Italian #AI company #Webidoo raised €21 million to scale its #SMB focused #automation platform. This funding aligns with a trend of AI-enabled software funding in #Italy, particularly in marketing, sales, and operations. https://www.eu-startups.com/2026/05/italian-ai-company-webidoo-secures-e21-million-to-scale-smb-focused-automation-platform/?Pirates.BZ #Pirates #Tech #Startup #News
Italian AI company Webidoo secures €21 million to scale SMB-focused automation platform | EU-Startups

Milan-based Webidoo, the AI technology company focused on making advanced digital tools more accessible and viable for SMBs, today announced the closing

EU-Startups

Ransomware Risks: Why SMBs Need AI Security Now

Last week I was staring at my EnduraCoach dashboard, watching it yell at me for sneaking in an extra sprint session that my body wasn’t ready for. The AI caught the overtraining pattern across heart-rate, sleep, and power data and shut it down before I wrecked my Ironman build. That same evening the April ransomware numbers landed. SMBs got hammered again. And I thought: if only every founder had an always-on coach like this for their security stack.

Here’s the uncomfortable truth from April 2026: ransomware didn’t slow down—it accelerated. A new player called JanaWare quietly encrypted files for hundreds of Turkish home users and small businesses through targeted phishing campaigns. Low-dollar demands ($200–$400) but high volume. Attackers are learning that SMBs are softer targets and faster payers.

The broader picture is uglier.
Verizon’s 2025 DBIR (still the gold standard) showed 88% of ransomware breaches hit SMBs versus just 39% for enterprises. Unpatched vulnerabilities caused 29% of incidents; stolen credentials another 30%.
Sophos and Black Kite reports confirm SMBs in the $4M–$8M revenue band are now the sweet spot for attackers.

Most of us simply don’t have a 24/7 SOC or the headcount to patch, triage, and remediate at machine speed.

Why your current stack is losing the race

You already know the drill—I wrote about it two weeks ago. You’ve got EDR, a SIEM that spits 800 alerts a day, cloud config tools, backup solutions, and a compliance spreadsheet that lives in Google Docs. Your one-person IT “team” (probably you or your CTO wearing three hats) can’t keep up. Alerts become noise. Drift happens. A single phishing email or unpatched server becomes a full-blown encryption party.

Meanwhile, attackers have upgraded. Remember my Claude Mythos experiment in April? One air-gapped model autonomously built an exploit chain and phoned home. Offensive AI agents are now table stakes for ransomware groups. Defensive point tools can’t match that speed.

The fix we’re actually shipping at Espresso Labs

This is exactly why we built Espresso Labs: one unified AI-powered platform that replaces the dozen disconnected tools and the missing SOC. At the center is Barista—our continuous AI agent that doesn’t just alert. It acts.

Barista watches endpoints, cloud configs, identities, and backups 24/7. It triages, quarantines, remediates, and collects audit-ready evidence in real time. Human experts back it up when needed. For CMMC, SOC 2, or HIPAA it enforces controls continuously instead of chasing checkboxes. Founders tell us it cuts compliance cost and timeline by up to 80% while actually stopping breaches.

Think of it as EnduraCoach for your entire tech stack: always connected, always enforcing the plan, and stepping in before you even notice the problem.

Two real-world SMBs that would still be running if they had Barista

Example 1: A Dental Clinic (12 employees, California)
Late April 2026 the practice got hit via the fresh cPanel vulnerability (CVE-2026-41940). One unpatched server, no continuous scanning, and “Sorry” ransomware encrypted patient records and scheduling systems in under 40 minutes.
Downtime cost them $18k in lost appointments plus a $45k ransom negotiation.
They paid.
Data was partially recovered.

With Espresso Labs this never happens.
Barista’s agents would have auto-detected the cPanel drift during its nightly vuln sweep, patched it automatically, and isolated the server the moment anomalous encryption behavior started.
Immutable backups would have let them restore in minutes with zero ransom paid. The clinic keeps seeing patients instead of calling their MSP in panic.

Example 2: A Marketing Agency (8 employees, remote-first)
A senior designer clicked a sophisticated phishing link dressed as a client creative brief.
Stolen credentials gave attackers initial access. Within hours they deployed ransomware across the shared drive and exfiltrated client campaigns. The agency lost three days of billable work and faced a $32k demand.
Classic stolen-credential playbook—exactly the 30% bucket from the Verizon report.

Barista would have caught and blocked the malware download, and rolled back from the last clean backup automatically. The designer gets a gentle “hey, that link looked sketchy—let’s run a quick training module.” No encryption, no exfil, no headlines.

These aren’t hypotheticals.
These patterns played out in April for dozens of SMBs just like yours.

Your 5-step practitioner playbook (do this this week)

  • Stop buying another tool. Audit what you actually have running and where data lives. Most SMBs discover they’re paying for 70% overlap.
  • Demand continuous enforcement. Point-in-time scans are dead. You need agents that watch 24/7 and fix drift instantly.
  • Test autonomous remediation on one workload. Spin up a low-risk environment (dev server, staging) and let an agent like Barista practice quarantining and restoring.
  • Layer in phishing simulation + training that actually sticks. Barista does this natively and measures real behavior change.
  • Get your compliance evidence automated. If you’re chasing CMMC Level 2 or SOC 2 Type 2 this year, manual evidence collection is the fastest way to fail an audit.
  • Your startup isn’t a marathon—it’s brutal sprints.
    Security in 2026 is the same.
    One missed sprint and the whole race ends. Continuous AI agents turn defense into a sprint you can actually win.

    The tech exists today. We’re running it for our own early customers and it feels exactly like the relief EnduraCoach gives me mid-training: someone (or something) smarter has your back.

    If your April numbers looked anything like the industry’s, drop a comment: what’s your biggest security headache right now?
    Or head to espressolabs.com and book a 15-minute Barista demo.
    No slide deck, no hard sell—just a live look at what continuous actually feels like.

    Stay safe out there.
    Train hard, ship secure, and let the AI do the heavy lifting.

    Rate this:

    #cybersecurity #SMB #startups
    Super Mario Brothers Pepsi Bottle Cap Collection: Super Luigi Warp Pipe/Dokan #20 (Japanese Import) *Open/Complete* – The Plastique Boutique

    The Plastique Boutique

    Anthropic launched Claude for Small Business on May 13, targeting 36M U.S. small firms. The 10-city tour reaches 1,000 owners. Real integration points: QuickBooks, PayPal, HubSpot, Docusign. The connectors reveal where adoption likely depends—existing software ecosystems, not just Claude itself.

    #AI #SMB #BusinessAutomation https://www.implicator.ai/anthropic-pitches-1-000-main-street-owners-the-real-customer-is-quickbooks-2/

    Anthropic SMB Launch Aims at QuickBooks Workflow Layer

    Anthropic launched Claude for Small Business on Wednesday with connectors to QuickBooks, PayPal, HubSpot, Canva and Docusign. The brochure cites 36 million U.S. small businesses; a 10-city tour seats 1,000. The integration list points to where the commercial work actually lands.

    Implicator.ai
    ICYMI: The ad market is two markets, and most forecasts only see one: Ian Whittaker argues the ad market splits into a visible, agency-led layer and a hidden, fast-growing SMB layer that most industry forecasts consistently miss. https://ppc.land/the-ad-market-is-two-markets-and-most-forecasts-only-see-one/ #Advertising #Marketing #DigitalMarketing #SMB #MarketTrends
    The ad market is two markets, and most forecasts only see one

    Ian Whittaker argues the ad market splits into a visible, agency-led layer and a hidden, fast-growing SMB layer that most industry forecasts consistently miss.

    PPC Land

    Sensor Tower Consolidates Market Intelligence with AppMagic Acquisition

    Sensor Tower buys AppMagic. This helps small app companies get market data. It means more tools for indie developers.

    #AppIntelligence, #SensorTower, #AppMagic, #MobileApps, #SMB

    https://newsletter.tf/sensor-tower-buys-appmagic-for-smb-app-data/

    Sensor Tower has bought AppMagic. This is to offer better market data to small app businesses.

    #AppIntelligence, #SensorTower, #AppMagic, #MobileApps, #SMB
    https://newsletter.tf/sensor-tower-buys-appmagic-for-smb-app-data/

    Sensor Tower buys AppMagic to help small app businesses

    Sensor Tower buys AppMagic. This helps small app companies get market data. It means more tools for indie developers.

    NewsletterTF

    🔐 Too many security tools. Too many alerts. Not enough time.

    XDR security helps MSPs and SMBs simplify threat detection, reduce alert fatigue, and strengthen protection — without enterprise complexity. 🚀

    Read More: https://zurl.co/fdg4i

    #XDR #CyberSecurity #MSP #SMB #ThreatDetection #SOC #ManagedSecurity #XDRShield

    Is there any Linux distribution/flavour where access by file manager works with SMB/CIFS connection and can authenticate?

    GNOME on Ubuntu 24 fails.
    Dolphin KDE/KIO on Debian 12/13/Testing fails.

    And now?

    #Linux #SMB #CIFS #Windows #fp #FollowerPower

    GhostLock – Lockout Without Encryption

    GhostLock은 윈도우의 CreateFileW API를 이용해 dwShareMode를 0으로 설정함으로써 파일을 독점 잠금 상태로 만들어 SMB 파일 공유 인프라의 가용성을 완전히 차단하는 공격 기법입니다. 이 공격은 쓰기, 암호화, 디스크 변경 없이 이루어져 기존 랜섬웨어 탐지 체계를 무력화하며, 표준 도메인 사용자 권한만으로 실행 가능합니다. 피해 복구는 공격자의 SMB 세션을 찾아 종료해야 하며, 이는 스토리지 관리자만 수행할 수 있는 복잡한 작업입니다. 이 공격은 설계상 정상 동작을 악용한 것으로, 패치나 CVE가 존재하지 않아 기업 환경 전반에 심각한 위협이 됩니다. GhostLock은 오픈소스 연구용 도구로 공개되어 방어 태세 점검에 활용할 수 있습니다.

    https://ghostlock.io/

    #windows #smb #security #ransomware #filelocking

    GhostLock — Lockout Without Encryption

    A standard domain user can lock every file in your organization. No writes. No encryption. No alerts.