UnifyApps raises $50M to become the Enterprise Operating System for AI to help CIOs succeed with GenAI

Posted in Commentary with tags on October 22, 2025 by itnerd

Enterprises have spent decades becoming digital. Now, they must become AI-native. UnifyApps, the company building the Enterprise Operating System for AI, today announced a $50 million Series B led by WestBridge Capital with participation from ICONIQ and others. The new capital brings UnifyApps’ total funding to $81 million and marks a new phase of scale with Ragy Thomas, joining as Chairman and Co-CEO, alongside existing co-founder and CEO Pavitar Singh.

Enterprises have poured millions into GenAI pilots, yet most can’t scale them. Today’s LLMs can’t connect to the siloed systems of record and knowledge to find the right data or to systems of activity to make work happen. Vertical and use-case-specific AI applications remain isolated, each requiring its own integrations across the enterprise—creating costly AI sprawl and stalled outcomes. This challenge results in a 95% failure rate for enterprise AI solutions. UnifyApps closes this gap with an LLM-agnostic, AI-native architecture that unifies systems of knowledge, record, and activity through a low-code/no-code workflow and UI builder—turning fragmented experiments into scalable, production-grade AI.

UnifyApps connects systems of record, knowledge, and activity across the enterprise. It unifies data from platforms like Salesforce, Workday, and corporate intranets, applies the right AI models and ontologies, and acts within the tools employees already use. This closed-loop approach links data, intelligence, and execution—turning fragmented GenAI pilots into scalable business outcomes.

Designed with its Six-Layer Enterprise AI Architecture, UnifyApps brings together system integration, data and ontology management, workflow automation, application experience, and autonomous agent deployment. Companies including HDFC Bank, Deutsche Telekom, Contentstack, Belcorp, Sirion Labs, WalkMe, Air Arabia, Liva Insurance, as well as the Abu Dhabi Government and Dubai Government are using UnifyApps to unify data and accelerate AI adoption. The platform gives CIOs a secure, efficient, and scalable way to embed AI across business processes and lead their organizations into the AI-native era.

New Co-CEO Ragy Thomas brings more than 25 years of enterprise software leadership across industries with deep expertise in CIO relationships, compliance, security, and SaaS operations.

With this new funding, the company will expand the team and European presence, accelerate platform development, and deepen integrations across enterprise technologies while building a catalog of pre-built applications. UnifyApps’ vision extends beyond technology—it’s about enabling enterprises to become living, learning systems. Just as the digital era reshaped every process, the AI-native era will redefine how organizations think, act, and evolve.

UnifyApps’ momentum underscores that shift. The company has grown revenue more than 600% year over year and serves global enterprises across retail, banking, travel, telecom, healthcare, public sector, and technology industries. Customers are using its platform to automate HR operations, streamline claims processing, optimize supply chains, and reimagine customer engagement—achieving measurable efficiency gains within months of deployment. 

Being AI-native isn’t a feature, it’s fundamental to surviving in the AI-era. UnifyApps believes enterprises that evolve with AI will not just automate tasks but also reinvent how they create value, govern systems, and engage the world around them. 

Small Business AI Adoption Is Rising, But ROI and Skills Gaps Threaten Progress: Sage

Posted in Commentary with tags on October 22, 2025 by itnerd

Sage today released new research revealing that small businesses could hold the key to closing Canada’s long-standing productivity gap—if supported by SME-first AI and digital policies.

The report, Canada’s Digital & AI Imperative: Closing the Productivity Gap and Driving SME Growth, shows that while digital adoption is now essential to business survival and growth, uneven access to technology and skills risks creating a two-speed economy that leaves smaller firms behind.

Research Overview

Conducted in collaboration with Strand Partners, the research surveyed over 2,000 SME leaders across Canada. It found that:

  • Skills shortages are a growing concern: 41% of medium-sized firms cite a lack of internal expertise as a barrier to scaling digital adoption.
  • Cost remains the top hurdle for small firms: 58% say affordability is the biggest barrier to digital transformation.
  • Digitalization is mission-critical: 80% of SMEs say it’s essential for growth, and 82% say it’s vital for survival.
  • AI adoption is accelerating: 51% of SMEs already use AI, with another 18% planning to adopt it within three years.
  • Medium-sized firms are leading the charge: They’re investing nearly twice as much in AI as small firms and reporting significantly higher productivity gains.
  • Digital investment pays off: SMEs adopting digital tools see an average 29% productivity boost in the first year, with every dollar invested returning up to $2.40 among digital leaders.

However, regional and sectoral divides persist:

  •  AI adoption rates range from 56% in Québec to just 28% in Northern Canada.
  • Sectors like finance and tech lead the way, while agriculture and construction lag.
  • Cost, skills shortages, and unclear ROI remain major barriers.

SME-First AI Policy Recommendations

Sage is urging policymakers to place SME adoption at the heart of Canada’s AI strategy, backed by targeted skills investment and sustained support frameworks. To secure long-term prosperity and global competitiveness, Canada must close its productivity gap through inclusive AI adoption. This means empowering SMEs across all sectors and regions to lead confidently in the digital economy, while ensuring alignment with evolving global standards.

To address the most pressing barriers, Sage recommends the following policy actions:

  • Embed SME adoption at the core of national AI strategy
  • Equip SMEs with practical AI skills and confidence
  • Unlock AI investment through targeted tax breaks and grants
  • Deliver trusted, context-specific guidance for SMEs
  • Foster a whole-of-ecosystem approach, uniting federal and provincial governments, industry, academia, and community partners
  • Accelerate e-invoicing and structured data adoption

Closing Canada’s productivity gap demands inclusive action. Sage urges policymakers to adopt SME-first AI policies grounded in the lived experience of small business leaders. By investing in access, skills, and infrastructure—and aligning globally—Canada can unlock the full potential of its entrepreneurial economy. These priorities reflect the realities of Canadian entrepreneurs and chart a path to inclusive, innovation-led growth. As we mark Small Business Month, Sage calls on all stakeholders to champion a digital economy where small businesses lead.

You can download the report here.

Threat Actors Target Global Retailers with Cloud-Based Gift Card Campaign 

Posted in Commentary with tags on October 22, 2025 by itnerd

Palo Alto Networks Unit 42 has posted new research called “Jingle Thief“—a campaign in which Morocco-based threat actors are exploiting Microsoft 365 environments to conduct large-scale gift card fraud against global retail enterprises. With the holiday shopping season approaching, these operations are expected to intensify in scale and frequency.

The research details a multi-stage campaign where attackers use phishing and smishing to infiltrate retail organizations, identify and compromise those with gift card administration privileges, and ultimately issue themselves massive quantities of gift cards. These actors employ sophisticated evasion techniques—including configuring inbox rules for silent exfiltration and deletion of sent messages—that have not been publicly detailed until now.

Key insights from the research include:

  • A shift from endpoint-based intrusions to cloud-native, identity-driven attacks that leverage Microsoft 365 services.
  • How these attackers exploit trusted environments such as SharePoint, OneDrive, and Entra ID to execute large-scale gift card fraud, and evade detection for months.
  • Broader context on how financially motivated groups are adopting APT-level tactics, mirroring the persistence and stealth of nation-state actors.

You can read the research here.

Now Available: The Proactive Defenders Guide to Infostealers From Flashpoint

Posted in Commentary with tags on October 22, 2025 by itnerd

We’ve all heard about a new wave of breaches that was sparked by a single stolen employee credential which marked the dawn of a new era in cyber risk: the rise of information-stealing malware (“infostealers”). This year alone, Flashpoint has identified over 1.8 billion stolen credentials circulating across illicit marketplaces, fueling identity-based attacks at an incredible and still growing scale.

To help organizations fight back, Flashpoint is releasing The Proactive Defender’s Guide to Infostealers—a practical resource for IT, Threat Intelligence, and Fraud teams. The 22-page guide provides:

  • A breakdown of the most prolific infostealers and their role in modern attack chains – Learn which strains are the most popular, how they incorporate tactics such as vulnerability exploits and ransomware, and how you can better defend against them. 
  • Strategies for managing the identity attack surface – Understand how threat actors weaponize stolen identities, and how your team can monitor, prioritize, and respond before damage is done. 
  • Guidance on operationalizing infostealer intelligence for proactive defense – Leverage Flashpoint’s comprehensive infostealer intelligence to reverse-engineer data dumps, understand infection trends, and address potential security gaps before threat actors exploit them.

 The report can be here, and a blog post about the report is here.

TP-Link Achieves Breakthrough With First WiFi 8 Connection

Posted in Commentary with tags on October 21, 2025 by itnerd

Geez. I haven’t even rolled out WiFi 7 yet.

 TP-Link today announced it has successfully demonstrated Wi-Fi 8 connectivity, transmitting data with a prototype device developed through a joint industry partnership. This achievement represents a major step toward defining the next generation of wireless technology.

The test successfully validated both the Wi-Fi 8 beacon and data throughput, confirming the viability of the technology and marking a critical milestone in Wi-Fi 8 development. This technology is poised to deliver the ultra-reliable wireless performance that the industry will require as more devices and bandwidth-intensive applications come online.

Through ongoing collaboration with ecosystem partners, TP-Link is dedicated to advancing the technologies that will shape the next era of connectivity, offering users unprecedented speed, stability and reliability.

TP-Link has this page on WiFi 8: https://www.tp-link.com/ca/wifi8/.

Rogers Gets Hit With Class Action Lawsuit Over 2021 Outage

Posted in Commentary with tags on October 21, 2025 by itnerd

Back in April 2021, Rogers had a massive outage. Not as big as the outage that they had a year later. But it was really big. Cell phones stopped working and Interac was down.

Fast forward to today and a class action lawsuit has been approved in a Quebec court that is related to this outage:

The Plaintiffs were ascribed the status of representative to act on behalf of all Class Members in Canada.  They allege in their action that the Class Members suffered damages as of result of the service interruption to the Rogers, Fido and Chatr networks which began on April 19, 2021.

Now Rogers threw Ericsson under the bus for this outage. But clearly this court didn’t buy that and here we are talking about it. Thus it will be interesting to see how Rogers responds to it. Will they defend themselves? Will they simply settle out of court to make this go away? This should be fun to see what route they go with this.

GlassWorm self-propagating malware hits the streets

Posted in Commentary with tags on October 21, 2025 by itnerd

GlassWorm, a highly sophisticated self-propagating malware campaign targeting Visual Studio Code developers via the OpenVSX marketplace, has been discovered by Koi Security. The worm steals credentials from NPM, GitHub, and Git, drains cryptocurrency extensions, deploys hidden VNC and SOCKS proxies, and spreads through compromised extensions using stolen credentials. Notably, GlassWorm hides its payload with invisible Unicode variation selectors, rendering it invisible to human reviewers and many static analysis tools. Its command-and-control leverages the Solana blockchain for persistence and anonymity, with Google Calendar as backup infrastructure. Over 35,800 installations have been affected, with at least 10 extensions still active as of this weekend.

Dale Hoak, CISO, RegScale had this comment:

     “The GlassWorm campaign underscores the growing compliance and regulatory risks inherent in today’s open-source and developer ecosystems. Software supply chain attacks no longer target only the end product—they exploit the very tools and dependencies developers trust most. Organizations must move beyond periodic control reviews and adopt continuous monitoring and automation across their build pipelines to detect drift, compromise, or unauthorized changes in real time. Compliance controls governing software supply chain integrity should be codified and enforced as part of the CI/CD process, ensuring that when vulnerabilities like this surface, evidence of continuous validation, provenance tracking, and rapid remediation is already embedded in the operational fabric. This event is another reminder that compliance cannot be static documentation—it must be a living control system that evolves with every dependency update and build cycle.”

Will Baxter, Field CISO, Team Cymru follows with this:

      “The GlassWorm campaign marks a fundamental shift in the developer-ecosystem threat model: a self-propagating worm hidden inside VS Code extensions that leverages invisible Unicode, blockchain-based C2 (Solana) and legitimate infrastructure (Google Calendar) to resist coordinated takedown. By harvesting NPM, GitHub and OpenVSX tokens, hijacking crypto-wallet extensions and converting developer machines into SOCKS proxies and hidden VNC nodes, the attackers move far beyond standard supply-chain compromises. This isn’t just a supply-chain problem—it’s a new infrastructure layer merging cyber-crime tooling, blockchain resilience and developer-tooling pivoting. Intelligence sharing between registry operators, threat researchers and blockchain-monitoring partners must work together if we’re to see these hybrid attacks flagged and disrupted before developer systems become massive proxy networks.”

Gunter Ollmann, CTO, Cobalt adds this:

     “This campaign underscores how adversaries are evolving their tradecraft to weaponize the software supply chain at its roots. Developers have become high-value targets because compromising their toolchains can cascade across entire ecosystems. The use of blockchain and invisible Unicode payloads shows how detection and takedown are becoming increasingly difficult and require coordination across a growing number of stakeholders. Botnets and bot agents like GlassWorm are precisely the kind of technologies leveraged by state actors in preparation for cyberwarfare, where persistence and resilience to disruption are core tactical advantages. Frequent testing of defenses, SOC playbooks, and offensive security readiness is essential to expose weaknesses before attackers do.”

Even in a moment in time where there’s a new campaign every week from the forces of evil, this one is pretty bad. I am hoping that the result of this campaign is not as devastating and I think it will be. Though I will not be shocked if it is.

CISA Adds Vulnerabilities To The KEV Catalog

Posted in Commentary with tags on October 21, 2025 by itnerd

The CISA has added three newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog: one in Windows SMB Client and two in Kentico Xperience CMS. The Windows flaw (CVE-2025-33073, CVSS 8.8) allows privilege escalation via improper access control and has been exploitable since June, when proof-of-concept code was released. The Kentico vulnerabilities (CVE-2025-2746 and CVE-2025-2747, CVSS 9.6) are authentication bypass issues that could enable full administrative takeover when chained with remote code execution. CISA also confirmed exploitation of a 2022 Apple arbitrary code execution bug (CVE-2022-48503). Federal agencies now have three weeks to patch affected systems under Binding Operational Directive 22-01.

Will Baxter, Field CISO, Team Cymru had this to say:

     “The inclusion of both recent and legacy vulnerabilities in CISA’s KEV catalog underscores how threat actors mix newly developed exploits with long-lived flaws to sustain access and expand operational reach. Even when patches are available, adversaries rely on delayed remediation and incomplete asset visibility — the very gaps KEV aims to close. Active monitoring of external infrastructure and intelligence sharing across organizations remain essential to identify when known vulnerabilities are being re-weaponized in the wild.”

Andrew Obadiaru, CISO, Cobalt follows with this:

     “This is a reminder that patching and vulnerability scanning aren’t the same as true resilience. The lag between disclosure and exploitation is shrinking, and adversaries are quick to capitalize on unpatched systems even within well-defended networks. Continuous offensive testing—validating exploitability in real-world conditions—remains one of the most effective ways to ensure critical exposures are prioritized and remediated before attackers strike.

This is why I recommend that people patch all the things when patches appear or soon after they appear. The bad guys will not waste any time in terms of reverse engineering the flaws that these patches fix and using those to launch attacks.

Retail giant Muji halts online sales after ransomware attack on supplier

Posted in Commentary with tags on October 21, 2025 by itnerd

Japanese retail giant Muji has taken offline its store due to a logistics outage caused by a ransomware attack at its delivery partner, Askul. 

Rebecca Moody, Head of Data Research at Comparitech

“This is another prime example of how far-reaching the consequences of a ransomware attack can be and highlights why sectors like retail and manufacturing remain a key focus for hackers. 

So far this year, we’ve recorded nearly 400 claims from ransomware groups on retailers across the world with 40 of these having been confirmed by the entity involved. While we don’t yet know which gang is responsible for the attack on Askul, you can bet your bottom dollar we’ll find out soon if ransom negotiations fail. It’s also likely that the hackers will have stolen data in the process of their attack, and with the size of Askul and the number of companies it deals with, this could be significant.”

Martin Jartelius, AI Product Director at Outpost24:

“This is a different form of supply chain attack – the company is affected because a core service provider was compromised, rather than its own IT systems. It’s encouraging to see that Muji is taking preventive actions and already has contingency and communication plans in motion. This is the best way to fight ransomware: be prepared, recover quickly, work around disruptions, and avoid paying the groups behind them.

For the organization that suffered the direct breach, it’s still too soon to draw broader conclusions. Neither the perpetrator nor the ransomware strain has been confirmed, and while there have been other major regional incidents recently, any link at this stage would be purely speculative.”

Javvad Malik, Lead CISO Advisor at KnowBe4

“The reality of interconnected ecosystems is that you can have spotless internal controls and still be taken offline by a partner’s ransomware. Customers don’t care whose network was hit, they only see that the service or product they need is unavailable and that impacts trust. It’s why it’s important to map critical dependencies beyond IT to logistics and fulfilment, set minimum security baselines in contracts, and practice “supplier outage” playbooks. Monitor for brand impersonation during downtime, and pre‑agree data‑sharing for rapid joint incident response. Ultimately, resilience must extend past your perimeter to the partners that support your operations.”

You’re only as secure as the people that you work with. Thus my recommendation is that you work with your partners to assure your mutual security. After all, these days your mutual security is a requirement and not an option.

Agentiiv and the CMA debut $5M AI accelerator to power Canada’s innovation ecosystem

Posted in Commentary with tags on October 21, 2025 by itnerd

As small- to medium-sized businesses (SMBs) and nonprofits face growing costs and pressures to modernize, Agentiiv, in partnership with the Canadian Marketing Association (CMA), Ownr, Staples and the CCNDR, has launched a $5-million accelerator program to help organizations adopt and use artificial intelligence (AI) more effectively. 

Helping organizations build capacity through AI 

The You.Scaled. Accelerator program will provide 350 grants for SMBs and 150 for nonprofits across Canada. The program is designed for organizations that often lack the resources to adopt new technologies, offering in-kind grants through Agentiiv platform subscriptions, training from the CMA and integration support from partners. By reducing costs and providing practical training and services, the program will help businesses and nonprofits improve operations, strengthen customer and supporter experiences and grow with confidence.  

Closing the gap in AI adoption 

Despite growing awareness of the potential of generative AI, adoption among Canadian organizations remains low. There are 1.2 million SMBs nationwide yet, according to Statistics Canada, only 12.2 per cent of Canadian businesses currently use AI technology. Meanwhile, 73 per cent of SMBs have yet to consider implementing AI, according to the Canadian Chamber of Commerce

To help bridge this gap, You.Scaled. will provide step-by-step support to guide organizations through AI adoption in a structured, practical way. Each recipient will receive tailored onboarding, mentorship and access to learning sessions that help translate training into measurable outcomes such as improving efficiency, enhancing customer or supporter experiences and identifying new opportunities for growth. 

Eligibility and selection 

The You.Scaled. Accelerator Program is open to registered Canadian SMBs with up to 40 employees and registered Canadian nonprofits. Applicants will be evaluated on three criteria: AI readiness to adopt, the quality of their implementation plan and their potential for positive economic and social impact. 

Grants will be distributed across Canada, ensuring representation from urban, rural and remote communities. The program also includes a commitment to equitable access for organizations led by women, Indigenous Peoples, visible minorities and members of the 2SLGBTQIA+ community. 

Chosen recipients will gain access to membership benefits, services and discounts through key partners. They will also receive free access to the CMA’s generative AI On-Demand training course and a reduced one-year CMA membership to help integrate AI more effectively into their operations.   

Apply now 

Applications for the You.Scaled. Accelerator Program are open until November 15.  

Learn more here: www.youscaled.com/ (EN) and www.vousamplifié.com (FR).