Team Cymru and The Vertex Project Partner to Enable Real-Time Threat Visibility with Synapse

Posted in Commentary on December 9, 2025 by itnerd

Team Cymru today announced a new integration with The Vertex Project to bring Team Cymru’s Pure Signal Data Ocean directly into Synapse Enterprise, Vertex’s Central Intelligence System, designed to help security and intelligence teams unify data, accelerate investigations, and improve response times. The new Synapse Power-Up for Team Cymru enables analysts to access near-real-time global threat visibility directly within Synapse Enterprise, giving organizations a faster and more efficient way to understand risk, enrich investigations, and respond to active threats.

For years, Team Cymru’s Pure Signal intelligence has helped organizations identify malicious infrastructure, accelerate investigations, and monitor external risks before they become business-impacting incidents. By integrating Pure Signal directly into Synapse Enterprise, analysts can now access this high-fidelity intelligence without switching tools, connecting data manually, or managing fragmented workflows. The result is quicker threat recognition, smoother investigations, and a more complete view of the risk landscape.

The Vertex Project’s Synapse Enterprise platform enhances the value of Pure Signal by centralizing internal telemetry, investigations, and intelligence workflows into one place. With Pure Signal modeled directly into this ecosystem, teams benefit from a seamless analytic experience in which global network insight is automatically connected to their existing data and processes. This makes it easier to prioritize threats, collaborate across teams, and turn intelligence into action at enterprise scale.

By combining Team Cymru’s global visibility with Synapse Enterprise’s analytical capabilities, organizations gain a unified, streamlined approach to threat detection and response. The integration reduces manual effort, eliminates blind spots, and empowers teams to identify threats earlier and respond more effectively.

For more information, customers can access The Vertex Project’s Synapse Enterprise by visiting: team-cymru.com/vertex

Hisense Tops Global 100-Inch and Laser TV Markets in Q3 2025

Posted in Commentary with tags on December 9, 2025 by itnerd

Hisense has once again ranked No.1 globally in the 100-inch and over TV segment with a 56.6 per cent shipment share, and in the Laser TV segment with a 68.9 per cent shipment share in Q3 2025, according to the latest data released by Omdia. The result reaffirms Hisense’s industry leadership driven by continuous innovation and a deep understanding of consumer needs.

As the originator of RGB Mini-LED technology, Hisense continues to set new standards in large-screen display technology. Backed by strong independent R&D, Hisense’s RGB Mini-LED technology delivers authentic, vivid colour like never before — powered by extraordinary brightness and precision that brings every scene to life with stunning realism and emotional depth. These innovations go beyond colour and picture quality — making technology more human, turning every moment of watching, sharing and relaxing into a richer, more emotionally connected experience for families around the world.

Hisense continues to lead the Laser TV market — as proven by the latest 2025 UST Projector Showdown results. The Hisense L9Q took the top spot across Mixed Room Use, Dedicated Theatre, and Overall Picture Quality, while the PX3-PRO was awarded No. 1 Best Value Pick and also ranked highly in picture performance.

With a collaboration with Devialet, the L9Q offers a deluxe home cinema experience with up to a 200-inch projection, 5,000 ANSI lumens, a 5,000:1 contrast ratio and IMAX Enhanced and Dolby Vision certifications — truly bringing the theatre home.

From technology to market, Hisense continues to lead the industry’s evolution toward higher quality and greater innovation. By mastering core technologies and transforming them into products that elevate global home entertainment standards, Hisense is not only shaping what people watch — but also how the world envisions the future of display.

For more information, please visit hisense-canada.com.

Guest Post – Betrayal by employees: Dark web cybercriminals selling services built on insider data

Posted in Commentary with tags on December 9, 2025 by itnerd

New findings from the dark web reveal that cybercriminals are selling insider data-backed services

Malicious employees, also known as insider threats, can cause significant harm to businesses by leaking or selling sensitive data, altering systems, or collaborating with cybercriminals to launch large-scale cyberattacks. New findings from NordStellar, a threat exposure management platform, reveal that bad actors are now advertising and selling insider data-backed services on the dark web — profiting from employees of industry giants who have decided to go rogue.

The team at NordStellar has found 35 dark web posts claiming to sell services based on insider data so far this year. Some of the services for sale on the dark web claim to have direct connections to insiders from such well-known companies as Facebook, Instagram, and Amazon.

“The majority of the posts discovered by NordStellar’s team offer various look-up services, exposing sensitive user information, such as IP addresses,  full names, email addresses, phone numbers, and even physical addresses,” says Vakaris Noreika, a cybersecurity expert at NordStellar. “Aside from violating the user’s privacy, this information can be used to launch highly targeted phishing scams or to commit fraud — or even identity theft.”

The posts reveal that look-up services can start at $500, offering the user’s phone number and linked email address. Advanced packages, which contain even more sensitive user information, such as IP addresses, physical addresses, date of birth, and other confidential details, can be purchased for $1,000 or more.

“Other popular services include account recovery and unbanning. The former can be especially damaging to the brand because users are often banned for violating the company’s policies or engaging in fraudulent activity,” says Noreika. “As a result, individuals who have been using the company’s services for scams can continue to do so, acquiring more victims and damaging the brand’s reputation in the process.”

Spotting and stopping insider threats

Noreika explains that insider threats are complex, and to safeguard against malicious employees, companies must have a comprehensive cybersecurity strategy in place. He emphasizes high observability and behavioural analysis as the two main pillars for resilience.

“The first key step is to ensure high observability into user actions — once security teams achieve visibility, they can look for anomalies in employee behavior, triggering the first alarms about potential malicious activity,” Noreika says. “Security teams should assess whether there’s any potentially dangerous patterns in activity, for example, if a user is accessing sensitive information without justification or if there are any signs of them exfiltrating that information to external sources, like their own personal devices, accounts, or third parties.”

He underscores the importance of proper network segmentation and the principle of least privilege in general to prevent users from accessing sensitive information that isn’t necessary for their work. According to Noreika, to prevent employees from sharing and downloading unauthorized files, data loss prevention tools are also required.

“Consistent monitoring is another key asset — if prior security measures failed to stop the user from retrieving and exfiltrating the data, it’s crucial to mitigate the threat before it can escalate further,” says Noreika. “Monitoring the dark web for posts mentioning the company, especially those claiming to sell services fueled by insider data, should be prioritized. Once the potential threat is spotted, security teams can inspect its validity and, if the claims turn out to be legitimate, stop the employee from doing further damage and inform affected users to be on high alert before cybercriminals can deploy their attacks.”

To effectively mitigate the damage inflicted by malicious insiders, Noreika advises companies to prepare an incident response plan in advance. The plan should outline the detection and investigation process, as well as the steps for containing the threat, eradicating the user’s access to company data and recovering systems if attackers compromise them in the process.

ABOUT NORDSTELLAR

NordStellar is a next-generation threat exposure management platform that enables companies to detect and respond to cyber threats before they escalate. It includes solutions like dark web and data breach monitoring, helping to prevent account takeovers, session hijacking, and other threats. NordStellar was created by Nord Security, a globally recognized company behind one of the world’s most popular digital privacy tools, NordVPN. For more information, visit nordstellar.com

New research breaks down where the OWASP LLM Top Ten Risks actually shows up in real architectures

Posted in Commentary with tags on December 9, 2025 by itnerd

As we’re seeing, security leaders are rapidly embedding LLMs into core product paths that read customer data, execute tools, write code, trigger workflows, and work inside real environments. But it’s becoming clear that the industry is still relying on outdated security measures to protect against a whole new set of risks. 

DryRun Security analyzed where each OWASP LLM Top Ten risk shows up in real applications, not just conceptually. The findings revealed a critical blind spot: traditional AppSec scanners fail to detect more than 80% of LLM-specific vulnerabilities. 

DryRun has released additional insights from this analysis, along with a strategic framework that maps the OWASP LLM Top Ten into real-world engineering guidance, showing: 

  • Where each risk shows up in modern LLM apps
  • Who owns each control (AppSec, platform, ML, SRE, FinOps)
  • What “good” looks like in design and SDLC
  • How AI-native, context-aware code analysis finds issues before runtime

You can find the details on this here.

Outpost24 Acquires Infinipoint

Posted in Commentary with tags on December 9, 2025 by itnerd

Outpost24 today announced the acquisition of Infinipoint, a specialist in device identity, posture validation, and secure workforce access. The acquisition marks Outpost24’s entry into the Zero Trust Workforce Access market and enhances its identity security division, Specops, by laying the foundation for a unified approach that evaluates both the user and the device before access is granted.

As organizations advance their Zero Trust strategies, authentication alone is no longer enough. MFA and SSO confirm who the user is, but they do not validate the security of the device being used. In hybrid environments where employees, contractors, and partners rely on a mix of corporate and unmanaged devices, this gap has become a significant source of risk. Ensuring that only secure, compliant devices can access critical systems is now essential to reducing credential misuse, preventing lateral movement, and maintaining regulatory assurance.

Organizations will benefit from the combined strengths of Specops’ unrivalled authentication and Infinipoint’s device identity and posture expertise, gaining a unified, context-aware approach to workforce access. This will allow organizations to evaluate both user and device trust at the moment of access, strengthening Zero Trust adoption while improving compliance and operational efficiencies by leveraging Infinipoint’s unique self-service and auto remediation capabilities – across any device and any identity provider.

The acquisition underscores the Outpost24’s commitment to advancing its exposure management and identity security capabilities and strengthens its role in delivering end-to-end visibility and control across identities, devices, and the external attack surface.

Black Kite Introduces Product Analysis Module

Posted in Commentary with tags on December 9, 2025 by itnerd

Black Kite today announced the release of its new Product Analysis module, which allows security teams to evaluate the risks of third-party software products at a granular level. As the first TPRM platform to offer this capability, Black Kite delivers a more detailed view of exposure and supports better decision-making around specific products and vendor outreach. The new module delivers intelligence on software supply chain risk through deep downloadable software analysis (CPE), SaaS subdomain analysis, and SBOM analysis.

With Black Kite’s Product Analysis, teams can go one step beyond vendor analysis by assessing individual products to gain deeper insight into supply chain risks associated with third-party software, improving both the speed and accuracy of product evaluations.

The new module combines multiple intelligence sources and analysis methods to deliver clear, product-level insight into vulnerabilities, exploitability, and risk posture:

  • Downloadable Software Analysis (CPE): Maps software products to their producing vendors and calculates risk levels (low, medium, high) based on CVEs, exploits, certifications, and end-of-life status.
  • SaaS Subdomain Analysis: Identifies SaaS subdomains, associates them with the correct company, and evaluates vulnerabilities and potential exploits for each.
  • SBOM Analysis & Mapping: Analyzes open-source components and dependencies within third-party software to uncover hidden vulnerabilities and nested dependencies.

The Product Analysis module gives TPRM teams and security leaders a clear, accurate understanding of product-level risk exposure. Key benefits include:

  • More confident decisions during software evaluation and onboarding.
  • Stronger ongoing monitoring through precise insights that drive mitigation actions such as upgrades or configuration changes.
  • Compliance support for federal and regulated industries that must perform SBOM analysis and broader risk assessments in alignment with EO 14028.

Product Analysis enables TPRM teams to seamlessly evaluate the risks associated with both the software they use and the software used by their third parties, helping them prioritize mitigation actions and vendor outreach to reduce potential exposure and impact from software vulnerabilities and other risks.

To learn more, visit https://blackkite.com/solution-briefs/product-analysis-with-black-kite

TrojAI Launches Free AI Red Team Report Card to Help Organizations Identify and Mitigate AI Risks

Posted in Commentary with tags on December 9, 2025 by itnerd

TrojAI today announced the launch of its new TrojAI Red Team Report Card, a free AI security assessment designed to help organizations understand and mitigate risks in frontier and custom AI models.

As enterprises accelerate adoption of AI-powered applications and agents, the pressure to identify and reduce behavioral vulnerabilities has never been greater. The TrojAI Red Team Report Card empowers security teams to evaluate their AI model’s exposure to real-world attacks before adversaries are able to exploit weaknesses.

The free assessment leverages TrojAI Detect, an automated single-turn and multi-turn AI red teaming engine, to uncover weaknesses such as prompt injection, data leakage, jailbreaks and more. Participants receive a comprehensive, personalized report card with success rates across major AI risk categories, including jailbreak resilience, adversarial robustness and informational harms like PII exposure, insecure code generation and misinformation. Each assessment includes a one-on-one review session with TrojAI’s security team to help organizations interpret results and prioritize mitigation strategies.

The TrojAI Red Team Report Card is available today at no cost.

Forcepoint on why agentic AI matters to security

Posted in Commentary with tags on December 8, 2025 by itnerd

Today Forcepoint published its latest post in its 2026 Future Insights series: “Agentic AI: Securing a New Generation of Digital Actors.”

The blog highlights that the shift to Agentic AI, autonomous systems that can plan, decide, and act across business environments, challenges the core assumptions of current cybersecurity practices. This will require a fundamental reset in how organizations approach digital risk, as traditional, human-centric security playbooks fall short of protecting these new digital actors.
A few quick takeaways that may be helpful for anything you are working on tied to this emerging topic:

  • Agentic AI systems are not deterministic. They act like digital people but lack human intuition, ethics, and context, making traditional, rule-based security insufficient.
  • The attack surface is changing. Security teams must secure not just human-to-data interactions, but also agent-to-data and agent-to-agent interactions.
  • Chained Agent Manipulation is a new threat. An attacker can manipulate one agent in a workflow to compromise the entire downstream sequence of decisions and actions—a new form of social engineering designed for digital actors.
  • New skills and roles are required. Organizations will need dedicated AI risk exposure professionals to map data flows and evaluate reasoning chains in these complex systems.
  • Behavioral monitoring is key. Protection needs to focus on behavioral monitoring, anomaly detection, and guardrails that intervene when agents drift into unsafe territory.

This perspective can support pieces on:

  • The future of AI-driven cyber-attacks (e.g., chained manipulation)
  • The limits of traditional security in autonomous AI environments
  • Emerging CISO challenges in 2026 and beyond
  • The evolution of data security practices (e.g., DSPM/DDR)The need for new professional roles (AI Risk Exposure Professionals)

The post is available at: https://www.forcepoint.com/blog/x-labs/agentic-ai-risk.

SIOS LifeKeeper v10: Expanding Control and Streamlining HA/DR Management for System Admins

Posted in Commentary with tags on December 8, 2025 by itnerd

SIOS Technology Corp today announced the availability of LifeKeeper v10, featuring the new LifeKeeper Web Management Console (LKWMC) management console. LKWMC provides a unified, intuitive user interface across both Linux and Windows environments, giving system administrators unprecedented visibility and control while dramatically simplifying the management of complex, mission-critical high availability and disaster recovery configurations.

New in SIOS LifeKeeper v10:

  • LifeKeeper/Windows Management Console (LKWMC): Delivers simplified HA management with a consistent interface across Windows and Linux operating systems, enabling cost-saving ease-of-use for MSPs and organizations managing applications across multiple operating systems. New design includes built-in tips and tools for further streamlined integration.
  • Enhanced Disaster Recovery in Red Hat Environments: The DRBD Application Recovery Kit (ARK) for LifeKeeper now offers seamless integration with RHEL 9.6 and RHEL 10, extending 3- and 4-node disaster recovery capabilities to a wider user base.
  • DataKeeper Replication Support for RHEL 10: DataKeeper Linux delivers straightforward, cost-effective data replication and high availability on RHEL 10, along with other supported operating systems.
  • Native PowerShell support. PowerShell is now supported as a scripting language for building Generic Application Recovery Kits, offering greater flexibility and ease of automation.
  • Improved Installer Interface: A redesigned installer provides a streamlined experience, allowing users to select all required components from a single, intuitive screen.

Pricing and Availability

SIOS LifeKeeper v10 is currently generally available. SIOS software is priced by the server node and offers perpetual, subscription and consumption (cloud marketplace) options.

Recast earns 12 badges in G2’s Winter 2026 Reports 

Posted in Commentary with tags on December 8, 2025 by itnerd

Recast, a leader in modern application and endpoint management, today announced it has been awarded 12 badges in G2’s Winter 2026 Reports. The recognition from G2, the world’s largest and most trusted software marketplace, underscores the exceptional value that Recast delivers to its global customer base through its popular Right Click Tools product.

These accolades reflect Recast’s outstanding performance in customer satisfaction and product usability, driven by solutions that deliver strong ROI, streamline daily operations, and enhance security. Recast’s G2 badges span categories including enterprise configuration management, patch management, endpoint management, and more. Consistently positive reviews in these key areas emphasize Recast’s unwavering commitment to providing reliable, high-value solutions that empower IT teams to simplify systems management and reduce security vulnerabilities.

Recast’s Winter 2026 Badges include:

  • Best Meets Requirements Enterprise
  • Easiest Setup – Enterprise
  • Easiest to Do Business With
  • Easiest to Use – Enterprise
  • High Performer
  • High Performer – Enterprise
  • Leader
  • Leader – Enterprise
  • Momentum Leader
  • Most Implementable – Enterprise
  • Users Most Likely to Recommend
  • Users Most Likely to Recommend – Enterprise