BforeAI Threat Report: How Unrest in Iran is Being Weaponize Online 

Posted in Commentary with tags on February 5, 2026 by itnerd

Many of us are watching developments in Iran with interest. The threat researchers at BforeAI took a look at how these tensions are being used to fuel online scams and other fraudulent or malicious activity. While the timeframe for this analysis ranges from the beginning of December to mid-January, we feel that this is indicative of what can be expected, especially as rhetoric from the governments of the US and Iran, as well as regional powers in the Mideast, continues to escalate.

PreCrime™ Labs analyzed an organized surge of Iran-themed domain registrations across a small set of registrars and cheap top level domains (TLDs), indicating clear clusters around themes including protest, conflict, sanctions evasion, gambling, and infrastructure that can be used as predictive indicators for preemptive security controls.

There is a strong concentration around a handful of registrars, privacy protected records, and Cloudflare or Chinese DNS, which together act as early risk signals for coordinated campaigns tied to the ongoing Iran conflict and related information operations. Multiple thematic clusters using keywords such as “protests”, “no war”, “sanctions”, “logistics”, “casinos”, and “VPN”, provide high-value predictive indicators for proactive blocking, brand and policy enforcement, and sanctions risk monitoring before full campaigns go live.

You can read the threat report here: https://bfore.ai/report/malicious-infrastructure-campaigns-how-iran-is-weaponized-online

Guest Post – 73% of exposed OpenClaw servers remain public: Expert urges businesses to act now

Posted in Commentary with tags on February 5, 2026 by itnerd

The AI agent OpenClaw’s popularity has skyrocketed over recent weeks, but so have concerns about its cybersecurity risks. New findings reveal that roughly 73% of OpenClaw servers exposed this week remain publicly accessible to this day, creating a significant threat to users and an even greater risk to businesses — a single employee using OpenClaw could potentially expose sensitive information or corporate credentials.

openclaw.ai (formerly Clawdbot or Moltbot) is a self-hosted AI agent and assistant created by developer Peter Steinberger. Recently, it took the internet by storm with the promise of an AI agent that not only responds but also takes independent action — OpenClaw can instantly execute commands, such as scheduling meetings, editing files, or browsing the internet, among many other use cases.

Although deemed revolutionary by some users, OpenClaw’s functionalities come with a hefty cost — with extensive access to local and web-based applications, passwords, and other sensitive information, the responsibility of securing the environment in which the AI agent is deployed falls on the user, and failure to do so poses a high risk of leaking data to the open web. Labeled as a “hobby project” by its creators, OpenClaw doesn’t sugarcoat its cybersecurity risks and recommends that users who are not familiar with basic security and access control avoid the AI agent or seek guidance from professionals.

A senior threat intelligence researcher from NordStellar, a threat exposure management platform, analyzed findings from network observability tools that revealed about 21,000 (21,356) servers running OpenClaw or its prerequisites were accessible on the public internet this week.

As of Thursday, February 5th, nearly 16,000 (15,578) of those servers were still accessible, highlighting that not only does OpenClaw pose significant cybersecurity risks, but users are slow to take the necessary security measures to make these servers inaccessible, leaving them publicly exposed, and further illustrating that the majority of them lack the technical knowledge to mitigate the security risks of deploying OpenClaw.

And that’s only part of the story — a recently documented high severity vulnerability in OpenClaw allows an attacker to gain remote code execution just by tricking a user into clicking a single malicious link. Users have also been flocking to GitHub to report vulnerabilities. While not all of them have been validated, the number of identified security issues has been growing rapidly and has already surpassed 100 reports.

Having already garnered over 145,000 GitHub stars and 20,000 forks, users are nevertheless quick to adopt the new agent. Andrius Buinovskis, a cybersecurity expert at NordLayer, a toggle-ready network security platform for businesses, warns that OpenClaw’s growing popularity should be a cause for concern among businesses.

“OpenClaw introduces significant security risks for users, but they’re even more dangerous for organizations. Businesses handle extremely sensitive data, and a single employee using OpenClaw could unknowingly jeopardize the organization’s security,” says Buinovskis.

He explains that the AI agent stores passwords, API keys, and OAuth tokens in plaintext — without encryption — so leaked corporate credentials will be easily accessible and usable by anyone who manages to get their hands on them. This sensitive data, along with chat history with the AI bot, is stored on a local web server that could accidentally be exposed to the public internet.

“With the ability to automate some everyday work tasks, it’s understandable why employees could be eager to deploy OpenClaw. The software is primarily designed for a more tech-savvy audience, such as developers and vibe-coders. However, the sheer number of exposed servers proves that even experienced users overlook basic security hygiene when a tool is easy to misconfigure,” says Buinovskis.

Mitigating OpenClaw security risks in a business environment

According to Buinovskis, while there are many cybersecurity concerns surrounding OpenClaw, businesses can take key preventive measures to mitigate some of the main risks. He highlights that full system access, autonomy, and complex setups are key risks security teams should keep in mind and aim to address.

“The first key objective is to mitigate the shadow IT problem OpenClaw poses for organizations by avoiding uncontrolled and decentralized deployments,” says Buinovskis. “This calls for clear policies surrounding approved software enforcement mechanisms, like endpoint detection, to prevent employees from running unapproved instances in the first place.”

He highlights that while OpenClaw is dangerous, security teams would benefit from getting ahead of the problem. Since employees might go rogue and use it anyway, it’s better for them to do so in a secure, controlled environment.

“In reality, even extensive cybersecurity awareness training does not guarantee that users will refrain from risky behaviour, despite knowing the threats that may follow. While it might seem counterintuitive, allowing employees who are interested in using OpenClaw to deploy it centrally would eliminate any risks that could arise from poor misconfiguration,” says Buinovskis.

He explains that centralized deployment provides a single point of control for security teams, allowing them to configure a single instance correctly rather than relying on numerous employees to do it right. This approach also establishes consistent security settings throughout — ensuring that authentication, firewalls, and encryption are applied, and allowing easier monitoring of logs and access attempts.

“Even if OpenClaw is deployed centrally, users still need a safe way to access it. For this, they need a secure, encrypted tunnel that they could access with authorization,” says Buinovskis. “Secure tunnels ensure that the server containing sensitive data is isolated from the public internet, and setting up a VPN or private network allows only authorized users to have access to OpenClaw.”

Bunovskis continues that creating remote access via secure tunnels prevents the server containing sensitive data from becoming publicly accessible, safeguarding it from attackers. This approach also encrypts the traffic, mitigating the risk of data exposure during transit.

Protecting the Big Game: A Threat Assessment for Super Bowl LX 

Posted in Commentary with tags on February 5, 2026 by itnerd

Each year, the Super Bowl draws one of the largest live audiences of any global sporting event, with tens of thousands of spectators attending in person and more than 100 million viewers expected to watch worldwide. Beyond the game itself, the Super Bowl represents one of the most influential commercial and media stages in the world, with major brands investing in some of the most expensive advertising time of the year. The scale, visibility, and economic significance of the event make it an attractive target for threat actors seeking attention, disruption, or financial gain, underscoring the need for heightened security awareness.

Cybersecurity Considerations

At this time, Flashpoint has not observed any specific cyber threats targeting Super Bowl LX. Despite the absence of overt threats, it remains possible that threat actors may attempt to obtain personal information—including financial and credit card details—through scams, malware, phishing campaigns, or other opportunistic cyber activity.

High-profile events such as the Super Bowl have historically been leveraged as bait for cyber campaigns targeting fans and attendees rather than league infrastructure. In October 2024, the online store of the Green Bay Packers was hacked, exposing customers’ financial details. Previous incidents also include the February 2022 “BlackByte” ransomware attack that targeted the San Francisco 49ers in the lead-up to Super Bowl LVI.

Potential Physical Threats

Protests and Boycotts: Flashpoint analysts have identified online chatter promoting protests in the Bay Area in response to allegations that Immigration and Customs Enforcement (ICE) agents will conduct enforcement operations in and around Super Bowl LX. A planned protest is scheduled to take place near Levi’s Stadium on February 8, 2026, during game-day hours.

The blog post can found here:

https://flashpoint.io/blog/protecting-the-big-game-a-threat-assessment-for-super-bowl-lx/

CloudSEK report flags cross-border crypto investment scams using fake regulators & messaging apps

Posted in Commentary with tags on February 5, 2026 by itnerd

CloudSEK’s latest threat intelligence report details a growing cross-border cryptocurrency investment scam ecosystem leveraging social messaging platforms and fake regulatory credentials to defraud unsuspecting investors.

The report documents how scam networks are impersonating financial regulators, investment firms, and compliance authorities across regions, using platforms such as WhatsApp and Telegram to build trust, lure victims into fraudulent crypto schemes, and move funds across borders. Our researchers analysed the infrastructure, social engineering tactics, and operational patterns behind these scams, highlighting how they are evolving beyond isolated fraud cases into organised, repeatable crime models.

Key insights from the report include:

  • How fake regulatory identities and compliance documents are used to create legitimacy
  • The role of social messaging channels in scaling investor scams quickly across geographies
  • Indicators that link these operations to coordinated, cross-border fraud networks

Given the rising impact of crypto-related fraud on retail investors and the renewed regulatory focus on digital asset scams, we believe these findings may be relevant for your coverage on cybersecurity, financial crime, or consumer protection.

You can read the full report here: https://www.cloudsek.com/blog/cross-border-cryptocurrency-investment-scam-leveraging-social-messaging-channels-and-fake-regulatory-credentials 

TELUS strengthens communications service resilience east of Baie-Comeau

Posted in Commentary with tags on February 5, 2026 by itnerd

TELUS today announced the successful deployment and commissioning of its nearly 125-kilometre submarine fibre optic cable connecting Sept-Îles to Sainte-Anne-des-Monts. This critical infrastructure, which was deployed and buried in the seabed of the St. Lawrence River in November and December 2025, provides essential redundancy to the telecommunications network serving communities east of Baie-Comeau. This major project was made possible through a joint investment of more than $20 million from TELUS and the Government of Canada.

The commissioning of this submarine infrastructure creates an essential backup route that will ensure the continuity of all telecommunications services in the event of failures or breaks on the main terrestrial network along Route 138 between Baie-Comeau and Sept-Îles. The cable offers massive bandwidth capacity, ultra-low latency and multi-decade durability, while ensuring physical redundancy as part of TELUS’s diverse route strategy.

A connectivity project anchored in responsible innovation

This major project was carried out following strict standards for the protection of marine wildlife and the environment. Several innovative initiatives were deployed.

  • During cable installation, the team relied on a detection system combining thermal imaging, AI and human intelligence to prevent collisions and reduce sound impacts on marine mammals—a first in Canada.
  • Environmental restoration work is planned for the spring and summer of 2026 to ensure the protection of the St. Lawrence River shorelines and to support the natural regrowth of resilient plants such as Sea Lyme-grass.

This initiative is part of TELUS’s commitment to connecting regions, supported by $70 billion in planned investments through 2029 allocated to infrastructure development, business expansion and spectrum licence acquisition.

Security experts struggle to keep pace with AI threats as 90% report at least one security incident in the past year

Posted in Commentary with tags on February 5, 2026 by itnerd

The vast majority of businesses are struggling to adapt and scale their security operations in the face of talent shortages and new threats from AI according to research released by enterprise CMS Storyblok.

Storyblok surveyed 300 senior security professionals in leadership or decision making roles at medium to large scale companies. The research underlines the challenges businesses now face in continuing to grow their operations while countering new security threats.

When asked to rank how they expected AI to impact company security practices in the coming year, 65% say they needed to upgrade security and threat monitoring, 54% identity and access management would become more complex, and 50% believe stronger data protection and privacy controls are required. However, meeting these demands is unlikely to be straightforward, with 50% responding that talent and skills shortages were a major barrier to improving security, followed by the complexity of legacy tech systems (46%), regulatory uncertainty (45%) and budget limitations (42%).

Website security remains a key area of concern. Only 49% of businesses say they were ‘fully prepared’ for a security incident and 39% reported a security issue impacting their content strategy in the past year. 62% cited data encryption and privacy as an area which needs to be prioritized for future website security investment, followed by user authentication and control (56%), and AI powered security tools (51%).

The top three security threats identified by businesses were threats from hackers and malware (54%), employee human error (47%), and AI introducing new risks (45%). 

In relation to AI-specific security threats, 59% rated new AI tools being used by hackers as a major challenge, followed by protecting data used or generated by AI (53%), and compliance and regulatory risks caused by AI (53%). 

When asked which parts of their company’s strategy was most affected by security concerns, 60% said being able to scale security operations in line with company growth, followed by handling employee and customer data across countries (58%), and working with new vendors and partners safely (49%).

Despite these concerns, 76% of businesses rated their company’s security as above average, with only 5% admitting it was below industry standards.

Looking ahead to threats in the next three to five years, increasing use of AI was unsurprisingly number one at 55%, followed by cloud adoption and multi-cloud complexity (49%), and growing global regulatory and compliance requirements (45%).

TELUS opens Canada’s first fully sovereign AI Factory to startups and small businesses through L-SPARK collaboration

Posted in Commentary with tags on February 4, 2026 by itnerd

TELUS and L-SPARK today announced a new partnership to provide Canadian startups and innovators with access to the TELUS Sovereign AI Factory –

Canada’s fastest and most powerful supercomputer – addressing a critical barrier facing Canadian AI startups: access to high-performance compute infrastructure without relocating or building on foreign platforms.

This collaboration marks a significant step forward in enabling Canada’s startup and innovation ecosystem by providing them access to the same enterprise-grade computing infrastructure available to large organizations. By making this same technology available, regardless of business size, TELUS and L-SPARK are creating a new pathway for Canadian companies to build cutting-edge AI solutions, scale domestically and compete globally – all while keeping everything under Canadian control and jurisdiction.

As Canada’s leading corporate accelerator partner, L-SPARK connects high-potential startups and growing companies with enterprise partners and the resources necessary to thrive in today’s competitive market. For nearly a decade, L-SPARK has supported over 130 Canadian companies through specialized accelerator programs, helping them raise more than $200 million in follow-on funding. Now, this landmark partnership will empower more startups and small businesses to leverage the TELUS Sovereign AI Factory – powered by latest-generation NVIDIA H200 GPUs and NVIDIA Quantum 2 InfiniBand networking – to train, fine-tune and deploy AI models on Canadian-controlled infrastructure.

The collaboration will prioritize organizations in regulated and mission-critical sectors where data residency, auditability and Canadian legal jurisdiction are essential, including public sector services, healthcare, finance, critical infrastructure and utilities.

This partnership builds on TELUS’ longstanding commitment to supporting small businesses and entrepreneurs across Canada through programs including TELUS Global Ventures, TELUS #

StandWithOwners, and TELUS Pollinator Fund for Good. By providing access to sovereign, high-performance compute infrastructure, TELUS is helping level the playing field for Canadian startups that would otherwise need to rely on foreign cloud providers or forgo ambitious AI initiatives altogether. TELUS plans to expand startup AI access through additional partnerships with accelerators, incubators, research institutions and innovation hubs across Canada in the coming months.

Canadian startups, scaleups and research teams with defined AI workloads and significant GPU requirements can sign up here with L-SPARK to access reserved TELUS AI Factory GPU capacity.

Lynx Claims To Have Pwned Lakelands Public Health

Posted in Commentary with tags on February 4, 2026 by itnerd

Comparitech is reporting that a ransomware group, Lynx, yesterday claimed a cyberattack against Lakelands Public Health in Ontario, Canada. The attack has not yet been confirmed. Bit seeing as this is in my backyard, I’m interested in following this story:

Commenting on this news is Rebecca Moody, Head of Data Research at Comparitech: 

“As Lakelands Public Health continues to grapple with this attack, it’s important it provides an update on its investigation and Lynx’s ransomware claim as soon as possible. That way, anyone involved can begin to mitigate any potential risks that may arise from the breach (e.g. by monitoring accounts for unauthorized activities and being on high alert for potential phishing messages).

Lynx has been around for nearly two years now and doesn’t tend to fabricate claims. Therefore, I think it’s highly likely there has been some kind of breach of data in this attack. Hopefully, it will be limited. According to our data, Lynx is responsible for the breach of nearly 213,500 records across 17 separate attacks (where breach figures and notifications have been provided).”

If or when this is confirmed, I would be very interested in what the Privacy Commissioner of Ontario has to say as this would have to be reported to them at the very least. That would be very instructive.

SIOS Technology COO Masahiro Arai Named to South Carolina 500 List of Most Influential Business Leaders

Posted in Commentary with tags on February 4, 2026 by itnerd

SIOS Technology Corp. today announced that Masahiro Arai, Chief Operating Officer, has been named to the 2025 South Carolina 500 list of Most Influential Business Leaders by SC Biz News.

The South Carolina 500 is a premier recognition program celebrating the most influential and accomplished professionals shaping the state’s economy across industries through leadership, innovation, and community impact. Arai’s selection highlights his visionary leadership at SIOS Technology and his contributions to advancing resilient IT infrastructure for organizations across critical sectors.

In his role, Arai oversees the company’s day-to-day business operations, driving alignment across product management, engineering, sales, and marketing teams to deliver innovative HA and DR solutions. Under his leadership, SIOS Technology has expanded its capabilities and fortified its market position, helping organizations maintain continuity for essential workloads across physical, virtual, cloud, and hybrid environments.

Arai’s career began with a Master’s degree in Electronic Engineering, Robotics from Tokyo Denki University and spans engineering, product management, sales, and technical leadership roles. Despite his senior position, he remains deeply engaged with technology innovation, regularly working with teams on proof-of-concept solutions that respond to customer and partner needs.

The South Carolina 500 list serves as a definitive guide to influential business leaders across sectors who are driving growth, creating opportunity, and elevating the state’s economic landscape.

Why CVSS Scores Don’t Always Reflect an Exploit’s Actual Severity

Posted in Commentary with tags on February 4, 2026 by itnerd

Today we’re covering Operation Neusploit, the advanced cyberespionage campaign identified by Zscaler ThreatLabz attributed with confidence to the Russia-linked APT28 (A.K.A. Fancy Bear) threat group, we’re sharing this perspective on its 7.8 score.

Neusploit weaponizes CVE-2026-21509, a Microsoft Office zero-day security bypass vulnerablity, to target government and executive organizations in Ukraine, Slovakia, and Romania. It uses native language social engineering ploys to launch multi-stage infection chains that begin by monitoring login events and forwarding emails to attackers. A dropper then downloads further malicious implants and a post-exploitation framework for command and control as well as lateral movement.

Given the campaign’s potential impact, some have questioned the vuln’s 7.8 Common Vulnerability Scoring System (CVSS) score vs. a higher one.

Sunil Gottumukkala, CEO of Averlon, explained:

   “A 7.8 CVSS score for this vulnerability is based on the prerequisites needed for exploitation: #1 the payload (in this case the specially crafted office file) to be delivered locally, and #2 the local user to open it. It cannot be exploited without end user interaction at that early and specific point in time.

“However, scoring that single specific slice of the exploit chain fails to capture just how effective modern, highly targeted social engineering has become, especially with AI. In campaigns like this, overcoming the user interaction prerequisite is becoming straightforward, and that initial foothold becomes the first step in a sophisticated attack chain that can quickly expand before organizations are able to patch.”

This is a big hint that the scoring of vulnerabilities needs a rethink to reflect the modern reality of cybersecurity. But I for one do not thing that this will happen anytime soon.