Ericsson unveils in-vehicle 5G router with industry-first dual-SIM failover and edge AI

Posted in Commentary with tags on February 12, 2026 by itnerd

Ericsson is addressing the growing need for resilient, intelligent connectivity in mobile environments with the new Ericsson Cradlepoint R2400 and extensible RC1250 modem. Designed for vehicles and mobile field teams, this solution combines ultra-fast failover, precise location services, and powerful edge computing to help organizations operate safely, efficiently, and with confidence.

Whether it’s first responders coordinating life-saving missions, transit operators keeping passengers connected and on schedule, or private fleets optimizing routes and conducting predictive maintenance, the R2400 delivers the reliability and performance these sectors demand. Compatible with public safety networks and new network slicing services, the R2400 leverages the latest in 5G standalone Release 17 technology to support new capabilities across public safety, mass transit, and private fleet networks.

Key highlights include:

  • Fast carrier failover: Industry-first Dual‑SIM / Dual Standby (DSDS) on a single modem enables carrier switchover roughly 10× faster than previous approaches keeping voice, video, and data flowing during critical missions and transit routes.
  • Centimetre‑level location accuracy: Real‑Time Kinematics (RTK) combined with dead‑reckoning improves positioning from 1–3 metres to ~1 cm, enabling lane‑level vehicle identification and precise real-time tracking of personnel, assets, and drones.
  • Multi-link resiliency: Support for up to five simultaneous cellular plus multiple low‑Earth‑orbit (LEO) satellite connections maximizes throughput and availability, even in rural or low‑coverage areas.
  • High‑performance in‑vehicle Wi‑Fi: Embedded 4×4 software defined Wi‑Fi 7 access point delivers approximately 2-4× faster Wi‑Fi speeds for passenger and operational communications across mass transit and public safety.

As first responders and mass-transit agencies adopt AI, real-time monitoring, and autonomous vehicles/drones, reliable, scalable in-vehicle connectivity is becoming critical. According to Verizon’s Frontline Study 2025, 46 per cent of first responders in the U.S. expect daily AI use within five years, and 48 per cent expect daily drone use. The National Academies Autonomous Transit Survey (2024) found that 84 per cent of U.S. transit agencies plan to use or evaluate autonomous buses within three to five years. Paired with the extensible RC1250 modem, the R2400 delivers pay-as-you-grow WAN capacity for applications such as live video streaming, while providing on-board local AI inferencing.

Key improvements over prior generations of products include:

  • Expanded edge compute: 2.5x more on‑device compute to support local AI inferencing, computer vision, and to support enhanced performance for containerized applications—accelerating actionable insights on scene.
  • Faster security processing: 2x more throughput to support NetCloud SASE’s zero-trust security and SD-WAN services to provide a highly secure and optimized WAN network across fleets, sites, and critical assets.
  • Future‑proof modularity: Unique extensible architecture allows organizations to add or upgrade 5G modems as carrier technology evolves, without replacing the router.
  • AI-assisted centralized management and orchestration: In addition to providing centralized visibility to every vehicle and its location, NetCloud offers the industry’s first agentic AI virtual expert optimized for enterprise 5G networking to help improve the productivity of lean IT teams. AIOps dashboards help pinpoint anomalies before impacting service.

The Ericsson Cradlepoint R2400 router and RC1250 captive modem accessory will be available in Q2 2026. For more information, visit the website.

Wallapop and Albatross Sign Strategic Partnership to Bring Real-Time AI Discovery to the Future of Consumer-to-Consumer Commerce

Posted in Commentary with tags on February 12, 2026 by itnerd

Wallapop, the leading platform for conscious consumption in Spain, today announced a strategic partnership with Swiss AI company Albatross to deploy real-time AI discovery across its platform, advancing user engagement and seller visibility at unprecedented scale.

With Albatross, Wallapop becomes one of the first C2C marketplaces globally to move beyond static, history-based recommendation systems toward in-session, adaptive discovery that understands user intent as it unfolds.

In practice, this means discovery on Wallapop becomes more pro-active and responsive. For instance, when a user explores a second-hand sofa and then starts browsing rugs or floor lamps, the system understands the shift from evaluating a single item to furnishing a living space. Instead of continuing to surface more sofas, as traditional recommenders do, discovery adapts in real time to reflect the user’s evolving intent, highlighting relevant complementary items across categories, including products the user didn’t know existed.

As the session continues, the experience keeps evolving: a user who then clicks on a vintage coffee table may start seeing lighting, paintings, décor, or storage pieces that match the same style, even if they never looked for them explicitly. This allows users to uncover highly relevant listings that feel like genuine finds, rather than variations of what they’ve already seen. Crucially, this allows discovery to keep pace as interests change (even within the same session) and helps the right listings surface at the right moment.

The announcement follows Albatross’ recent $12.25 million fundraise to deploy its real-time perception layer; a technology designed to understand what users want in the moment. Forbes recently described this approach as the “second pillar of AI.” While generative AI has transformed how content is created, Albatross focuses on how content is discovered in environments where scale and choice overwhelm traditional personalization.

Early production deployments have shown significant impact, beyond what is possible with traditional recommenders. In a four-week A/B test on 10% of Wallapop’s traffic, measuring performance across the entire homepage experience, the platform yielded:

  • Increase in User Engagement: +118.9%
  • Increase in Favorites & Interactions: +104.8%
  • Increase Purchase Intentions: +46.9%

Importantly, the system surfaced previously unseen items to qualified buyers, demonstrating its ability to unlock latent supply rather than simply amplify already popular listings. These gains have remained remarkably stable – and continued to improve – over an extended four-month production period, underscoring the robustness of the approach beyond short-term experimentation.

For Wallapop, the shift goes beyond buyer relevance. The partnership introduces algorithmic seller discovery as a core capability, dynamically matching live buyer intent with relevant, shippable listings and addressing one of recommerce’s hardest challenges: ensuring quality supply doesn’t get lost in volume.

Unlike conventional recommenders built on past behavior and popularity signals, Albatross’ technology continuously interprets live user interactions. Every action within a session updates the system’s understanding of user intent and the catalog, allowing discovery to adapt instantly to changing behavior, supply dynamics, and context. This approach is particularly helpful for second-hand marketplaces, where millions of unique items with inconsistent metadata make traditional popularity- or similarity-based methods ineffective.

For Albatross, Wallapop represents a demanding real-world environment for AI discovery. With a constantly evolving catalog of one-of-a-kind items and high listing velocity, Wallapop provides an ideal setting to validate and scale in-session perception models under real marketplace constraints.

The partnership represents one of the earliest large-scale commercial deployments of adaptive, in-session AI discovery in recommerce, reinforcing Wallapop’s ambition to lead the next phase of marketplace evolution.

Abstract joins Torq AMP Alliance Program to Accelerate Agentic SecOps

Posted in Commentary with tags on February 12, 2026 by itnerd

Abstract, the leader in streaming-first security operations, today announced it joined the expanding Torq AMP alliance program, designed to drive agentic AI innovation. Abstract was chosen due to its platform featuring a security data pipeline with streaming-first detections built in that seamlessly integrates with Torq’s AI SOC platform to empower customers and their SOC/Incident Response teams.

Torq AMP is unlike any other partner program in the history of cybersecurity. It exists in stark contrast to partner programs stuck in the distant past, built on elitist tiering systems, pay-to-play participation, and excessive bureaucracy. With Torq AMP, partners such as Abstract easily leverage Torq’s AI SOC platform and agentic AI capabilities to create unique, high-value solutions that integrate across mutual customers’ security stacks and ISV ecosystems. Torq AMP delivers builder-focused — not engineering-focused — integrations that elevate the value of partner offerings and go far beyond the static, pre-defined integrations of typical tech alliances. It’s all about driving mutual growth, adoption, and buzz for all participants.

Torq AMP provides these exclusive benefits to Abstract:

  • Integrated Solution Creation: Build innovative, joint AI-driven SecOps solutions quickly and easily at scale, without heavy engineering efforts
  • Deep Torq Sales Engagement: Joint field marketing events, collaborative prospecting, and integrated presence in Torq demo environments
  • Strategic GTM Collaboration: Collaborative sales enablement, team training, channel packaging, ROI analysis, and reporting
  • Disruptive Marketing Activation: Integration highlighted within the Torq platform, on Torq’s website, in customer and prospect emails, and across social posts, messaging, and custom swag

EnGenius ECW515 Brings Wi-Fi 7 Performance to In-Room and In-Unit Deployments 

Posted in Commentary with tags on February 12, 2026 by itnerd

EnGenius Technologies today announces the ECW515 Wi-Fi 7 dual-band 2×2:2 wall-plate access point, designed to deliver seamless in-room wireless and wired connectivity in multifamily units, student housing, senior living, hotels, and resorts.

Wi-Fi 7 In-Room Connectivity for MDU and Hospitality

The EnGenius ECW515 Wi-Fi 7 wall-plate access point delivers enterprise-grade wireless and wired connectivity directly inside the room, enabling fast, reliable in-room communication for streaming, voice, IoT, and productivity devices—while supporting VLAN-based per-user traffic segmentation to help maintain privacy and network control.

Consistent, Personalized In-Room Connectivity for Modern Communication and Entertainment

The ECW515 enhances the in-room experience by enabling seamless content streaming, reliable voice communication, and consistent network access across devices. SmartCasting allows guests and residents to stream content directly from their mobile devices to in-room TVs, while SSID on LAN extends the same secure network policies to wired devices—supporting captive portals and access controls. Together with carrier-class Wi-Fi calling support, the ECW515 helps ensure uninterrupted voice, video, and data services throughout the room.

Key Features:

  • Wi-Fi 7 dual-band performance delivering up to 3.6 Gbps aggregate throughput
  • Low-profile design providing reliable in-room wireless coverage for up to 1,000 sq. ft.
  • 2.5 GbE PoE-in uplink with 802.3at PoE+ support for simplified, flexible installations
  • Integrated 4-port Gigabit switch with PoE output to connect and power in-room devices
  • Built-in traffic control and VLAN support to help isolate users and devices for added privacy
  • SmartCasting support for seamless streaming from mobile devices to in-room TVs
  • Cloud-managed configuration and policy control optimized for mass multi-tenant deployments
  • Designed for Wi-Fi 7 client compatibility, including the latest smartphones, tablets, and laptops

The ECW515 is ideal for organizations seeking to modernize in-room networking infrastructure while maintaining a clean aesthetic and reducing installation complexity.

Availability

ECW515 will be available from EnGenius authorized resellers and distribution partners by the end of March, with an MSRP of $199. For additional product specifications and purchasing information, visit: ECW515

New Research Reveals Cybercriminals Love Valentine’s Day: 41% of all Valentine’s Day Spam Observed Malicious Intent

Posted in Commentary with tags on February 12, 2026 by itnerd

Bitdefender has released new findings showing that Valentine’s Day–themed spam has spiked in recent weeks, using the promise of love, discounts, and gifts from popular brands such as Dior, Sephora, and Walmart as lures.

41% of all Valentine’s Day spam observed had deceptive or malicious intent. Common tactics used to snare victims included phishing attempts, dating scams, fake giveaways, advance-fee schemes, and misleading surveys.

Findings include:

  • The U.S. was the most targeted destination at 55%, followed by Germany (13%), Ireland (8%), and the UK (6%).
  • The U.S. also ranked as the top source, responsible for over 43% of Valentine’s-related spam.
  • About 10% of scam-related messages used dating-themed lures, often relying on AI-generated profile images

You can get more details here: https://www.bitdefender.com/en-us/blog/hotforsecurity/nearly-4-in-10-valentines-day-emails-are-scams-what-bitdefender-antispam-lab-is-seeing-in-2026

The MSSP Threat Landscape Report Is Out From SOCRadar

Posted in Commentary with tags on February 11, 2026 by itnerd

In a threat landscape where 60% of underground discussions directly reference security vendors and their products, the question is no longer whether a company’s defenses are good enough; it’s whether they’re being actively monitored, adapted, and evolved.

A just-published MSSP Threat Landscape Report by threat intel company SOCRadar examines how threat actors systematically study, test, and bypass widely deployed security products, and why partnering with a Managed Security Service Provider is essential for true operational resilience. Have a look and consider what adjustments you need to do as an organization to keep yourself safe.

80% of Exploited Vulnerabilities Are “N-Days” – Not Zero-Days: Flashpoint

Posted in Commentary with tags on February 11, 2026 by itnerd

Today, the threat intelligence team at Flashpoint published new research examining how the race between defenders and adversaries is accelerating — and why known vulnerabilities, not zero-days, are now driving the majority of real-world attacks.

Key finding: Flashpoint data shows that N-day vulnerabilities account for more than 80% of Known Exploited Vulnerabilities (KEVs) tracked over the past four years, underscoring a major shift in attacker behavior. Even more concerning, the average Time to Exploit (TTE) — the gap between public disclosure and observed exploitation — has collapsed from 745 days in 2020 to just 44 days by 2025, dramatically reducing the patching grace period many enterprises rely on. 

Flashpoint researchers attribute this trend to the rapid weaponization of publicly released proof-of-concept code, effectively creating “turn-key” exploits that allow even less sophisticated actors to launch mass attacks within hours. 

Additional insights include:

  • Security and perimeter technologies — such as firewalls, VPN gateways, and edge devices — are among the most targeted because they must remain internet-facing. 
  • Nation-state activity remains prominent, with China identified as the most active actor in vulnerability exploitation campaigns. 
  • Most organizations lack full asset visibility, with many maintaining accurate inventories for only about 25% of assets, slowing detection and response. 

Why this mattersAs weaponization timelines compress — sometimes to under 24 hours — organizations must shift from reactive patching toward intelligence-led exposure management that prioritizes exploitability and threat-actor activity. 

The AI Caricature Trend Has Security Teams Paying Attention

Posted in Commentary with tags on February 11, 2026 by itnerd

The viral Instagram “AI work caricature” trend is exposing a serious shadow AI risk. By prompting ChatGPT to create job-based caricatures and posting the results publicly, users are unintentionally signaling their access to sensitive systems, their use of public LLMs for work, and potential data leakage in prompts. Millions are tied to real profiles, helping threat actors identify high‑value targets and potential exploitation of LLMs via prompt injection or jailbreaking.

This seemingly harmless trend is a roadmap for targeted cyber and data‑exfiltration attacks.

Fortra cybersecurity expert Josh Davies has just published an article informing of these risks, which you can read here: https://www.fortra.com/blog/what-can-ai-work-caricature-trend-teach-us-about-risks-shadow-ai 

UPDATE: Reinforcing that this is a top of mind issue at the moment, Bob Long, President, Americas at Daon had this comment:

“Preventing identity fraud on the internet can be a serious challenge. Everyone knows that it’s vital not to share high-value personal information like your social security number or credit card information, but that is just a start to truly protecting your identity. There are multiple ways that bad actors take advantage of people in order to break into their accounts. Stealing your login information through a data breach is just the most visible method of attack. The most common is something most people don’t even see until after their information is compromised—social engineering. Social engineering is a broad term for a number of methods of luring people into handing over their login credentials willingly. Phishing is the most well known of these techniques, but there are many others. One thing they all have in common is the more a fraudster knows about their target, the easier it is to fool them.

That’s where things like the new trend of having Generative AI create a caricature of you based on everything it knows about you moves from being a fun exercise to a security threat. By creating one of these images and posting it on social media, you are doing fraudsters’ work for them—giving them a visual representation of who you are. This is literally the modern version of the “40 things about me” posts that used to be popular on social channels, creating a quick access, public record of who you are so people with bad intentions can exploit it. The fact that it explicitly prompts AI to include everything it knows about you makes it sound like it was intentionally started by a fraudster looking to make their job easy. It not only tells them a lot about the person, but it tells them which people have a lot of accessible information and which don’t. Until all businesses move away from passwords and other knowledge based forms of authentication, people will need to remain vigilant about what information about them is publicly available.

Of course, the argument against giving your image to Generative AI also stands. Unless you know, for certain, what will be done with that image outside of providing the requested output, you are at risk of your image being used for anything from training AI image generators to populating less-than-legal tracking software. Sharing personal information, including your image, with AI should only be done when you know and trust the organization making the request.”

Finosec Named ICBA Preferred Service Provider for Cybersecurity Governance

Posted in Commentary with tags on February 11, 2026 by itnerd

The Independent Community Bankers of America (ICBA) today named Finosec, a cybersecurity governance SaaS company, as its newest preferred service provider. Finosec specializes in governance tools for infosec, vendor management and cybersecurity risk assessment, helping community banks enhance exam preparedness.

Finosec’s automated workflows help community banks manage repeatable tasks such as control reviews, policy updates, vulnerability tracking, and committee reporting. The platform also allows bankers to assign responsibilities, track completion, and identify potential gaps ahead of scheduled exams.

Finosec is the fifth ICBA ThinkTECH Accelerator alum to become an ICBA Preferred Service Provider.

Love, Fandom, and Hackers: The Romantic Passwords Cybercriminals Can’t Resist

Posted in Commentary with tags on February 11, 2026 by itnerd

New research from Specops Software shows that love-themed passwords are still extremely common, despite years of warnings from security experts. In fact, across a database of breached and compromised passwords, the word “love” appeared more than 4.7 million times — making it one of the most predictable (and hackable) choices users continue to rely on.

Additionally, terms from classic literature such as Wuthering Heights and from popular romance-themed TV shows like Heated Rivalry, are frequently appearing, suggesting that people often choose passwords based on beloved characters, themes, and fandom referenced. 

The top 5 romance pop-culture breached passwords right now are: 

  1. ilya – 233,702
  2. shane – 105,429 
  3. hockey – 67,658 
  4. boston – 34,886 
  5. catherine – 25,143 

This may seem like a harmless trend at first glance but predictable passwords are always a prblem because they are easier to breach in attacks. When users create romantic passwords based on love, names, pop culture, or seasonal events, they reduce the overall number of guesses an attacker needs.

The full details of this analysis can be found here: https://specopssoft.com/blog/romantic-passwords-cybercriminals-love/