Page 1,588«..1020..1,5871,5881,5891,590..1,6001,610..»

Beware the Network Security Breaches Caused by Carelessness – No Jitter

Why do we seem to be having such a problem with IT security? Part of the reason is that we have more people trying to breach it, but another part is that weve changed how we build and use applications. In the old days, say thirty years ago, we ran nice big comfortable monolithic applications. They had one user interface and everything else was totally opaque. In modern terms, we had a very limited attack surface, and our recent reliance on remote and hybrid work has made that surface a lot bigger.

Attack surface! Ah, theres a term youve heard a lot about. An attack surface is the set of interfaces that would be visible, meaning accessible, from the outside. Anything a user wants to access is part of an attack surface because attackers would work hard to mimic authorized users. But an attack surface can be spread out, accidentally, by a bunch of different things.

One such thing is your own VPN. Many companies have a range of IP addresses assigned to them, public IP addresses that nobody else can use. Suppose you assign these, as many companies do, by organization or type of application, so suppose your order entry system has a piece of this range. One of the addresses might be the one you expect your real orders to come in on, but heres the rub. All these addresses are public, visible on the Internet. Your attack surface was bigger than you believed it to be.

This problem of multiplying IP addresses and the expanded attack surface they introduce -- was acknowledged by developers when Docker, containers, and Kubernetes became popular means of deploying multi-component applications on virtual servers for efficiency. We saw an important innovation here: the widespread use of private IP addresses. They have an important advantage in that they cannot be routed over the Internet at all. The new container hosting system assigned private, non-routable, addresses to everything, and then exposed only specific addresses to the corporate VPN. This created what we might call a visibility surface -- only selected addresses would poke through to become part of the attack surface, and the same strategy was used in the cloud.

Of course, attackers knew about all this too, and the response was to rely on planting hostile outposts inside the visibility surface via strategies like phishing. Compromise a single computer system on the company network and you have control over a system thats inside that network's ring of protection because an attack from it looks like legitimate access. The good news is that even phishing outposts cant get inside the visibility surface. The bad news is that these hostile outposts can get at what is open to attack, so the next step in reducing the attack surface was to extend access control to limit a given user systems access to exposed addresses that the worker legitimately needs to access.

Some of the most advanced security strategies today are based on this form of connection control. A given user system, with a given IP address, should be sending and receiving things only from the addresses the worker is entitled to connect with. Explicit connection permission is always required. So by identifying these relationships, attack potential is limited. Since a phishing attack probably wont know what permissions a compromised system has, its even possible to identify and isolate compromised systems before they can damage or steal things.

Of course, all of this is vulnerable to carelessness, which is the biggest security challenge today. Three issues rooted in carelessness regularly emerge,, and any of them can lead to a security breach.

The first challenge is overexposure. Cloud and data center components that arent exposed into the VPN address space cant be accessed by users at all. Thus, theres a tendency to expose components that might at some point need to be accessed. Theres also a problem with the popular concept of observability. The probes and logs that monitoring needs to access have to be addressed by the monitoring software. That means some level of exposure, which means protection can be lost. Probes are often simple elements with minimal security capability, like IoT devices. Smart enterprises gather probe/log data inside their visibility surface, and expose only the address of the collected material, not the sources.

The second challenge is overpermission. Ann and Charlie need access to a dozen applications, but maybe not the same ones. Add in a dozen other workers and you could end up with a lot of separate connection control policies to maintain, so why not just give everyone a fixed set of permissions and save the work? Or an organizational change moved people around and so system connection controls have to be changed, or heres a desk a lot of branch people with various applications need. Why not just open things up a little to save the time needed to get everyone set up with the right control policies? Now we have systems with broader access than theyre entitled to, and if compromised they can now attack more of a companys applications and data resources.

The final challenge is overdistribution. Everyone gets excited by new technology ideas, and with the cloud we got things like scaling and redeployment. In hybrid and multi-cloud, enterprises often move components between cloud providers and the data center, and any component that has to be moved has to be connected to all its usual workflow partner components. Often this means these components are exposed on the VPN so they can be accessed anywhere, and that means theyre outside the visibility surface and can be attacked.

WFH and hybrid work make all these issues critical, because workers are now connecting via the Internet, which is certainly the home of a lot of bad actors. Most enterprises divide up their security strategies, so in many cases theres no single place where all the safeguards are managed, or even known. Have a security meeting of all the players, organize your approach to look for the three challenges, and plug any holes, before your new distributed enterprise becomes the next sad story of a big hack.

Read more:
Beware the Network Security Breaches Caused by Carelessness - No Jitter

Read More..

Is Louisiana’s ID Verification Mandate a Step in the Wrong Direction? – Global Village space

It was recently announced that Louisiana had introduced legislation that requires users of adult websites to show identification to access the pages. This has stirred up plenty of questions about how much authority governments can have over the policing of the internet.

Aside from the ethical debates surrounding the news, it also feels like this is a step backward. Technology is moving forward rapidly, and improved methods of authentication are already emerging. A more sensible solution could be to jump on the growing trend of biometric technology for accessing websites.

PIA reportedthat lawmakers in Louisiana have decided to implement a new rule for accessing adult websites. In a push to ensure that children dont encounter content that could be damaging to them, internet users in the state will now be required to use their personal identification credentials to log on.

Experts have noted how other countries, including the UK, Australia, and Germany, have all attempted similar measures in the past. None of these worked. In fact, collecting IDs for age verification can have serious knock-on effects when it comes to data privacy.

This highlights how theres a need for more modern approaches to authentication that are in line with the advancing technological world. Biometrics has already started to creep in on devices and some sites. However, they havent become widespread or used as an alternative to traditional identification methods yet.

According toGrand View Research, the global biometrics market will be worth around $60 billion by 2025. It is growing at a rate of 20.4 percent each year, and this is being driven by the increased demand for enhanced security methods.

For the technology to become used for logging onto all sites and devices, internet users need to have the reassurance that their data wont be sold or lost to third parties.

Like it or not, biometric technology is on the way, and some people believe that it is a great step forward. Theres no doubt, though, that western countries will need to learn how to cope with these challenges. There needs to be a happy medium between using technology for security and allowing people to have their freedom and privacy intact.

The identification mandate in Louisiana does feel like a massive backwards step in internet security. Now that modern authentication methods like biometrics are coming into play, perhaps governments could use these to ensure that the right people are accessing content thats appropriate to them.

Read the original here:
Is Louisiana's ID Verification Mandate a Step in the Wrong Direction? - Global Village space

Read More..

Tennessee House OKs bill banning TikTok on college Wi-Fi networks – Chattanooga Times Free Press

NASHVILLE The Tennessee House on Thursday approved legislation barring public college and university campuses from allowing the China-based TikTok social media platform on their Wi-Fi networks, sending the measure to Gov. Bill Lee.

Senate Bill 834, which recently cleared the upper chamber, passed the House on an 80-11 vote.

The bill makes no specific mention of TikTok, which has exploded in popularity with its popular video-sharing app. Instead, the bill bans any app associated with the People's Republic of China.

TikTok is owned by Beijing-based ByteDance. An estimated 150 million Americans use the app, and concerns have been raised in Washington and elsewhere that it poses a threat to national security and user privacy. There are other concerns it could be used to promote the Chinese regime's propaganda and misinformation.

"This bill is putting it into law that our higher education colleges and universities will not make available on Wi-Fi any app that is associated in part or in whole with the Chinese Communist Party," House Republican Caucus Chairman Jeremy Faison of Cosby told the House.

House Democratic Caucus Chairman John Ray Clemmons of Nashville had questions.

"I have the feeling we're discussing one particular app. This same app is being discussed in a hearing today in the federal government," Clemmons said, asking Faison if he could delay final action on the bill until House hearings conclude.

"Regardless of what they get done in D.C.," Faison replied, "we'll make sure we're doing it right here in Tennessee, so I would prefer us voting for it today."

Faison said he would hope the measure would apply to any other company that met the bill's description.

"I would just say that if you're associated with that country, that business, we need to be careful with our internet and capabilities of things that they can find," Faison said. "Our security, whether it's internet security or physical security, is one of the most important things we should do, and I just believe this is internet security, that we should make sure all of our higher ed institutions are secure."

Clemmons questioned why the bill doesn't go further.

"We don't have any concerns about any of the computer software that's bought by the state of Tennessee or any other governmental agency that is produced or made in China or the iPhones sitting on almost every members' desk if they're perhaps manufactured in China and actually holds data, collects data information, photographs. You don't have any concern about that, it's just this specific app?"

Faison replied, "I would probably support you if you brought a bill to take care of those things."

"I think you might have a problem judging," Clemmons said.

Rep. Antonio Parkinson, D-Memphis, told Faison the "Make America Great Again" hats promoted by former President Donald Trump were made in China.

"Are we going to ban those?" he asked.

Faison said the bill deals with software.

Among lawmakers voting against the bill was Rep. Yusuf Hakeem, D-Chattanooga.

"I guess in my mind is, is it just a beginning?" Hakeem said of the legislation in a phone interview following the House's action. "You start with TikTok, and then you find another app that in your mind is not appropriate or in the best interest. We don't always have a consensus. So when you start with one, I think it's just the beginning and there are some others down the line you want to bar."

At the University of Tennessee at Chattanooga on Thursday, students said they would just access TikTok using the data plan for their mobile device if the school blocked the app from its Wi-Fi. Some said that if the move was made for security reasons, they supported it.

"That's fine for them to do that because I'm still going to use my data," UTC Junior Aniya Flournoy said in an interview. "And I don't use their Wi-Fi. Their Wi-Fi doesn't work for me with anything."

When asked if the government should legislate platforms like TikTok, UTC Senior Kennedy Rawls said that if it was for security, she agreed with the decision.

"Since it's for safety, it's a good thing," Rawls said in an interview. "And you still can use the option to use it if you have your own data. That's why it's not that bad."

UTC Freshmen Sarah Pewitt said teenagers will still access TikTok, even with regulations.

"Teenagers are super good with technology," Pewitt said in an interview. "I feel like easily teenagers could still find a way to access TikTok."

Pewitt wondered why the ban was specifically for college campuses.

"They might as well cancel the app altogether instead," Pewitt said. "Go big or go home."

Pewitt said TikTok is a good platform for learning but can also be bad for mental health. She added that she goes through phases of deleting the app for weeks at a time.

"You learn stuff, but at the same time, it's social media," Pewitt said. "It's a lie most of the time. There's nothing you can trust on the internet. It's bad for everyone's mental health that watches TikTok."

Staff writer Carmen Nesbitt contributed to this story.

Contact Andy Sher at asher@timesfreepress.com or 615-285-9480.

Read the rest here:
Tennessee House OKs bill banning TikTok on college Wi-Fi networks - Chattanooga Times Free Press

Read More..

Fake news, videos on the internet pose threat to public safety … – TheCable

BY NOSA OSAIKHUIWU

The advent of the internet and the advancement in information technology has brought about meaningful changes and developments that are beneficial to us as Nigerians and indeed to the global community because of the ease of communication, information sharing, audio and video content creation, editing and distribution, including the application of many of the technological improvements in other fields like medicine, engineering, public administration to mention, but a few.

However, these technological innovations also have their challenges and disadvantages and today many countries are currently dealing with some of the negative implications of these technological advancements, especially in the areas of news and information dissemination. Today, all newspaper publications maintain large footprints in the digital space because of the ease of publishing online and the need to be the first to report the news including more importantly, the fact that more people worldwide today now get their news from the internet as opposed to the newspaper stands. This preponderance of internet technologies combined with video and audio content editing softwares is the greatest threat to the corporate existence of Nigeria since the civil war.

It is very difficult today to easily distinguish between what is real and what is fake or artificial because of technological advancements that have blurred the lines between reality, make-belief and illusion. As a professional with nearly two decades of experience in information technology, I am fully aware of the harmful effects that these technologies can have on societies if used wrongly as evidenced in our nation over the last several years and during the just concluded presidential elections.

In full consideration of the seriousness of this threat, it behoves the authorities at various levels of our nation including law enforcement to take this matter seriously and prosecute purveyors of fake news and cooked-up video content to the fullest extent of the law in other to avert the ugliness and conflicts that may arise in future as a result of some of this nefarious online propaganda.

Frankly, violence of any sort, banditry, armed robbery or kidnapping of citizens under any guise must be condemned and those behind it, including collaborators, be made to pay the full price for their actions.

While we reject in the strongest possible language any attempts by anyone to rationalise violence, robbery and kidnapping for ransom which has risen to astronomical proportions in the last decade or so, to be the result of harsh economic realities in the country, we urge security forces to partner with the general public to arrest this menace and restore order and public confidence as the character of a person has more to do with criminal conduct than their economic conditions.

However, in response to this violence, many have laid the blame on the Fulani herdsmen some of whom have been involved in criminality in some communities, but not all of them. However, the Fulani have been herding cattle since before independence in Nigeria and over these years we have had numerous conflicts between herders and farmers predominantly in old northern Nigeria, many unfortunately involving loss of lives before 2015.

However, these unfortunate incidents which have essentially been a fight for resources (grazing lands) between farmers and herders were given an ethnic and tribal colouration beginning in 2015 so as to inflame the polity while those behind it mined the situation for political hay.

The hysteria about the alleged menace and violence by the herdsmen reached a crescendo during the 2019 presidential elections where a montage of videos and audio messages were been released daily allegedly showing Fulani herdsmen committing one heinous criminal act or the other which was met with outrage by many Nigerians who have over the years lived peacefully with one another.

However, condemning criminality and violence is distinct from a covert or overt attempt to undermine the social harmony in the country by targeting one group or the order as responsible for kidnappings and all the violence and ills in society.

The seriousness of this situation was driven home for me in Benin City several years ago when an elderly uncle of mine whom I have known to be open to all Nigerians and had tenants from all the major ethnic groups in the country called me aside and to my surprise said beware of this people they are not good people in reference to a cab driver I hired to drive me around during my visit in 2019 and whom I have consistently used and relied upon to date in all my subsequent visits without any hitches.

I tried to disabuse my uncles mind that everyone is different and that criminality is not restricted to any one community. The attitude of my uncle towards someone working with me from the northern part of Nigeria who looked Fulani is one of such fallouts from dubious internet video campaigns about Fulani herdsmen and there are many other instances and prejudices that this menace has created in our country that we would have to get over in other to continue to live in peace with one another.

Since the president of the country over the last seven plus years is a Fulani, many have alleged without a shred of verifiable evidence that these alleged offending Fulani herdsmen were being given political cover by the president to operate with impunity and without consequences for their alleged criminal actions. This narrative gained so much traction because of the impact of the heinous videos showing herdsman raping, killing or burning villages all across the nation.

What many Nigerians did not know or did not care to know is that the mere existence of videos portraying an alleged incident does not in any way substantiate the authenticity of the video or confer veracity on the video contents, because there exist technologies today that can edit and alter videos and audio contents to show and convey whatever information real or imaginary to fit the narrative of the perpetrators, so we must be careful and not believe all so-called videos or audio contents that are peddled online by those who dont mean our nation well, unless the materials are independently verified by legitimate media houses or law enforcement agencies.

This article is not saying that there are no criminal herdsmen, or that some are not engaged in banditry, kidnappings and other vices, but that criminality is not the exclusive preserve of any one group or tribe as other Nigerians are equally engaged in this type of criminal conducts and possibly do collaborate amongst themselves irrespective of tribe or religion.

What we are saying is that the campaign was deliberate and intended to malign the country, and an ethnic group and had alleged political undertones, such that when there is one or two alleged incidents of violence or criminal conduct, it will be presented as one hundred or more incidents with alleged manipulated videos to corroborate the lies.

The deluge of videos, audio messages and internet links purported to show the President-elect Asiwaju Ahmed Bola Tinubu in a very unflattering light before and during this election campaign, including the sharing of unverified videos showing violence during and after the elections, seem to have been patterned after the video montage of alleged mayhem by rampaging Fulani herdsmen in the last several years. It does appear that the well-oiled campaign against the Fulani herdsmen was a dry run by these actors and unseen hands preparatory to the 2023 presidential election.

The similarity and pattern of their operations including those involved which cut across all sessions of Nigeria would cause inquiring minds to wonder to what extent these groups of people are willing to go to achieve their objectives. If one may ask, where are the so-called herdsmen now? How come they have been silent and have not caused any mayhem during the 2023 campaigns and elections?

Or is it possible that they were out campaigning for office or was this from the very onset just a political hack to score cheap political points gone too far? I will leave you the readers to draw your own conclusions but be warned of the coming of videos in the next few years of Oduduwa Brigades or Area Boys terrorising average citizens across the land.

There were numerous videos making the rounds on the internet showing the candidate while he was still running for office, peeing on himself, several others showing him disoriented, unable to walk without assistance, speak, or making incoherent and delusional statements all in an attempt to undermine his electoral chances and make him unfit for office in the eyes of the Nigeria electorates.

Their objective was to convey the message of a sick old man who was unfit for the highest office in the land and as if these unsubstantiated and bogus claims and attacks were not enough, they even alleged that the president-elect was a drug dealer and was convicted for such offences in the United States of America, not to mention the other numerous falsehoods about the candidates age, educational qualifications and so on.

It is true that the APC candidate was not the only candidate that was at the receiving end of these internet conspiracies and character assassinations. Peter Obi, the candidate of the Labour Party, and Abubakar Atiku the candidate of the Peoples Democratic Party (PDP) were also targets of these smear campaigns by these unseen hands who in all seriousness present a serious danger to this country and should be taken seriously and dealt with immediately.

The manner in which videos have been used in this elections, coupled with the anti-Fulani campaigns before now, beckons on the authorities to take seriously this threat posed by this deliberate manipulation of video and other contents that are indiscriminately being distributed online to avert a grave and imminent danger for the country.

For example, there are many videos right now after the gubernatorial elections making the rounds alleging ethnically motivated violence and many of these videos cannot be independently verified, but are out there inflaming emotions and causing ethnic tensions across the land.

Presently, the Independent National Electoral Commission (INEC) and segments of our population are now the targets of these unsubstantiated allegations or hyperbolic and sensational reporting of wrongdoings, using nonexistent or minor incidents to convey alleged systemic violence or tribal attacks against non-indigenes in certain areas of the country.

This type of politics and disinformation must stop before it goes to the next phase, given the state of origin of the president-elect. Nigeria belongs to all who live in it and call it home and we should all, irrespective of where we or our parents come from within the country, be free to enjoy and exercise our citizenship without fear of intimidation or violence.

Consequently, I call on the incoming administration of President-elect Ahmed Bola Tinubu to propose legislation to the national assembly, and for the national assembly to pass with delays legislation that will discontinue the use of state of origin and local government of origin and replace with state and local government of residence in all federal agencies, forms and contracts, including the definition of conditions for residency in any given area of the country in other to better promote national healing, common purpose and oneness in our beloved country.

While every citizen has the right to freedom of speech and thought, we must in the exercise of this right avoid slanderous statements to ensure that we are not criminally liable to prosecution for slander and for disseminating false documents online.

The various print, electronic and digital media organisations and radio and television stations must do their due diligence and verify all video content through multiple sources, including having sources swear under oath of perjury to ascertain the credibility of content providers as they have a responsibility to the nation and to refrain from giving oxygen to unsubstantiated internet trolls and fabrications that are designed to instigate ethnic conflicts or precipitate breakdown of law and order.

Finally, fake internet videos, news contents and links do pose serious threats to Nigeria, and law enforcement must take the threats posed by these unsubstantiated videos and fake news seriously before it tears our nation apart and to the point of open conflict or civil strife.

May God bless you all and may God bless the Federal Republic of Nigeria.

Nosa Osaikhuiwu is a decolonised African of Nigeria extraction, an outside-the-box thinker and problem solver and an unapologetic advocate of culture change from the ground up in Nigeria. He can be reached via [emailprotected]

Views expressed by contributors are strictly personal and not of TheCable.

Read the original post:
Fake news, videos on the internet pose threat to public safety ... - TheCable

Read More..

Spectrum offers major internet investment to rural Maine – WGME

Maine Connectivity Authority experts say about 70% of Maine has underserved internet.

Underserved Mainers are those with some but not ideal access to internet.

Charter Communication announced a $70 million investment in its fiber-optic network.

As well as a $12 million investment to extend their network to thousands of Maine homes and businesses without internet.

One of those unserved communities is the town of Liberty.

Jeffrey Johnston is the co-owner of Lake St. George brewing company. He says his access to internet is hurting his business.

"When multiple transactions are happening, it stalls out., said Johnston.

Johnston says the iPads his staff uses, and his security system do not work as reliably as they should.

Bob Kurek had a similar experience in his home nearby.

"I couldnt even download the upgrades to my computer because it just took too long, said Kurek.

Kurek says he needs his computer for important work, like accessing his banking.

President of Maine Connectivity Authority Andrew Butcher says the charter investment will help communities like Liberty.

I anticipate a good amount of this investment will go to some of our more populous and dense areas that have a need and opportunity for enhanced service, said Butcher.

Joe Meadows, who lives in Liberty says charter's investment will be helpful. But he wants to see community ownership, not commercial.

Meadows says community ownership could be less expensive and more effective.

"We can control the rates, we can control the levels of service, said Meadows.

But that's not usually the case says Myles Smith of Maine Broadband Coalition.

"We want to make sure that people have affordability and choice in the internet that they get, said Smith.

Smith says some communities only have one choice, which is Spectrum under Charter.

The Charter investment is estimated to be completed across the company's state service area by 2025.

See original here:
Spectrum offers major internet investment to rural Maine - WGME

Read More..

The Good, the Bad and the Ugly in Cybersecurity – Week 12 – SentinelOne

The Good

Dark forum site operator, Pompompurin, was arrested this week by U.S. law enforcement on the charge of conspiracy to commit access device fraud. One Conor Brian Fitzpatrick was arrested in his home where he admitted this alias and to owning and administrating the website, BreachForums, well-known across the cybercrime ecosystem for hosting stolen databases and selling personal data for fraudulent activities. Officials reported that Fitzpatrick had been under close investigation for over a year before the arrest.

After the DoJ announced the successful seizure of the RaidForums website in April of 2022, it was widely speculated that Fitzpatrick created BreachForums as its successor. Since then, BreachForums has gained notoriety for being one of the most active hacker forums available to cybercriminals.

Under the Pompompurin alias, Fitpatrick quickly filled in the gap of selling and leaking sensitive information through social media, propelling the site to becoming one of the largest data leak forums of its kind. Fitzpatrick has also been connected to various high-profile cyberattacks, including those involving the FBI, Twitter, and popular online stock trading platform, Robinhood. At the time of its takedown, BreachForums had more than 330000 members, 47000 threads, and almost one million posts.

Though the site is now defunct, these seizures remain critical in the uphill fight against increasingly sophisticated cybercrime syndicates. BreachForums was just one of many leak sites and dark marketplaces causing ongoing damage to government organizations and enterprises of all industries. Just as BreachForums rose from the ashes of RaidForums, it is vital for businesses to remain vigilant with protecting their data from opportunistic threat actors as new forums inevitably continue to propagate.

A new Go-based, DDoS-focused malware dubbed HinataBot hit the scene this week, taking its name from the popular anime series, Naruto. According to researchers, the threat actors behind the new malware were first observed in December of last year and have since started to develop their own malware approximately two months ago. Current indications point to the malwares active evolution as it is updated by its authors and operators.

HinataBot is written in Golang and is the latest in emerging Go-based threats that continue to proliferate in the cyber underground. Go is increasingly in use by attackers for its high performance and support for multiple architectures. Security researchers have noted that Go-based malware presents extra challenges to analyze and reverse engineer.

So far, samples of the malware have been discovered in HTTP and SSH honeypots, where they have been observed abusing weak credentials and old remote code execution (RCE) vulnerabilities from as far back as nearly a decade ago. Analysis on the infection process for HinataBot has shown exploitation of the miniigd SOAP service on Realtek SDK devices (CVE-2014-8361), Huawei HG532 routers (CVE-2017-17215), as well as exposed Hadoop YARN servers.

The discovery of HinataBot brings to light the responsibilities of organizations to deepen their visibility surrounding deployed services as well as weak spots in their overall infrastructure. In this case, nearly 10-year old vulnerabilities are still being exploited as threat actors continue to use overlooked or low-hanging resources to evade detection, build on new functionalities, and get a high return on through small investments.

In a joint technical report released this week by SentinelLabs researchers and QGroup GmbH, telecom providers in the Middle East have become the latest target in a long-running cyberattack campaign dubbed Operation Tainted Love. Based on the investigations, this campaign has been attributed to Chinese-based cyber espionage threat actors.

Initial attack vectors observed in the string of cyberattacks began with the infiltration of Internet-facing Microsoft Exchange servers to deploy web shells for command execution. After securing a foothold, the attacker conducted a variety of reconnaissance, credential theft, lateral movement, and data exfiltration activities.

In the latest attacks on Middle Eastern telecom providers, the actors have been seen deploying a custom variant of Mimikatz called mim221 to facilitate lateral movement techniques and privilege escalation as well as all-new anti-detection and credential theft capabilities. Special-purpose modules like these underscore the threat actors drive to advance their toolset with a marked focus on stealth. Techniques noted by SentinelLabs researchers included in-memory mapping of malicious images to evade EDR API hooks and file-based detections, the termination of Event Log threads instead of the host process to inhibit logging without raising suspicions, and staging a credential theft capability in the LSASS process itself by abusing native Windows capabilities.

Telecom providers find themselves frequently in the crosshairs of attack for the large amounts of personal client data they hold and sensitive information transmitted. This campaign is expected to continue as the Chinese-linked threat actors upgrade their malware and zero in on strategic targets in the Middle East.

See the original post:
The Good, the Bad and the Ugly in Cybersecurity - Week 12 - SentinelOne

Read More..

Scriptwriter Vipul K Rawal Turns to Crowd Funding to Protect His … – Business Wire India

Mumbai, Maharashtra, India: Following the success of his previous film "Tony" under the innovative "Pay only if you like the film" business model, writer-director Vipul K Rawal is excited to announce his next project, which will be funded through a crowdfunding campaign.

"I could have easily sold that story for a massive amount to any established producer or studio, but I am sure they would have spoilt my script as they have done in the past. Moreover, I dont want these brokers to earn lifelong from my creativity any longer. It is high time for a change in Bollywood and I strongly feel that a massive disruption of the existing system is needed. I am therefore thrilled to partner with genuine cinema lovers to bring this project to life, on my terms and conditions," said Rawal. "After the overwhelming success of our previous project, we are confident that our audience will continue to support our work and help us bring this new film to the big screen. More than 1500 people had donated to our previous film TONY and since I had a ready database of genuine cinema lovers I tapped them first and I have already received pledges worth several lakhs rupees from them."

The campaign, which launches today, offers an opportunity for fans of Rawal's to support the upcoming film and become part of the production process. Investors who contribute a minimum of Rs. 10,000 will receive a share in the film's profits and the designation of Associate Producer in the credits.

Rawal is a critically acclaimed writer-director in the Indian film industry, known for his thought-provoking storytelling and dynamic characters. His company Whitewater Entertainment aims to produce meaningful and world-class cinema that focuses solely on the strength of its content. His previous work includes the award-winning film Iqbal, "Mumbai Varanasi Express", "Batti Gul Meter Chalu" "Rustom" and the critically acclaimed TONY that Rawal made on a shoestring budget of 75 Lakh rupees and released on YouTube. Rawal is excited to bring his unique vision to this new project and is confident that it will resonate with audiences around the world.

For more information on the crowdfunding campaign, please visit the official website at http://www.whitewaterentertainment.in and go through the FAQs or send an email to [emailprotected] or call on +91-9987639426 to talk to him personally.

See the rest here:
Scriptwriter Vipul K Rawal Turns to Crowd Funding to Protect His ... - Business Wire India

Read More..

The Unconventional Means Of Capital Acquisition: Crowd Funding – Asia Business Outlook

The primary objective of any established business is to generate profit which will be used to sustain and develop it. But, before that, for any business idea to translate into an executed venture, it needs capital to start and operate in its early stages before any profit is generated. There are multiple ways a business can raise funds. The first option they consider is bootstrapping, which is using their personal savings or pooling money from friends and family, the second is to get a loan from banks and the third is to get an angel investor or venture capitalist on board by giving them some stake in your business. But the arrival and acceptance of internet has added new avenues for raising funds. You can campaign on the internet for capital, and the users depending on their favorability of you, will provide you with funds.

New Funding Entrant

Crowd funding is a recent idea in the area of investment when taken the history of business as a scale. Not everyone can get access to a venture capitalist who aligns and understands the value of their idea.And asking large sums of money from family/extended family or friends is a hard task which creates a feeling of unease in the long run. The internet can arguably be called the best thing humanity has ever conjured. The internet gives you access to theoretically limitless opportunities for getting resources for your business, it has grown to such an extent that you can conduct a large scale operation without leaving the comforts of your home via the internet. A lot of niche businesses which were not understood by the traditional businessmen or those which flew under the radar for its time, found their golden goose on the internet where they got funded by the interested parties across the internet.

Low Realisation Barrier

The grandeur of crowd funding lies in its limits, no amount is too small, a user if he really wants to see the business thrive he can spend as little as he wants without hurting his own bottom line while simultaneously aiding the product development of the business he likes. Crowd funding is the literal personification of little drops of water make a mighty ocean. Numerous donors donating little amounts to a product they really like goes a long way for the businesses.

Popular crowd funding platforms like Kickstarter and Indiegogo have aided innumerable amounts of businesses, not just the traditional ones but even gaming companies. The most famous one in the past decade, Undertale by Toby Fox was also a crowd funded venture. Pebble, an innovative smart watch was also a crowd funded product. Crowd funding is a boon for those who make products which cater to niche audience. The crowd funding tactic allows marketing by word of mouth, fans on the internet will share that with others who are in the same niche by means of social media, there are tons of products which got their desired funding amount virtually overnight.

The Methodologies

There are various ways in which a crowd funding can be done. Firstly, the business can pitch the idea in its early stage and backers (this is the term used for people who fund the project) can invest and the business can take this amount and build their product, and they can deliver the product first to their backers when it is completed. The complex ones operate like standard businesses which are subject to financial authority of the territory it is based in, and every backer is subjected to receive a return on investment proportional to their investment. This results in a hefty shareholder base which is similar to retail investors and venture capitalists.

Alternate Contributions

Crowd funding has also served nonprofit causes too, the internet has a way of rallying people together to help catastrophe-struck areas from any corner of the world to aid the affected area. This method has proven itself as a fast efficient way to provide capital in those cases as there is no national barrier and funds can be distributed directly to the impacted area.

Like all investment instruments, crowd funding also has its flaws, but it should not be entirely defined by that, everything serves its purpose. With the saturation of startup and venture capital markets, the competition to accessibility to capital is increasing and aspiring business owners have to resort to new avenues and present themselves to the consumers in innovative ways to provide them with capital.

View post:
The Unconventional Means Of Capital Acquisition: Crowd Funding - Asia Business Outlook

Read More..

CarousH3ll Crowd Funding and Exclusive Cast Reveal – Horror Society

From the Kickstarter page:

Welcome to our goal of completing our planned CarousHELL trilogy. A lot of folks loved 1 and 2, so we really want to bring you to the ending of this arc for Duke. This doesnt mean this is definitely the LAST CarousHELL film forever, but we want to give an ending to this specific journey Duke has been on since the first film.

Us writers (Aleen Isley & Steve Rudzinski) have put together what we feel is a AMAZING part 3 in this story, one again exploring entirely new themes and ideas that havent been seen in the CarousHELL series yet. We have some fun turns, great characters, and in our test read throughs everyone has agreed on this being a great ending for the trilogy.

The extremely talented Autumn Ivy is signed on to provide the voice for our newest villain, Usagi. Usagi was a volunteer for Ilsas experiment and her soul is housed within a carousel rabbit. What are her diabolical plans? What makes her such a threat to Duke?

Joe from CarousHELL 1 also officially has returned, as shown in the mid credits scene of CarousHELL 2. Joe is another character Duke will deal with, as he is hyper focused on getting revenge for the death of Otis.

Production wise Scott Lewis is on board to shoot this film again, after helping us make CarousHELL 2 and Shingles the Movie look amazing. Steve Rudzinski will be the one mostly in the editors seat on this film, though he already has said hell probably ask Scott for some help with some of the scenes.

Cody Ruch is already signed on to create the effects and puppets for this film so you know the gore will absolutely deliver.

We are asking you, the fans, to help us complete this third chapter and give you the story conclusion Duke (and the rest!) deserve.

Since every kickstarter Ive run has only just hit our goals I dont currently have any stretch goals planned. If the numbers leap that will change, but for now Ill just say:

Getting a bit extra will just go towards making parts of 3 even better. More effects, more bodies in the planned action sequence, better locations.

If we hit $30,000, I will also make CarousHELL 4 and upgrade everyones tiers to include a physical copy of that film (and any assigned credits, folks who die in 3 will get an Executive Producer Credit on 4).

Read the original:
CarousH3ll Crowd Funding and Exclusive Cast Reveal - Horror Society

Read More..

When it comes to cloud computing, the sky’s the limit – FinTech Magazine

Cloud computing has transformed the way businesses operate, allowing them to store and access data on a global scale. Organisations have traded the pain of managing hardware, and on-premises solutions for hosting their solutions on cloud providers such as Amazon Web Services (AWS), Google Cloud Provider (GCP) and Microsoft Azure Cloud (Azure). These providers are not just reliable but provide a host of managed solutions, cutting out what could be months of engineering effort. That being said, to remain competitive, businesses need to understand what challenges they may face as well as how to maximise the value of their cloud-based solutions. This is especially true as new features and tools get launched yearly.

Being successful at the cloud can involve many moving parts, but I believe it can be broken it down in to certain key topics:

Note: As AWS is the most popular cloud platform, our examples will be predominantly with that. But the same logic strategy is applicable to any cloud platform

AWS and Azure have over 200 services while GCP has well over 100. How does one begin to pick? Well there are multiple ways one can choose a series of services to deliver the same thing, but the final selection should be based on business needs. For example, you may want to launch a single page application written in React. One method, using AWS S3 and CloudFront, will ensure your website is delivered quickly to everyone across the globe. But lets say your application gains more and more complicated UI features, making rendering time a pain for users, especially if their computers are slow. In that case, a better solution may be to host a React service with server side rendering on an AWS ECS cluster.

Additionally, one may need to know whether they should use a cloud providers managed service versus an open-source solution which you self host on the cloud. For example, using AWS API Gateway with Lambda contrasts with ECS hosting and API powered by a popular framework like Flask. Both solve the same problems, but come with different costs and benefits. For example, Lambda can be lightweight and cost efficient, but one now has to understand limitations, such as run time and memory, as well as other nuances such as cold starts, and RDS proxies to connect reliably to databases.

That all may come across as very dense information, but it is important to keep in mind that new services are added to the cloud every year, so one must keep up to date with the latest information. Doing so can help organisations adopt newer services that introduce better cost savings and better reliability.

Your organisation grows. There is a big difference in the 100 daily users you may have right now, and 100,000 you will have in the future. Similarly, there is a difference between transforming and moving megabytes of data versus moving it when it grows to gigabytes. One needs to pick tools that not only solve the needs of today, but also the needs of tomorrow. The key is to design your cloud architecture so the performance scales along with your needs along with the cost. Leveraging services and features like load balancing and auto scaling are popular ways to tackle this.

Setting up log collection and monitoring are often great sources of information to help you know when something goes wrong. But, this only gets you so far. As things get bigger, and more critical, you want to know not just if your system has failures, but also why it might be failing. This is called observability. Monitoring is reactive, whereas observability is proactive. This is especially important since in a large cloud architecture, you have multiple resources running and connected to one other. Popular tools like DataDog and Dynatrace, and even Cloud Native ones like AWS X-Ray, can help trace the origins and the reasons behind failures. Another important key here is best practices, such as having Slack and email notifications setup so you know immediately when a key service may be failing, and ideally why. Adopting observability as practice will help your organisation solve bugs quickly.

There may be important data and services you wish not to be public. This means you need to make sure sensitive resources are not open on the public internet by restricting access policies, isolating them in private cloud networks, setting up IP whitelisting and black listing, or even adding Oauth and SSO authentication layers. On top of that you want to make sure that you scan any open-source dependencies for vulnerabilities before they get adopted in production. A great place to put these scans is in your CI/CD pipelines. How you choose to protect things will depend again on the services you decide to use and your business needs.

The final part of your strategy is setting up your system in a way that makes it easier for engineers to focus on building new features rather than worrying about how to deploy them. There are integral concepts in the DevOps worlds that will help you do this. The first is infrastructure as code. This will make it easier for you to spin up new cloud resources and maintain multiple environments such as development, staging and production. The second is continuous integration and deployment. This enables engineers to have deployment of new features automated as soon as they are developed. Aside from these, another key aspect is picking the right cloud technologies that do not add friction in the development process.

Often we see organisations choosing services in a way that adds too much friction in the development process. A common one is using AWS Lambda over something like a simple cron job running in an EC2. Sure, one may be cheaper or easier on initial setup, but there are so many other challenges one may face as we covered previously, and if its set up improperly it will be hard/time consuming for engineers to test it. This ends up meaning that while some services may cost less, you will have to pay more in time and engineering hours, making things more expensive in the long run.

All these challenges should not scare you, but inspire you. Cloud computing is an essential part of modern business operations. It continues to evolve, with new technologies such as artificial intelligence, machine learning, and blockchain empowering companies to do more. Organisations must tackle the challenges of implementing cloud applications and improve their cloud performance, and when they do it properly, they will handsomely reap the benefits of this technology.

View post:
When it comes to cloud computing, the sky's the limit - FinTech Magazine

Read More..