The SOCRadar U.S. Threat Landscape Report 2026 Is Out

Posted in Commentary with tags on January 26, 2026 by itnerd

SOCRadar’s just released its U.S. Threat Landscape Report 2026 which highlights the most targeted industries, how threat actors monetize stolen data and access, and how ransomware, phishing, and DDoS attacks continue to pressure U.S. organizations.

Key highlights include: 

  • Top Targeted Sectors: Finance and Insurance leads dark web targeting at 14.39%, followed by Information Services (10.19%) and Public Administration (9.79%), showing sustained focus on high-trust and high-value data sectors.
  • U.S.-Only Targeting Dominates: 88.3% of threats focus exclusively on U.S. entities, while cross-border campaigns remain limited.
  • Monetization Drives Underground Activity: Selling accounts for 70.76% of posts and sharing adds 23.56%, confirming a strong underground market dynamic.
  • Data and Access Are the Main Commodities: Data-related threats represent 61.53%, while access sales reach 29.31%, reinforcing the role of initial access brokers.
  • Ransomware Remains Fragmented: Qilin, Akira, and PLAY together represent 33% of ransomware activity, while smaller groups make up the majority.
  • Phishing Hits High-Trust Targets: Public Administration accounts for 24.08% of phishing attacks, followed by Information Services at 19.45%.
  • HTTPS Makes Phishing Harder to Spot: 77.9% of phishing pages use HTTPS, reducing users’ ability to identify malicious sites.
  • DDoS Volume and Scale Are Severe: 1,036,378 DDoS attacks were recorded, with peak bandwidth reaching 1,475.67 Gbps and average attack duration around 59 minutes.

You can read the report here: https://socradar.io/resources/report/u-s-threat-landscape-report-2026/?utm_campaign=16185902-GatedContent_Country-Reports_Global_0725&utm_source=website&utm_medium=reportspage&utm_term=countryreports&utm_content=US26

ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

Posted in Commentary with tags on January 26, 2026 by itnerd

The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper

In late 2025, Poland’s energy system faced what has been described as the “largest cyberattack” targeting the country in years. ESET Research has now found that the attack was the work of the notorious Russia-aligned APT group Sandworm.

“Based on our analysis of the malware and associated TTPs, we attribute the attack to the Russia-aligned Sandworm APT with medium confidence due to a strong overlap with numerous previous Sandworm wiper activity we analyzed,” said ESET researchers. “We’re not aware of any successful disruption occurring as a result of this attack,” they added.

Sandworm has a long history of disruptive cyberattacks, especially on Ukraine’s critical infrastructure. Meanwhile, the attack on Poland’s power grid in the last week of December involved data-wiping malware that ESET has now analyzed and named DynoWiper. ESET security solutions detect DynoWiper as Win32/KillFiles.NMO.

While details regarding the intended impact continue to be investigated, ESET researchers have highlighted the fact that the coordinated attack occurred on the 10th anniversary of the Sandworm-orchestrated attack against the Ukrainian power grid, which resulted in the first ever malware-facilitated blackout. Back in December 2015, Sandworm used the BlackEnergy malware to gain access to critical systems at several electrical substations, leaving around 230,000 people without electricity for several hours.

Fast forward a decade and Sandworm continues to target entities operating in various critical infrastructure sectors, especially in Ukraine. In their latest APT Activity Report, covering April to September 2025, ESET researchers noted that they spotted Sandworm conducting wiper attacks against targets in Ukraine on a regular basis.

Forward Edge-AI Appoints Alan R. Seid as Vice President of International Sales

Posted in Commentary with tags on January 26, 2026 by itnerd

Forward Edge-AI today announced the appointment of Alan R. Seid as Vice President of International Sales, reinforcing the company’s focus on disciplined international growth across allied governments, public-sector partners, and strategic commercial markets.

Seid brings decades of experience spanning government leadership, international negotiation, and technology-driven economic development. He served in the House of Delegates of Palau from 1989 to 2000 and later in the Senate of Palau. He also served as President of the Asia Pacific Parliamentary Union, where he built enduring relationships with senior government and business leaders across the region.

Following his legislative service, Seid has remained active in large-scale infrastructure, digital finance, and technology initiatives throughout the Pacific and Asia. His work has included advancing digital financial systems, supporting blockchain adoption, and advising on sustainable development and climate resilience programs with regional and international stakeholders.

As Vice President of International Sales, Seid will lead Forward Edge-AI’s global market strategy, focusing on government, defense-adjacent, and critical infrastructure opportunities. He will oversee strategic partnerships and market entry efforts in priority regions, including the Pacific Islands, Southeast Asia, and Europe.

For more information about Forward Edge-AI and its solutions, please visit forwardedge.ai.

Data Privacy Week: Warnings for Consumers & Organizations That Are Being Targeted 

Posted in Commentary with tags on January 26, 2026 by itnerd

It’s Data Privacy Week, the National Cybersecurity Alliance’s annual international initiative to empower people and businesses to respect privacy, safeguard data and enable trust.

NCA warns consumers: “Your online activity creates a treasure trove of data – from your interests and purchases to your online behaviors, and it is collected by websites, apps, devices, services, and companies all around the globe, and can even include information about your physical self, like health data”

This is to share timely, helpful data privacy and litigation/risk advice and cautions for consumers and the retail, financial, healthcare, entertainment and personal services organizations targeting them from three data privacy, cybersecurity and AI experts.

Consumer Advice: Are Your Security Apps Are Putting You At Risk?

Ifrah Arif, Product Manager at PureVPN, a leader in personal cybersecurity and data privacy protections, warns: “We rely on an array of data privacy and security apps: VPNs, password managers, ad blockers, dark web monitors and more. They can conflict with one another, failing the user just when they’re needed most.”

“Non-integrated security tools from different vendors can actually drive ‘alert storms’ that put sensitive info at risk.

“Notification storms typically arise when someone’s using incompatible, non-integrated password managers, VPNs, dark web monitors, trackers, ad blockers and other security tools from differing vendors. The storm arises when tools roll out uncoordinated alerts and notifications to get the user’s attention. One tool mistakes another tool’s attempt to do its job as a threat, and sends users alerts. The resulting ‘alert fatigue’ often drives users to close their VPN or password manager, opening their devices to threats and exposing themselves to data theft and fraud.

The recent study The Cost of Fragmentation: Measuring Time, Spend and Risk in Personal Cybersecurity Tool Stacks,” found that 44% of users receive overlapping alerts, and 38% of those receiving overlapping alerts say they ignore them.

That’s why it’s important to use an integrated suite of security tools – a single unified platform. That way, instead of juggling multiple apps competing for your attention and overriding one another, you get a single, intelligent alert stream and a single place to act on it.

B2Cs, Be Aware:  That Popular Web Visitor Tracking Tech You’re Using? It May Be Illegal.

Ian Cohen, CEO and Founder at Lokker, said: “Data Privacy Week 2026 marks a watershed moment: plaintiffs’ attorneys and regulators are no longer asking whether organizations have compliant policies. They’re demanding proof of how data is processed in practice.”

The finalization of California’s Risk Assessment and Cybersecurity Audit regulations and the CCPA (mandates and penalties now in place as of January 1st) foreshadow regulatory trends to come.

Tracking Technologies and Data Privacy

“The popular tracking technologies companies use to personalize visitors’ experiences have emerged as the primary enforcement focal point. Their widespread deployment, reliance on third parties, and tendency to change without notice place them squarely within the definition of high-risk processing.”

Cohen notes that litigation and enforcement measures will put the spotlight on whether organizations can demonstrate visibility into and control of these tracking technologies.

Why this matters:  

  • 78% of sites deploy session replay tools that courts are treating as wiretap violations, and
  • 49.2% of S&P 500 companies include the Meta Pixel despite its status as a frequent litigation target.

Cohen notes: “Risk exists regardless of whether consent banners are present or policies are well-drafted. The convergence of private rights of action, operational regulatory mandates, and California’s expanding pen registry framework, through CIPA enforcement and class action activities, creates an environment in which technical privacy missteps can become costly litigated events overnight if neglected or mismanaged.

“To protect themselves and their customers, organizations need continuous visibility, defensible documentation, and clear remediation capabilities.

“Moving from static representations to operational proof isn’t optional anymore. It’s the foundation of modern privacy compliance.”

Michael Bell, CEO and co-Founder of AI implementation and cybersecurity firm Suzu Labs, confirms the problem.

“For businesses with websites (i.e. virtually every business), privacy compliance is moving from documentation theater to operational proof. The regulatory environment no longer accepts “we have a policy” as sufficient. Regulators and plaintiffs now ask ‘can you prove what actually happens?’ ” Bell said.

The 92.7% Problem: “Nearly all websites load third-party trackers before user consent is given. That’s not a configuration problem at the margins. That’s an industry-wide failure of the consent model as implemented. The banner exists. The policy exists. The trackers fire anyway,” he warned.

“This is exactly the gap between stated controls and actual controls that creates legal exposure. When plaintiffs’ attorneys or regulators examine what’s technically happening versus what disclosures claim, they find daylight. That daylight becomes litigation. There’s No grace period – the CCPA came into effect January 1.”

UPDATE: I have a pair of additional comments:

Andrew Costis, Manager of the Adversary Research Team at AttackIQ:

“Data has never been more under fire than it is currently. With the introduction of AI into cybercriminal activity, the number of attack surfaces has increased dramatically, as well as the number of exploitable vulnerabilities. If organizations don’t know exactly where their sensitive data lives or how it could be accessed, with or without authorization, they’re flying blind with their security defenses.

The emulation of adversarial attack tactics and techniques is paramount to the security of an organization’s data. Validating defenses against realistic attack paths protects data proactively by not only determining where the exploitable vulnerabilities lie, but also revealing which security controls actually prevent data exfiltration. Organizations need to take away the pathways to internal systems and data before attackers can find them and exploit them.

That being said, it’s important not to overlook the basics of cybersecurity hygiene and the backbone they provide for security defenses. Maintaining up-to-date software and applying distributed patches is a key first layer of protection for both individuals and organizations. Additionally, the use of strong, unique passwords and implementation of multi-factor authentication adds multiple layers of defense, making it harder for attackers to steal data, even if a set of credentials is already exposed.”

Ross Filipek, CISO at Corsica Technologies:

“In today’s environment where data is constantly moving between clouds, partners, and internal systems, modern platforms are forced to handle increasingly complex data flows across EDI, ERP, and CRM connections. With this comes greater risk, as with more systems to secure comes more potential attack surfaces, as well as more opportunities for sensitive customer or organizational data to be exposed.

Organizations need a platform that can offer visibility into data movement to maintain control and accountability over shared data. Prioritization of real-time monitoring and proactive issue resolution can help organizations detect anomalous behavior or unauthorized access before threat actors can fully infiltrate systems. These capabilities can transform a company’s infrastructure into a defensive layer that actively increases and supports data privacy, instead of standing by and watching as attackers march right to the core of a company’s network.”

UPDATE #2: Here’s another comment that just came in from Karl Bagci, Head of Information Security, Exclaimer:

  • “Email is a key target for cyber threats, which makes data privacy an everyday operational issue, not just a security concern. In regulated industries, email governance is one of the clearest signals of data protection maturity. All it takes is one unhinged email to expose risk, no matter how strong the underlying controls, audits, or certifications may be. Data Privacy Day is a reminder for organizations to embed governance into everyday communication, as this is what turns compliance from a best-effort activity into something enforceable, auditable, and sustainable.”
  • “Most data privacy failures don’t start with a breach or a sophisticated cyber-attack. They begin with everyday communication that isn’t governed, where information is shared quickly and repeatedly without consistent controls. If data protection policies don’t hold up in routine email, then those policies exist on paper rather than in practice. Data Privacy Day reminds us to adopt secure practices and protect sensitive information in every communication.”
  • “Data protection isn’t a policy document or a once-a-year compliance exercise. It’s an operational discipline that shows up in every external message an organization sends. The small details, the

Guest Post – The Pentagon’s Grok Problem: When AI Confidently Gets It Wrong

Posted in Commentary with tags on January 26, 2026 by itnerd

By Jurgita Lapienytė, Editor-in-Chief at Cybernews 

The Pentagon is adopting Elon Musk’s GrokAI chatbot, and it creates real risks. One of them is humans blindly following its flawed advice into disaster, not robots rebelling.

However, the Pentagon integrating Grok still carries real risks, just to mention a few.

Every new AI access point plugged into defence networks is another door for attackers to try to trick, poison or break. 

Note that xAI’s safety team is small compared to its competitors, meaning there are simply fewer resources to deal with the immense attack perimeter that every AI application represents these days.

Now, imagine officials feeding Grok military information for analysis. What might seem like a way to make processes more effective at first might turn into a cybersecurity nightmare. Statesmen should be trained on how to handle sensitive information and digital tools, but after the Signal scandal, when the Trump administration accidentally texted a journalist its war plans, we aren’t that naive anymore, are we?

Threat actors, including nation-state hackers, knowing that the Pentagon is actively using Grok, might be only more eager to break it via hacks, prompt injections, or supply chain flaws. It might be turned into a giant surveillance tool of the Pentagon.

What is more, Grok, as many other large language models (LLMs), can produce factually incorrect answers with confidence. The tool has already produced hateful and plainly wrong replies in public, spewing out racist content, promoting posts glorifying Hitler, let alone the undressing scandal with minors allegedly involved.

Is that really the tool that can be trusted by the Pentagon? At least the way it works now?

ABOUT THE AUTHOR 

Jurgita Lapienytė is the Editor-in-Chief at Cybernews, where she leads a team of journalists and security experts dedicated to uncovering cyber threats through research, testing, and data-driven reporting. With a career spanning over 15 years, she has reported on major global events, including the 2008 financial crisis and the 2015 Paris terror attacks, and has driven transparency through investigative journalism. A passionate advocate for cybersecurity awareness and women in tech, Jurgita has interviewed leading cybersecurity figures and amplifies underrepresented voices in the industry. Recognized as the Cybersecurity Journalist of the Year and featured in Top Cyber News Magazine’s 40 Under 40 in Cybersecurity, she is a thought leader shaping the conversation around cybersecurity. Jurgita has been quoted internationally – by Metro UK,  The Epoch TimesExtra BladetComputer Bild, and more. Her team reports on proprietary research highlighted in such outlets as the BBC, Forbes, TechRadar, Daily Mail, Fox News, Yahoo, and much more.

ABOUT CYBERNEWS

Cybernews is a globally recognized independent media outlet where journalists and security experts debunk cyber by research, testing, and data. Founded in 2019 in response to rising concerns about online security, the site covers breaking news, conducts original investigations, and offers unique perspectives on the evolving digital security landscape. Through white-hat investigative techniques, Cybernews research team identifies and safely discloses cybersecurity threats and vulnerabilities, while the editorial team provides cybersecurity-related news, analysis, and opinions by industry insiders with complete independence. 

THREAT RESEARCH: Czechia Under Coordinated DDoS Assault

Posted in Commentary with tags on January 26, 2026 by itnerd

Today, SOCRadar threat researchers published their findings on the identification of an intensive coordinated DDoS campaign conducted by pro-Russian threat actor, NoName057(16). Between the period of January 19 to 25, there were 5,095 recorded attack entries, overwhelmingly against Czech infrastructure. 

During the seven-day analysis period, the campaign demonstrated unprecedented scale and operational intensity, with daily target list updates distributed through Telegram channels. The campaign’s primary geographic focus on Czechia represents an escalation in NoName057(16)’s strategy of applying sustained pressure on NATO’s eastern flank members and key supporters of Ukraine.

Key findings include: 

  1. More than half of the attacks hit government services (53%).
  2. Critical infrastructure targeted included aviation, railways, and public transport (19.7% of attacks).
  3. Czechia saw 3,803 of the 5,095 attacks. 
  4. NoName057(16) deployed a sophisticated multi-vector attack strategy, combining transport-layer and application-layer attacks. 
  5. The findings indicate that there was a deliberate targeting of encrypted web services including government citizen portals. 
  6. The most targeted host domain was for the Czech National Police. 

For full details, the analysis can be found here: https://socradar.io/blog/ddos-threat-intelligence-czechia-26-jan26/

Microsoft Says That It Will Hand Over Your Bitlocker Keys To Law Enforcement… Should You Worry And What Can You Do To Protect Yourself

Posted in Commentary with tags on January 26, 2026 by itnerd

Disclaimer: I am not trying to give tips to the bad guys. But given the fact that I have been emailed about this repeatedly since this story broke, I felt that I needed to respond.

Late last week, news broke that Microsoft not only will hand over Bitlocker keys to law enforcement, but it has done so.

Wait, what are Bitlocker keys? Glad that you asked that question.

Microsoft Windows 11 has a full disk encryption feature called Bitlocker. The goal of Bitlocker is to keep your data on your laptop or desktop safe by encrypting it. And to decrypt it, you need a key to do that. So think of it like this. Your data is protected by a padlock. And you have a key to unlock it. That should keep it save from prying eyes.

But here’s the catch, Microsoft also has a key to your data and is willing to hand it over to law enforcement. Now this is likely making you think “wait, I didn’t give Microsoft a key to my data”. Well, actually you did. If you install Windows 11 and you turn on Bitlocker, assuming that it isn’t on already, you need to create a Microsoft account. The idea is that it will store the Bitlocker key in the cloud. The thing is, that the second you do that, Microsoft has access to that key. Now you can opt out of this, but it takes a lot of effort (the cynic in me says that this is deliberate on the part of Microsoft) to do that. And the average user isn’t going to go through that effort. So they take the easy way out.

If you’re still with me, you’re now likely thinking “wow, that’s a massive potential security risk for users.” And you’d be right. The fact that Microsoft can do this to anyone who uses Windows 11 with a Microsoft account is problematic to say the least. Contrast that with Apple who claims to have zero access to keys related to FileVault which is their full disk encryption feature, it creates a comparison that I am going to guess that Microsoft would rather you not make.

So, if this freaks you out, the question becomes what are your options to mitigate this risk. This is what I would suggest:

  • Use A Local Account Instead Of A Microsoft Account: By installing Windows 11 with a local account, you avoid this completely as it doesn’t upload the Bitlocker keys to the cloud where Microsoft can get access to them. Microsoft shockingly has instructions as to how to do this here. But I would default to these instructions as they are a bit more straightforward.
  • Don’t Use Bitlocker To Encrypt Your Disk: Alternatives to Bitlocker that I would actually recommend to people are few and far between. What I would recommend instead is using a self encrypting hard drive. The reason being is that Bitlocker is largely software encryption. That means that there is a bit of overhead in terms of the data being encrypted and decrypted. A self encrypting hard drive is hardware encryption which has substantially less overhead. Another plus that self encrypting drives have over Bitlocker is that these drives secure data in ways that make them difficult if not impossible to break into. Self encrypting drives can be installed in most laptops and desktops after purchase, or they can be added as options during the purchase process. Besides speed, these drives also adhere to standards such as FIPS 140-2 Level 3 validation. Which makes them ideal for environments where the security of data is paramount. The only thing that I would ensure is that you should make sure that the drive that you use adheres to the TCG Opal 2.0 specifications for maximum compatibility with applications that manage these drives. If you want to go down the rabbit hole on self encrypting drives, this will help you to do so.

Now should you worry about the fact that Microsoft will hand over your Bitlocker keys to law enforcement? One view is that if you’re not a bad guy you shouldn’t be concerned. Another view is that if you care about privacy, you should be concerned as someone outside of Microsoft might get their hands on these keys and use them for whatever evil purpose that they have in mind. Or Microsoft may start handing these keys over to non-law enforcement agencies or repressive governments or the like. The bottom line is that you have to look at this relative to your comfort level of letting Microsoft have access to the keys that protect your data. And take action based on that.

FIRE Report: Fake Bank Logins Outsmart Google – How Attackers Are Hijacking Search to Target Financial Institutions 

Posted in Commentary with tags on January 26, 2026 by itnerd

Fortra’s Intelligence and Research Experts (FIRE) are tracking HaxorSEO (HxSEO), an active cybercrime marketplace that poses a direct threat to financial institutions by manipulating search rankings to drive phishing and fraud. Operating on Telegram and WhatsApp, HxSEO sells backlinks from long‑trusted, compromised domains, allowing fake financial login pages to outrank legitimate ones. For just a few dollars, attackers can scale account takeover, fraud, and malware delivery, turning routine online banking searches for customers into high‑risk activities.

You can read the report here: https://www.fortra.com/blog/seo-poisoning-marketplace-topping-search-results-impersonating-top-financial-institutions

Elon Musk Is Likely In Deep Trouble As Grok Is Under Investigation By The EU

Posted in Commentary with tags , , on January 26, 2026 by itnerd

It sucks to be Elon Musk. He’s already been slapped by the EU for not adhering to the Digital Markets Act, and he’s been under fire for the fact that his AI chatbot Grok creates content that is objectionable content. Here’s how that played out:

That takes us to today. The EU has clearly had enough with Elon’s antics and have opened an investigation into Grok and Twitter/X:

The European Commission has launched a new formal investigation against X under the Digital Services Act (DSA). In parallel, the Commission extended its ongoing investigation launched in December 2023 into X’s compliance with its recommender systems risk management obligations.

The new investigation will assess whether the company properly assessed and mitigated risks associated with the deployment of Grok’s functionalities into X in the EU. This includes risks related to the dissemination of illegal content in the EU, such as manipulated sexually explicit images, including content that may amount to child sexual abuse material.

These risks seem to have materialised, exposing citizens in the EU to serious harm. In light of this, the Commission will further investigate whether X complies with its DSA obligations to:

  • Diligently assess and mitigate systemic risks, including of the dissemination of illegal content, negative effects in relation to gender-based violence, and serious negative consequences to physical and mental well-being stemming from deployments of Grok’s functionalities into its platform.
  • Conduct and transmit to the Commission an ad hoc risk assessment report for Grok’s functionalities in the X service with a critical impact on X’s risk profile prior to their deployment.

It’s a safe bet that this will not end well for Elon because when you mess with the EU, the EU tends to make life miserable for you. And it will also be a safe bet that Elon with whine and moan about how unfair this is. But let’s face facts. Elon created this situation by his cavalier attitude towards common decency. And as a result, this very troubled man is likely now in the “find out” phase.

Like I said at the start of this, it sucks to be Elon Musk.

Jelou Raises $10M to Build AI Apps That Move Money on WhatsApp

Posted in Commentary with tags on January 26, 2026 by itnerd

Messaging has become the primary way people communicate with businesses across the Americas, yet the actions that actually move money still happen elsewhere. Payments, identity checks, credit applications, and signatures are routinely pushed into apps, portals, or call centers, creating friction, abandonment, and operational cost. Jelou was built to close that gap by turning conversations into execution. Today, the company announced a $10 million Series A to expand Brain, its platform for building AI agents that securely execute real business and financial operations inside WhatsApp.

The round was led by Wellington Access Ventures, with participation from Krealo, Credicorp’s corporate venture arm, and Collide Capital. Jelou has now raised $13 million in total funding, including a $3 million Seed round led by Act One Ventures and Arca Continental Ventures.

The timing reflects a broader shift in how businesses interact with customers. Conversational channels like WhatsApp have become the default interface across Latin America, yet most AI tools remain limited to answering questions rather than completing transactions. At the same time, enterprises face rising pressure to reduce operating costs, improve conversion, and deploy AI that can integrate with existing systems without introducing security or compliance risk. Jelou’s approach focuses on execution, enabling AI agents to move work forward inside the conversation instead of handing it off to fragmented tools.

Jelou’s core product, Brain, is a platform that allows businesses and developers to create and operate AI agents that connect directly to their existing systems and perform transactional operations inside chat. Through Brain, companies can deploy agents that communicate with customers over WhatsApp, collect missing information, verify identity, trigger payments, and advance financial workflows using live system data. The platform includes a web-based studio with more than 3,000 integrations for building and integrating agents, as well as a conversation management layer that allows teams to oversee high-volume interactions while securely executing workflows such as payments, credit processes, and document signing.

The company’s journey began in Ecuador in 2017, where founder Luis Loaiza and the Jelou team observed that messaging had become the dominant interface for commerce in the region, while execution remained fragmented and insecure. Drawing on more than a decade of experience building messaging and encrypted communication systems, the team set out to make chat a place where real business happens. Since then, Jelou has expanded across Latin America, processing more than $100 million in financial operations  and serving over 500 business customers across more than 13 countries, including banks, retailers, and consumer goods companies.

Jelou’s traction reflects a broader trend toward conversational commerce and agent-driven operations. As AI adoption accelerates, businesses are discovering that automation only delivers value when it is tightly integrated with existing infrastructure and designed for production from day one. In regions like Latin America, where companies must operate across diverse regulations, payment rails, and systems, the ability to deploy secure, scalable AI inside familiar channels is becoming a competitive necessity.

Looking ahead, Jelou plans to expand Brain into a full operating system for conversational business, enabling companies and developers to build, deploy, and manage production-ready WhatsApp applications directly from a prompt. The company’s vision is to make WhatsApp the primary operating layer for businesses across the region, with Jelou providing the platform that powers everything built on top of it.