Nvidia and Baidu Seal AI Partnership, Netflix Looks to Further Improve Their CDN and More in This Week’s News

Shalom Carmel Chief Information Officer at GlobalDots
4 Min read

Nvidia and Baidu Join Forces to Take AI to Devices and Cloud

The Chinese powerhouse Baidu and Nvidia, the chipmaker company, have revealed a newly formed strategic partnership. The goal of the partnership is to accelerate the development of AI solutions for vehicles, cloud data centers and IoT devices.

Nvidia’s DRIVE PX platform will be implemented by Baidu in their Apollo project, brought forward in cooperation with Chinese car makers to make driverless cars a reality. Nvidia’s DRIVE platform merges Tesla GPUs, Nvidia’s CUDA and TensorRT software.

Book a demo today to see GlobalDots is action.

Optimize cloud costs, control spend, and automate for deeper insights and efficiency.

Book a demo today to see GlobalDots is action.

On the other hand, Baidu will grant Nvidia access to its DuerOS voice recognition platform most likely to be implemented in its Shield TV offering, enabling users to control the system via voice commands.

As for cloud technologies, the partnership implies Baidu’s deployment of Nvidia’s HGX architecture alongside Tesla Volta V100 and Tesla P4 GPU accelerators, which will enable AI training in its data centers. The tech stack is meant to work along PaddlePaddle, Baidu’s deep learning framework and Nvidia’s TensorRT.

A futuristic robotic head with metallic features alongside the NVIDIA logo.

Read More: Cloud Pro

Netflix is Boosting Data Science and Algorithm Team

As it hit the 100 million users earlier this year, Netflix is looking to take their distribution systems to the next level.

Netflix uses its own CDN, called Open Connect, to minimize costs and boost the overall quality of service for users. In doing so, it always looks for ways to optimize content allocation and ensure optimal load balancing among clusters of servers. To help improve its quality of service (QoE), Netflix began developing their own data science team back in 2014.

Currently, their data science efforts are oriented at improving content delivery by leveraging data on when, where, and how content is consumed in order to assist with caching, load balancing, and encoding. Netflix is tweaking their algorithms to make sure the methods are tailored to specific clusters for load balancing.

With the increased input of customer data and further investments in data science, Netflix will be able to predict and plan for server requirements changes well ahead of schedule.

A hand pressing the Netflix button on a remote control with a red background.

Read More: Bizety

New Android Malware Infects Over 14 Million Devices

Recently, a new strain of Android malware has been discovered. It already infected over 14 Million Android devices, and earned its creators some $1.5 million in fake ad revenues.

The rooting malware, dubbed CopyCat, has the ability to infect devices and insert malicious code into Zygote – a daemon responsible for launching apps on Android.

Check Point security researchers that discovered the malware claim that CopyCat has infected 14 mil systems, rooted almost 8 million, had 3.8 million served ads and 4.4 million of devices were used to hijack credit for app installation.

The majority of CopyCat victims are located in South and Southeast Asia with India being the most affected country. Also over 280,000 Android devices in the United States were infected demonstrating that a large portion of Android users still relies on old unpatched versions.

A green Android figurine in front of a digital display featuring binary code.

Read More: Hacker News, CheckPoint Blog

Self-Service Kiosk Systems by Avanti Have Been Hacked

Last week, Avanti has suffered a breach of its internal networks. Apparently, hackers managed to push malicious software to payment device. Avanti warned of the serious breach saying it may have jeopardized credit card accounts as well as biometric data.

“On July 4, 2017, we discovered a sophisticated malware attack which affected kiosks at some Avanti Markets. Based on our investigation thus far, (…) it appears the attackers utilized the malware to gain unauthorized access to customer personal information. Because not all of our kiosks are configured or used the same way, personal information on some kiosks may have been adversely affected, while other kiosks may not have been affected.

From Avanti’s “notice of data breach”

The company guesses that the malware was designed to collect payment card information (cardholder’s first and last name, credit/debit card number and expiration date).

Although POS breaches became almost common occurrences, this breach is especially notable as it may also have gathered customer biometric data (Avanti kiosk systems allow users to pay using a scan of their fingerprint).

A person interacting with a digital vending machine while holding a plate

Read More: Avanti, KrebsOnSecurity

Petya Ransomware Author Releases Decryption Key

As variations of the Petya ransomware wrecked havoc across the world last month, the author of the original strain has now released a master key for decryption of devices infected by Petya.

As the author that goes by the pseudonym Janus released the key, many security researchers have already confirmed its authenticity. Although the most destructive strain of the malware, NotPetya, is still immune to the key, it is a big step towards a complete final solution for it as well.

Janus has initially released Petya as a “Ransom-as-a-Service” from which he could get a cat, but claims that the NotPetya strain was created by another hacker that tweaked the original strain. Security researchers believe that NotPetya was only disguised as ransomware while its real goal was indeed to cause disruption.

A hard drive locked with chains and a padlock

Read More: Hacker News

Latest Articles

Vulnerability Assessments vs. Penetration Testing: Key Differences, Use Cases & Best Practices

They’re not interchangeable. A vulnerability assessment identifies known flaws at scale. A penetration test mimics an actual attacker probing for impact. Yet many teams treat them the same. They substitute one for the other, check a compliance box, and move on as if they’re covered. They’re not. And that gap shows up later in real-world […]

Ganesh The Awesome
7th July, 2025
Web Application Firewalls (WAFs): The Evolving First Line of Defense in Cloud Security

Modern applications are built for speed, not simplicity. Containers, microservices, and cloud-native deployments have blown up the security perimeter. Traditional tools can’t keep up with this complexity. That’s why Web Application Firewalls (WAFs) matter. But the WAF of 2025 isn’t just an appliance sitting in front of a static website. It’s a flexible, cloud-aware security […]

Ganesh The Awesome
7th July, 2025
What is an API Security Audit?

 In January 2024, a misconfigured API exposed 650,000 private messages. These included passwords and internal communications. No exploit chain. No zero-day. Just a public-facing endpoint with no authentication. This wasn’t an isolated incident. From T-Mobile and Twitter (now X) to Kronos Research and the US Treasury, attackers have consistently used APIs as entry points. They […]

Ganesh The Awesome
26th June, 2025
The Ultimate API Security Checklist for 2025

APIs are now the top attack vector in enterprise apps. In 2024 alone, breaches tied to APIs cost an average of $4.88 million, and that number is rising fast. Attackers exploit gaps in API authentication, input validation, and outdated endpoints to compromise systems. Legacy controls no longer suffice, and the OWASP API Top 10 outlines […]

Ganesh The Awesome
26th June, 2025

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

    GlobalDots' industry expertise proactively addressed structural inefficiencies that would have otherwise hindered our success. Their laser focus is why I would recommend them as a partner to other companies

    Marco Kaiser
    Marco Kaiser

    CTO

    Legal Services

    GlobalDots has helped us to scale up our innovative capabilities, and in significantly improving our service provided to our clients

    Antonio Ostuni
    Antonio Ostuni

    CIO

    IT Services

    It's common for 3rd parties to work with a limited number of vendors - GlobalDots and its multi-vendor approach is different. Thanks to GlobalDots vendors umbrella, the hybrid-cloud migration was exceedingly smooth

    Motti Shpirer
    Motti Shpirer

    VP of Infrastructure & Technology

    Advertising Services