

Ivanti yesterday raised the alarm for a pair of remotely exploitable vulnerabilities in its enterprise-facing products and warned that one of the bugs has already been exploited in the wild.

Ivanti has released an update that addresses one critical and one high vulnerability in Ivanti Connect Secure, Policy Secure and ZTA Gateways. Successful exploitation of CVE-2025-0282 could lead to unauthenticated remote code execution. CVE-2025-0283 could allow a local authenticated attacker to escalate privileges.  

Martin Jartelius, CISO at Outpost24, commented:

“Last time we had an Ivanti zero-day exploitation, the attackers shifted to their active/destructive phase as the patch became available. So, anyone impacted should firstly patch at once, and secondly review their readiness in incident response and keep extra eyes on their monitoring for the near future. Many still remember the Akira breach against Tietoevry in Sweden and its cascading impact on organizations and government agencies as the impacted organization was a service provider.”

Ivanti yet again makes the news for all the wrong reasons. Which means that if you have any Ivanti products in your environment, you need to drop what you’re doing and patch all the things.

Hammerspace and Cloudian Partner UP

Posted in Commentary with tags on January 9, 2025 by itnerd

 Hammerspace, the company orchestrating the next data cycle, and Cloudian, the leader in S3-compatible object storage, have announced a partnership to deliver a cutting-edge solution for managing unstructured data at scale. Combining Hammerspace’s parallel file system performance and global data orchestration with Cloudian’s exabyte-scale HyperStore object storage, the partnership empowers enterprises to seamlessly manage, protect, and extract value from their massive unstructured data sets. 

Unstructured data comprises 90% of all data being generated today, growing exponentially and challenging enterprises with its sheer scale and complexity. By integrating Hammerspace’s high-performance data orchestration capabilities with Cloudian’s secure and scalable object storage platform, organizations can unify data across edge, core, and cloud environments in a single global namespace. This solution ensures simplified management and accessibility of unstructured data while supporting performance-intensive applications such as AI training, HPC workloads, and analytics. 

Key benefits of the partnership include: 

  • Seamless Data Orchestration Across Tiers and Locations: Hammerspace’s data platform automates data movement between Tier 0, Tier 1, and object storage within a unified global namespace, spanning sites, hybrid clouds, and multi-cloud environments. 
  • Exabyte-Scale Object Storage with Advanced Security: Cloudian’s HyperStore offers industry-leading S3 API compatibility, robust data protection, and ransomware defense, ensuring security and scalability for the world’s most demanding workloads. 
  • High-Performance Access Using Industry Standard Protocols: Hammerspace supports standard NFS, SMB, and S3 protocols without proprietary software or networking requirements, enabling seamless integration with Cloudian storage. 

The combined solution is available immediately through Hammerspace and Cloudian’s global partner networks. For more information, visit https://hammerspace.com/hs-partners/technology-partners/cloudian/

Adyen Announces Adyen Uplift

Posted in Commentary with tags on January 9, 2025 by itnerd

Adyen, the global financial technology platform of choice for leading businesses, announces the launch of Adyen Uplift. The AI-powered payment optimization suite will help businesses increase payment conversion, simplify fraud management, and reduce the cost of payments. Adyen’s customers can utilize data-driven, tailored performance recommendations and opportunities to test different payment configurations to maximize performance.

Saving businesses from trading off between conversion, risk, and cost

The complexity of payment management still holds businesses back from reaching their ambitions. They constantly need to compromise between conversion, fraud, and cost. Thanks to Adyen Uplift, businesses can optimize the full payments funnel with AI. AI-powered payment optimizations bundled in a single product suite are trained on Adyen’s global transaction dataset. Rather than navigating the complexity of payments in operational silos, the AI-first approach uses risk-based intelligence and automated conversion optimization to help businesses get more out of payments. The pilot has shown a significant effect on profits, with businesses seeing an overall uplift of up to 6% on their payment conversion rate. 

$1 trillion+ payments data 

Businesses and other providers rely on limited datasets, impacting their ability to recognize shoppers and payment behavior. With Adyen Uplift, companies benefit from AI trained on over a trillion dollars worth of global payments data from Adyen’s single platform.

Adyen has processed payments for over one billion consumers globally, giving its AI solutions a strong basis to differentiate good shoppers from fraudsters. When an Adyen customer encounters a new shopper, there is a high likelihood that Adyen has seen the shopper elsewhere on the platform. For a retail merchant on the Adyen platform, there is more than a 90% chance that Adyen has seen that shopper before. When a good shopper is identified, AI optimizations allow them to speed through checkout whilst shoppers and retailers also benefit from precise payment fraud mitigation. 

The AI-first approach to fighting fraud

Today, the fraud control process is highly complex, requiring businesses to implement extensive manual rules to combat ever-evolving fraud techniques. With Adyen Uplift, businesses can automate fraud control by removing the operational burden from fraud management teams. The solution automates and refines risk management without relying on manual rules. This enables businesses to lower fraud levels and reduce false positives, depending on their risk appetite.

Businesses piloting the risk product have seen the impact firsthand. Adyen’s pilot enterprise customers have reduced their manual risk rules by 86% on average, and 35% of customers have completely eliminated manual rules saving valuable time and resources.  

Adyen’s customer Indeed, a leading job matching and hiring platform, was able to run AI-based optimization experiments that are tailored to the unique characteristics of its business. This translated into a reduction in operational workload by automating processes to drive efficiency.

Reduce payment processing costs by up to 5%

Today, businesses are more focused than ever on their bottom line, yet many still view payments as a commodity rather than a powerful cost-saving strategy.

Adyen Uplift has reduced payment cost by up to 5% for pilot customers in the U.S. Adyen’s AI selects the best routes with the best rates for transactions to help minimize total cost of payment. Pilot customers also experienced cost savings through Adyen’s optimizations, which tailored the shopper-facing checkout flow to their needs.

To learn more about Adyen Uplift, click here.

DomainTools Invests in Domain & DNS Research with Launch of DomainTools Investigations

Posted in Commentary with tags on January 9, 2025 by itnerd

DomainTools, the global leader in domain and DNS-based cyber threat intelligence, today announced the launch of DomainTools Investigations (DTI), a community-based research effort focused on preventing, mitigating, and investigating domain and DNS based attacks.

With the launch of DTI, the cybersecurity community will have access to the insights DomainTools analysts gather on advanced persistent threats (APTs), nation-states, cyber-espionage groups, business email compromise (BEC), and more. In addition to driving the analysis and data behind DomainTools’ industry-leading products, DTI security analysts and researchers will produce and publish innovative research on the DTI website and share findings in webinars, industry events, and conferences.

DomainTools has been collecting and analyzing domain and DNS data for more than two decades, uniquely positioning DTI to analyze threat actor behavior and surface newly emerging patterns in threat activity based on the largest historical active and passive DNS database – as it’s happening.

The team of analysts and researchers who make up DTI is led by top cyber industry expert, Daniel Schwalbe, who spent the greater part of two decades tracking cybercriminals and nation-state actors in higher education, government, and large enterprises. As head of investigations and CISO at DomainTools, Schwalbe is committed to sharing actionable insights with the community. The diverse DTI team is composed of well-respected industry researchers and analysts with deep knowledge, specializing in reverse-engineering, malware, and global threat actors.

DomainTools has captured more than 97% of the Internet, mapping and analyzing billions of domains and DNS infrastructure to provide security teams with advanced domain risk analytics and real-time passive DNS feeds for proactive defensive strategies. 

The launch of DTI comes as threat actors increasingly leverage credential phishing like Charming Kitten, banking trojans like TrickBot, and various other tactics for financial gain. For the latest research from DTI visit dti.domaintools.com.

Beyond Identity Launches New Channel Program to Accelerate Partner Business Growth

Posted in Commentary with tags on January 9, 2025 by itnerd

Beyond Identity, the leading provider of secure identity and access management (IAM) platform, today announced the launch of its new channel program and the appointment of channel leader Joel Vinocur as Senior Director of Channels. The new global channel program will drive partner growth, open new revenue streams, and offer high rewards through a three-tier structure.

An accomplished channel leader with nearly a decade of experience shaping go-to-market strategies, building robust channel programs, and accelerating growth across a diverse range of organizations, Vinocur joins Beyond Identity, where he will oversee the company’s channel program by guiding sales strategy, building and fostering relationships and securing strategic collaborations. Before joining Beyond Identity, he held channel leadership roles in the threat intelligence and digital risk protection space for organizations such as ZeroFox and Recorded Future and co-founded an athletic apparel and footwear startup where he built distribution channels and cultivated independent contractor relationships to expand the company’s footprint in Europe and West Africa.

Beyond Identity’s channel program is currently available in the Americas, Europe, the Middle East, and Africa, and it plans to expand into Asia-Pacific and Japan. The program prioritizes mutual partnership and growth and includes a three-tier system (Silver, Gold, Platinum) to drive investments in joint opportunities, marketing funds, and additional benefits for partners as they grow with the company. 

Key features include:

  • New technical certification opportunities to leverage joint services engagements and platform and demo access
  • Increasing levels of investment as a partner moves up within the program
  • High levels of guaranteed margin/ discount for sourced, fulfilled, or co-sold opportunities
  • Increased committed MDF funds for higher-tiered partners
  • Access and support from the Beyond Identity team 

For more information on Beyond Identity’s channel program and tiered benefits, visit https://www.beyondidentity.com/partners.

New PayPal Phishing Scam Exploits Microsoft 365 

Posted in Commentary with tags , , on January 8, 2025 by itnerd

Researchers have uncovered a scam that targets PayPal users by leveraging legitimate PayPal tools to trick them into linking their accounts to unauthorized addresses which could give attackers control over their finances. The scammer appears to have registered an Microsoft 365 test domain, which is free for three months, and then created a Distribution List containing victim emails.

The research can be found here: https://www.fortinet.com/blog/threat-research/phish-free-paypal-phishing

What makes this interesting is that this will pass things like DKIM and DMARC. Also when it is examined by a human, it will pass all the usual tests for phishing. Which makes this pretty dangerous because by the time you figure out that this is a threat, you’ve already been pwned.

Roger Grimes, data-driven defense evangelist at cybersecurity company KnowBe4, commented:

“I’ve seen similar attacks utilizing legitimate platform services, such as QuickBooks, that essentially do the same thing (i.e., uses a legitimate service to send a message from that service with a legitimate, recognizable URL to fool users into participating. I do think it’s important that the vendors involved in these types of scams (in this case, Microsoft and PayPal) work to prevent their services from being used in scams. I don’t think vendors scrutinize participants enough to prevent these sorts of scams. They could be doing more.  At the same time, 99% of phishing scams have the same two attributes: 1) They arrive unexpectedly, and 2) Ask the user to do something they have never done before (at least for that sender). Any message, no matter how it arrives, no matter how legit it looks, with those two traits, should be investigated using trusted methods not involving anything communicated in the message before performing the requested action. Teach and drill that into your own behavior and teach others as well.”

Now this is a technique that I have seen before. Specially here where I came across a scam related other Microsoft 365 that used Microsoft’s own infrastructure to propagate it. Thus I would encourage you to read this report and be on the lookout for these sorts of emails. Because the threat actor behind this is clearly taking things to the next level.

Dragos Names ​Ekta Singh-Bushell as Chief Operating Officer

Posted in Commentary with tags on January 8, 2025 by itnerd

Dragos Inc., the global leader in cybersecurity for operational technology (OT) environments, today announced it has appointed ​Ekta Singh-Bushell as Dragos’s first Chief Operating Officer. Transitioning from her role as chair of the Audit Committee on Dragos’s Board of Directors, Singh-Bushell brings extensive experience in leading business transformation through operational excellence to Dragos’s executive leadership team. As COO, Singh-Bushell will oversee go-to-market, customer experience, and people teams and collaborate across the company to help Dragos fulfill its strategic vision as it progresses in its next phase of growth.

Singh-Bushell brings diverse global management experience from some of the world’s leading companies, combined with expertise in high growth technology sectors including cybersecurity. Notably, she was the COO of the Executive Office at the Federal Reserve Bank of New York. During her more than 17 years at EY, she was in various leadership roles, including as senior managing partner leading transformative initiatives across industries impacted by digital, technology, data, and cyber advancements. Early in her tenure at EY, she served as Global Information Security Officer. Singh-Bushell’s extensive operating experience includes advising and collaborating with CEOs, CFOs, and boards, having served as a board member focused on audit and risk, technology and cyber, for companies including Cisco Systems, Huron Consulting Group, Lesaka Technologies, ChargePoint, Designer Brands, and Datatec.

Singh-Bushell is known for her practical global commercial business practices and insights, having worked with companies in more than 60 countries. Her contributions have been recognized by Cranfield University, which nominated her to the 2017 Female FTSE Board Index: 100 Women to Watch; and by Directors & Boards in their 2017 Year-End list. The Council of Urban Professionals (CUP) honored her with the Catalyst: Change Agent award in 2013. Her credentials include being a Certified Public Accountant (CPA) and certifications in cybersecurity (CISSP, CISA), governance (NACD.DC, CGEIT), and sustainability (FSA). Ekta holds a master’s degree in electrical engineering & computer science from the University of California, Berkeley, and a bachelor’s degree in engineering from the University of Poona, India.

Singh-Bushell’s appointment caps a year of major milestones for Dragos, including ​the acquisition of Network Perception, makers of NP-View, an award-winning network visualization platform for OT networks, and the formation of Dragos Public Sector LLC, a dedicated subsidiary, delivering OT cybersecurity solutions to address the unique needs of government including US federal agencies. This year Dragos also was named to the Deloitte Technology Fast 500 for the fourth consecutive year.

KnowBe4 Look At The 2025 Cybersecurity Tightrope: What’s Next for The World?

Posted in Commentary with tags on January 8, 2025 by itnerd

As the Trump Administration steps into office on January 20, the U.S. faces a cybersecurity landscape riddled with challenges. From state- sponsored hacks to the relentless tide of ransomware, the stakes have never been higher. And it’s the same all over the world.

Let’s rewind a bit. When the Biden Administration took over four years ago, the cybersecurity outlook was already grim. The infamous SolarWinds breach was fresh in everyone’s minds — a massive infiltration by Russian hackers that exposed vulnerabilities in government and corporate systems alike.

Biden promised to make cybersecurity a top priority, and to his credit, his administration rolled out several solid initiatives. These included executive orders to strengthen federal networks, strategies to shift responsibility onto software vendors and international crackdowns on ransomware gangs.

But despite these efforts, cybercrime is thriving globally. 

In the latest issue of KnowBe4’s CyberheistNews, Founder and CEO Stu Sjouwerman discusses The 2025 Cybersecurity Tightrope: What’s Next for The World? Consider this a must read.

White House Launches “U.S. Cyber Trust Mark” for Internet Connected Devices 

Posted in Commentary with tags on January 8, 2025 by itnerd

Yesterday, the White House announced the launch of a cybersecurity label for internet-connected devices, known as the U.S. Cyber Trust Mark, completing public notice and input over the last 18 months.

You can get more details here:  https://www.whitehouse.gov/briefing-room/statements-releases/2025/01/07/white-house-launches-u-s-cyber-trust-mark-providing-american-consumers-an-easy-label-to-see-if-connected-devices-are-cybersecure/

Roger Grimes, data-driven defense evangelist at KnowBe4, commented:

“There are a lot of things to like about this program, especially the focus on IoT cybersecurity basics, such as changing default passwords, patching, data protection, and a software/hardware bill of materials. Allowing consumers to scan a QR code and get information from a decentralized IoT registry is a terrific idea. Those reasons alone are reasons enough for the program. But the devil is in the details and many of the security requirements are really just recommendations, such as the entire program itself (i.e., vendors do not need to participate), are voluntary and only suggestions. I wish many basic cybersecurity defenses such as the customer being forced to change the default password and automatic patching were required to be in the program. It would make the program much more valuable. 

“As another example, vendors participating in the program must tell consumers if they have a hard-coded default password instead of just preventing any vendor from having a hard-coded default password. The way I read the current requirements, a vendor could apply the mark if they simply told the consumer they only patched once a year, never automatically, and that the consumer had to manually remember and go out of their way to look for and apply a patch, if any are ever available. What percentage of consumers are going to do that? It would be far better to automatically patch your product without consumer involvement.

“But now, the way the program is written, a vendor simply disclosing that they purposefully have included very dangerous substandard cybersecurity practices seems still sufficient for using the mark. So, you could have some IoT vendors really going out of their way to make very secure products that require very little attention from the consumer and other IoT vendors not applying the same high cybersecurity practices and getting to use the same mark simply for telling the consumer they use substandard cybersecurity practices, assuming the consumer actually scans the QR code and reads the information. Wouldn’t it be better if the mark actually meant the vendor was using generally accepted safe cybersecurity practices?

“When I see an FCC safety mark on an electrical cord or lamp, I know it’s safe. I don’t have to scan a code and read information to find out if it is actually safe. I wish the Cyber Trust Mark label meant the same thing…that the device was actually safe as designed. I think the problem is that consumers will see the mark and automatically assume the device meets expected cybersecurity standards and maybe it does and maybe it doesn’t.”

This is a good move because consumers need to know that the gear that they buy is safe and secure. Because right now it’s kind of the Wild West out there with gear that might have vulnerabilities that are just waiting to be exploited. Which is not a good situation for anyone.

UPDATE: Andrew Obadiaru, CISO, Cobalt:

     “The FCC’s launch of the US Cyber Trust Mark is a crucial step toward improving IoT security. In our work testing IoT devices and embedded systems, we frequently uncover hardcoded credentials, exposed debug ports, and misconfigurations – vulnerabilities that give attackers easy access to networks. Once inside, adversaries can move laterally, disrupt operations, steal sensitive data, or launch ransomware attacks.

We recommend manufacturers prioritize regular penetration testing and firmware reviews to catch and fix these issues early. Addressing vulnerabilities before products reach the market reduces the risk of exploitation, safeguarding both consumers and enterprises while strengthening overall trust in connected devices.”

HP Unveils AI-Powered Experiences to Supercharge Productivity and Shape the Future of Work

Posted in Commentary with tags on January 7, 2025 by itnerd

Today at CES 2025, future business leaders will be wowed by new and powerful AI PCs and solutions from HP that empower them to collaborate and lead like never before.   

Working with Purpose to Drive Impact 

As the work landscape evolves, so do expectations for technology. That’s why HP meticulously designed its latest lineup of commercial next-gen AI PCs to give professionals the right tools for their unique work experiences. 

With HP’s newest EliteBooks, fast presentation creation, personalized emails, and a built-in recording studio are possible with just a simple click of a button, alongside built-in security and intelligence thanks to Wolf Security.  

For executives, the ultra-slim HP EliteBook Ultra G1i 14-inch Notebook Next-Gen AI PC powers lighting fast decision-making and AI-enhanced collaboration experiences without sacrificing performance or cutting-edge design:  

  • Reclaim time: Supercharge productivity with faster local AI performance driven by up to 48 TOPS of NPU performance with Intel® Core Ultra 5 and 7 processorsvi to spend more time on what matters. Multitask across power-intensive applications, customize webinars or podcasts more than 2x faster, and personalize emails nearly twice as fast.viii 
  • Show up and lead like a visionary: Create professional-level videos with a built-in recording studio experience. Look and sound like a pro with the world’s first AI business notebook with a 9MP camera, dual microphone, quad speaker design, and AI-powered Poly Camera Pro conferencing experiences. 
  • Immerse in purposeful work: Virtual interactions are brought to life and more engaging on a sharp 120 Hz 3K OLED display and the world’s largest haptic trackpad on an AI business notebook. 

For leaders on the move, HP delivers robust and reliable performance wherever their work takes them with the HP EliteBook X G1i 14-inch Notebook Next-Gen AI PCand HP EliteBook X Flip G1i 14-inch Notebook Next-Gen AI PC.  

  • Maximized productivity: Record video demos and create presentations nearly 2x faster and develop personalized emails 1.3x faster with up to 48 TOPS of NPU performance powered by Intel® Core Ultra 5 and 7 processors. An innovative thermal design with two high-density turbo fans boosts performance to handle tough tasks while staying 10% quieter. 
  • Adaptability to work from anywhere: The lightweight and flexible EliteBook X Flip easily converts from laptop, tablet, and tent modes to accommodate various workstyles. Offered in atmospheric blue and glacier silver colors, this device takes creative projects to the next level and captures precise notes when paired with the HP Rechargeable Active Pen. 

The newest next-generation AI PCs in HP’s commercial lineup all feature HP AI Companion, a CES 2025 Innovation Awards honoree. Personalize PC settings and summarize documents to get up to speed quickly and make smarter decisions in just a few minutes. HP Wolf Security delivers built-in intelligence that protects at every level of the endpoint amidst rapidly evolving cyber threats. 

Unlocking High-Performance Work  

HP is transforming high-performance compute with innovations that deliver cutting-edge hardware and solutions for today’s workforce. 75% of product designers believe that current computing technology is not able to meet their multi-software requirements while workstation users desire smaller and lighter devices. To address this, HP is announcing the newest HP Z2 Mini G1a and the ZBook Ultra G1a, World’s first mobile workstation with AMD Ryzen™ AI Max PRO, both of which were developed in collaboration with AMD to deliver high performance in compact designs. The HP Z2 Mini and HP ZBook Ultra enable users to simultaneously engage in 3D design, render graphics-intensive projects, and work locally with LLMs. HP Z Captis, developed with Adobe, has been recognized as a Best of CES 2025 Innovation Award winner. The HP Z Captis further highlights HP’s commitment to fostering creativity without limitations and how co-engineering with industry leaders enhances creative workflows. 

  • HP ZBook Ultra G1a, the world’s most powerful 14-inch mobile workstation, defies what’s possible on the go. As part of HP’s PC brand transformation and vision for the future, Z by HP will now be offering an Ultra in its mobile workstation portfolio. With its compact design and new AMD Ryzen™ AI Max PRO processor, the ZBook Ultra offers the performance to tackle workflows previously not possible on a laptop. Take desk-bound workflows anywhere with an ultra-thin and light design, combined with a long-lasting battery, Next-Gen AI PC features, and AI-enhanced privacy. Featuring up to 16 desktop-class CPU cores, discrete-like integrated graphics, and up to 128GB of innovative unified memory architecture, and the ability to assign up to 96GB RAM to the GPU, the ZBook Ultra enables seamless multitasking between applications.  
  • HP Z2 Mini G1athe world’s most powerful mini workstation, exceeds the needs of workstation-class professionals. Equipped with the AMD Ryzen™ AI Max PRO processor and scalable 128GB of innovative unified memory architecture with the ability to assign up to 96 GB exclusively to the GPU, the Z2 Mini G1a delivers performance for graphics-intensive workflows. With an internal power supply, this PC cleanly fits on a desk, mounted behind a monitor, or attached under a desk. It also easily fits in a rack, and its small size allows for a high-density rack mount solution that combines performance, manageability, and security.  
  • This spring, HP will launch its first-ever 18-inch mobile workstation, delivering more power for pro-graphics and massive memory and storage, at nearly the same size as a 17” workstation. With 3x turbo fans, HP Vaporforce Thermals, and next-gen discrete graphics, this powerful mobile workstation has been meticulously engineered to provide up to 200W TDP. The device aims to redefine both portability and performance with impressive capabilities to unlock new, more demanding workflows. With a product offering that includes the HP ZBook Ultra G1a and a new 18″ ZBook, HP expects to be first to market with the world’s broadest portfolio of mobile workstations. 

Staying One Step Ahead in a Modern Workspace  

68% of employees report experiencing moderate to severe digital friction when using technology. It can be even more frustrating when setting up a workspace and transitioning between locations. Employees need intuitive technology that seamlessly connects and works to stay productive without interruption, which is why HP is delivering the world’s most advanced Thunderbolt 4 docks. 

HP Thunderbolt 4 G6 Docks transform how professionals connect, manage, and protect their workspace – all before they sit down. HP Quick Connect found in the docks utilizes Bluetooth to detect a PC as it’s approaching, instantly waking the ecosystem of displays and accessories to start work immediately. 

There are three versions of this technology: the HP Thunderbolt 4 100W G6 Dock designed for mainstream workers, and the HP Thunderbolt 4 Ultra G6 Docks featuring 180W of power delivery for creative professionals and 280W for technical specialists and power users.  

These docks enable easy cloud manageability without disrupting an employee’s flow thanks to Poly Lens. The dock’s hardware and software are protected at every touchpoint with HP Wolf Security interlaced with HP Sure Start. And the Thunderbolt™ 4 technology provides high-speed power alongside a single-cable connection to multiple monitors. 

Pair HP’s newest PCs and docks with the company’s comprehensive portfolio of solutions for the ultimate workspace. Poly Voyager Legend 30 & 50 Series Headsetsdeliver flexibility to move throughout the day. With AI-enhanced noise reduction and WindSmart technology, the Poly Voyager Legend 50 Series blocks out unwanted environmental sounds so voices are heard clearly in any environment. The HP 720/725 Multi-Device Rechargeable Wireless Keyboard and Mouse Combo adds a personal touch to any desk space with ultra-fast charging and a battery-free design, along with the HP 400 Quiet Wireless Mouse, which comes in five colors. 

Pricing and Availability

  • The HP EliteBook Ultra G1i will be available on HP.ca later this month for a starting price of $2,649 CAD. 
  • The HP EliteBook X G1i and HP EliteBook X Flip G1i are expected to be available on HP.ca in the coming months.  
  • The HP ZBook Ultra G1a is expected to be available on HP.ca in spring of 2025. Pricing will be announced closer to availability. 
  • The HP Z2 Mini G1a is expected to be available on HP.ca in spring of 2025. Pricing will be announced closer to availability. 
  • HP Thunderbolt 4 G6 Docks are expected to be available on HP.ca in April. Pricing will be announced closer to availability. 
  • The Poly Voyager Legend 30 & 50 Series are expected to be available later this month in select regions and worldwide on HP.ca in February. The Voyager Legend 30 will be available for $139.95 CAD, the Poly Voyager Legend 50 for $167.95 CAD, and Poly Voyager Legend 50 UC for $363.95 CAD. 
  • The HP 720/725 Multi-Device Rechargeable Wireless Keyboard and Mouse Combo is available now on HP.com for a starting price of $89.99 USD and $80.00 USD respectively. 
  • The HP 400 Quiet Wireless Mouse is expected to be available on HP.ca in May.