Page 702«..1020..701702703704..710720..»

DETASAD and Arqit announce pioneering partnership to elevate … – PR Newswire

LONDON, Nov. 2, 2023 /PRNewswire/ -- Arqit Quantum Inc. (NASDAQ: ARQQ) (NASDAQ: ARQQW) (Arqit), a leader in quantum-safe encryption, and DETASAD, a leading provider of telecommunications and Technology Solutions in the Kingdom of Saudi Arabia, today announced that Arqit's Sovereign Symmetric Key Agreement Platform will be launched in the Kingdom of Saudi Arabia by DETASAD this month.

DETASAD, a market leader in data center and cloud services, cybersecurity and intelligence infrastructure solutions proudly announces expanding its cutting-edge partnership with Arqit, a global leader in quantum-safe cybersecurity. Together, the team is currently building a fully data-sovereign stack integrating Arqit's groundbreaking Symmetric Key Agreement solution, a technology that integrates seamlessly into existing networks to create trusted connections and secure communication links for any networked device, cloud machine or application. Secure against current and future forms of attack on encryption including from a quantum computer, the platform enhances security, resilience and the dynamic management of today's networks.

This collaborative endeavour will not only drive the development of Saudi-specific solutions atop this platform but will also pioneer a local R&D partnership. The ultimate vision is to translate locally created solutions into products for both the Saudi market and the global export market, further bolstering the Kingdom's Vision 2030 alongside supporting the UK Government's National Cyber Strategy. DETASAD are looking forward to making this unique proposition available to their customers commercially in the next few weeks and are happy to demonstrate the capabilities protecting their customer's businesses.

Under this innovative alliance, DETASAD and Arqit are planning to integrate Arqit technology into DETASAD's MadeinSaudi Smart Capacity Management to deliver state-of-the-art, locally-developed cybersecurity to every endpoint - be it satellite or any other platform within the DETASAD edge cloud.

"From this month, customers in the Kingdom of Saudi Arabia and across the region will be able to benefit from enhanced security and resilience against cyber attacks, delivered by DETASAD using Arqit's unique Symmetric Key Agreement Platform" said David Williams, Arqit Founder, Chairman and CEO. "With the increasing threat and proliferation of connected devices, Arqit's crypto agile technology offers governments and enterprises the ability to immediately benefit from higher standards of network data and information assurance, sustainable into the quantum era."

"At DETASAD, we are excited to embark on this transformative journey with Arqit," said Felix Wass, President & CEO. "Our partnership is more than just a technological alliance we are setting out to revolutionize with a fully data-sovereign Symmetric Key Agreement Platform. We are not only bringing technology to the Kingdom of Saudi Arabia but will complement it and build a MadeInSaudi portfolio for the global markets."

"I am delighted to welcome this important announcement" said Juliette Wilcox, the UK Government's Cyber Security Ambassador. "Companies such as Arqit are leading the way in demonstrating how the UK's cyber expertise can enhance cyber capabilities across Saudi Arabia, helping to further strengthen security across the Kingdom's cyberspace."

Notes to Editors

The announcement was made at the British Embassy in Riyadh, Wednesday 31 October, at an event hosted by Juliette Wilcox, the UK Government's Cyber Security Ambassador, ahead of the start of the Global Cybersecurity Forum. Arqit Founder, Chairman and CEO David Williams and DETASAD President and CEO Felix Wass were both in attendance.

In June 2023, Arqit and DETASAD announced a Strategic Teaming Agreementto collaborate on creating sovereign security solutions and services (Arqit, Arqit and DETASAD announce Strategic Teaming Agreement, 12 June 2023, link).

About Arqit

Arqit supplies a unique Symmetric Key Agreement Platform-as-a-Service which makes the communications links of any networked device, cloud machine or data at rest secure against both current and future forms of attack on encryption even from a quantum computer. Arqit's Symmetric Key Agreement Platform delivers a lightweight software agent that allows devices to create encryption keys locally in partnership with any number of other devices. The keys are computationally secure and operate over zero trust networks. It can create limitless volumes of keys with any group size and refresh rate and can regulate the secure entrance and exit of a device in a group. The agent is lightweight and will thus run on the smallest of end point devices. The Product sits within a growing portfolio of granted patents but also works in a standards compliant manner which does not oblige customers to make a disruptive rip and replace of their technology. Arqit was recently awarded the Innovation in Cyber award at the UK National Cyber Awards and Cyber Security Software Company of the Year Award at the UK Cyber Security Awards. http://www.arqit.uk

About DETASAD

DETASAD is a Pioneer Solutions Provider of Technology Solutions & Services in the Middle East region since 1982 The company delivers cutting-edge solutions and innovative services to a diverse customer base, including government entities, enterprises, and consumers. DETASAD consider as Saudi National entity achieved the regulator (NCA) highest score at ECC "100%" and the CCC "93.55%" also DETASAD offers a comprehensive range of offering solutions, including Satellite, Cloud, Connectivity, Intelligent Infrastructure, Information Security, Data Center, AI & IoT Solutions. For more information, visit http://www.detasad.com.

Media relations enquiries:

Arqit: [emailprotected]Gateway: [emailprotected]

Investor relations enquiries:

Arqit:[emailprotected]Gateway: [emailprotected]

Caution About Forward-Looking Statements

This communication includes forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. All statements, other than statements of historical facts, may be forward-looking statements. These forward-looking statements are based on Arqit's expectations and beliefs concerning future events and involve risks and uncertainties that may cause actual results to differ materially from current expectations. These factors are difficult to predict accurately and may be beyond Arqit's control. Forward-looking statements in this communication or elsewhere speak only as of the date made. New uncertainties and risks arise from time to time, and it is impossible for Arqit to predict these events or how they may affect it. Except as required by law, Arqit does not have any duty to, and does not intend to, update or revise the forward-looking statements in this communication or elsewhere after the date this communication is issued. In light of these risks and uncertainties, investors should keep in mind that results, events or developments discussed in any forward-looking statement made in this communication may not occur. Uncertainties and risk factors that could affect Arqit's future performance and cause results to differ from the forward-looking statements in this release include, but are not limited to: (i) the outcome of any legal proceedings that may be instituted against the Arqit related to the business combination, (ii) the ability to maintain the listing of Arqit's securities on a national securities exchange, (iii) changes in the competitive and regulated industries in which Arqit operates, variations in operating performance across competitors and changes in laws and regulations affecting Arqit's business, (iv) the ability to implement business plans, forecasts, and other expectations, and identify and realise additional opportunities, (v) the potential inability of Arqit to convert its pipeline into contracts or orders in backlog into revenue, (vi) the potential inability of Arqit to successfully deliver its operational technology, (vii) the risk of interruption or failure of Arqit's information technology and communications system, (viii) the enforceability of Arqit's intellectual property, and (ix) other risks and uncertainties set forth in the sections entitled "Risk Factors" and "Cautionary Note Regarding Forward-Looking Statements" in Arqit's annual report on Form 20-F (the "Form 20-F"), filed with the U.S. Securities and Exchange Commission (the "SEC") on 14 December 2022 and in subsequent filings with the SEC. While the list of factors discussed above and in the Form 20-F and other SEC filings are considered representative, no such list should be considered to be a complete statement of all potential risks and uncertainties. Unlisted factors may present significant additional obstacles to the realisation of forward-looking statements.

See the rest here:
DETASAD and Arqit announce pioneering partnership to elevate ... - PR Newswire

Read More..

Facebook end-to-end encryption like turning a blind eye to child abuse – Yahoo Finance UK

Introducing end-to-end encryption on Facebook would be like consciously turning a blind eye to child abuse, the head of the National Crime Agency (NCA) has said.

Graeme Biggar told a conference in central London that it should not be up to multinational corporations to decide where the balance lies between privacy and security.

Giving the annual security lecture at the Royal United Services Institute on Tuesday, he said: I strongly support encryption. It is an important protection from a range of crimes.

But the blunt and increasingly widespread rollout by the major tech companies of end-to-end encryption without sufficient protection of public safety poses a fundamental and negative implication.

National Crime Agency chief Graeme Biggar said encryption could leave social media companies less able to protect users from criminals (Dominic Lipinski/PA)

It means they cannot protect their own customers by identifying the most egregious illegal behaviour on their own systems.

Each platform brings different risks, and the Online Safety Act recognises this, requiring companies to ensure safety within the services they are providing.

If Facebook roll out end-to-end encryption, their ability to spot child sexual abuse will significantly reduce, as will the number of children we save from sexual abuse and the number of criminals we arrest on the back of their information.

Let me be clear: this would be tantamount to consciously turning a blind eye to child abuse choosing to look the other way.

A Meta spokesman said the social media giant expects to provide more information to law enforcement as the encryption is rolled out.

The overwhelming majority of Brits already rely on apps that use encryption to keep them safe from hackers, fraudsters, and criminals.

We dont think people want us reading their private messages so have spent the last five years developing robust safety measures to prevent, detect and combat abuse while maintaining online security.

We recently published an updated report setting out these measures, such as restricting people over 19 from messaging teens who dont follow them and using technology to identify and take action against malicious behaviour.

Story continues

As we roll out end-to-end encryption, we expect to continue providing more reports to law enforcement than our peers due to our industry leading work on keeping people safe.

Mr Biggar said there are ways of balancing privacy and access for law enforcement.

The NCA chief told the audience in Westminster: Despite the protestations of some, this does not need to be a binary choice.

There are ways of providing for strong encryption and privacy, and still protecting customers and enabling lawful access.

Ultimately, it appears to me that fundamental decisions on the balance between privacy and security are for democratically elected governments to make, not multinational corporations.

In his lecture, focusing on technology and law enforcement, Mr Biggar said the UK needs a step change for authorities to keep up with lawbreakers.

World-leading though we are in some areas, we need a step change if we are to deal effectively with the criminality we face today, let alone what we can see coming in the future, he said.

He went on: Elements of our response to the shift online have been world-leading, but the pace of technological change is accelerating, and we are not adopting it as quickly as criminals.

We are still too analogue in a digital age. We need to move further and we need to move faster, both in the NCA and law enforcement, and in Government and the broader system.

NCA chief Graeme Biggar said key pieces of legislation are from the 1990s when phones stored a kilobyte of data, while now they can hold a billion times more (Yui Mok/PA)

He said the NCA needs more specialist knowledge, which would be helped by raising pay and setting up an academy to boost technical expertise.

Digital intelligence collection and forensics need to be better developed, as well as ways to reveal the cloaked identities of criminals online and to track cryptocurrency, Mr Biggar said.

He also called on the Government to update laws, highlighting that, while the Online Safety Act has recently been passed, both the Computer Misuse Act and the Criminal Procedure and Investigations Act are from the 1990s.

The Criminal Procedure and Investigations Act was introduced when a phone might have a kilobyte of data on it. We now deal with phones that can store a terabyte a billion times more, the NCA chief said.

He warned that disclosure of evidence by prosecutors to defence teams risks becoming an overwhelming challenge because of the sheer amount of information involved.

Mr Biggar also highlighted slow international legal processes in dealing with serious crime networks that cross borders.

We have investigations where the suspect is in one country, using servers or sourcing drugs in another, to target victims in a third, laundering the money in a fourth and accruing assets in a fifth.

Technology enables much of this to happen or switch in an instant. The current processes for mutual legal assistance and international letters of request take months and sometimes years.

Government needs to work internationally to find solutions that are adaptable and flexible, whilst still protecting our principles.

Mr Biggar delivered the RUSI lecture as the NCA marks 10 years since it was established.

See more here:
Facebook end-to-end encryption like turning a blind eye to child abuse - Yahoo Finance UK

Read More..

Default Windows 11 feature slows SSDs up to 45%: How to fix it … – PCWorld

Microsofts BitLocker software encryption of for SSDs, which is activated by default in Windows 11 Pro, causes a massive reduction in the performance of storage drives. TomsHardware conducted extensive tests of the feature and discovered that the speed of SSDs can be reduced by up to 45 percent, depending on the application.

Thats because with software-based BitLocker encryption, the processor is constantly busy encrypting and decrypting the data on the SSD during all write and read processes, which has an impact on the performance of the system.

Many SSDs now support hardware-based encryption, in which all decryption and encryption processes are handled directly by the SSDs. Windows 11 Pro nevertheless activates BitLockers software-based encryption during installation without giving you the ability to prevent it.

Microsoft probably decided to do this because it does not have full control over the code for hardware-based encryption, as thats managed by the SSD manufacturers. A while back, there were incidents where vulnerabilities were discovered in SSD hardware encryption code that had to be fixed by the manufacturers. So Microsoft seems to prefer to rely on its own solution here.

Windows 11 Home is not affected because it does not support BitLocker encryption. Thats a shame, because Windows 11 wont be fully secure until everyone has BitLocker encryption though as this problem shows, the specifics matter.

Further reading: How to upgrade from Windows 11 Home to Pro (and why youd want to)

To find out if your SSDs are affected by the problem, open the Windows 11 Pro command line with admin rights and enter the command

manage-bde -status

This will start the BitLocker Drive Encryption: Configuration Tool, which analyses all the drives in your computer.

Under Conversion Status, you can find out whether the data on the SSD is encrypted. Under Encryption Method, Windows 11 Pro shows whether software encryption (XTS-AES) or hardware encryption (Hardware Encryption) is used.

If XTS-AES is displayed here, BitLocker software encryption is used. If Fully decrypted is displayed under Conversion status, BitLocker is switched off on the computer.

TomsHardwares tests show that users who use applications that put a lot of strain on the SSDs can expect a noticeable drop in SSD performance. Microsoft could provide a general remedy with a patch for Windows 11 Pro. It is not known whether such a patch is already in development.

If that bothers you, first ask yourself whether you needs BitLocker encryption for your full drive to begin with. This feature is especially useful for users who own a notebook provided by a company, are often on the road, and generally have higher odds that your laptop (and its sensitive data) could be stolen.

In such a case, the thief would not be able to access the data on the computer without knowing your Windows account credentials. On the other hand, it is precisely these users who are most likely to be affected by the SSD slowdown, because business admins often install Windows 11 with the default settings, and thus with the software BitLocker activated.

Michael Crider/IDG

If you are absolutely sure that the data on your SSD does not need to be backed up in encrypted form, then software BitLocker can be deactivated with the following command. To do this, you need to call up the command line with admin rights and enter:

manage-bde -off C:

The C: must be replaced by the drive letter of the encrypted drive if necessary. After restarting your computer, the change becomes active immediately.

It becomes more complicated if you want to switch from BitLocker software encryption to BitLocker hardware encryption under Windows 11 Pro. The first prerequisite is, of course, that the SSD in the computer supports this hardware encryption.

In the next step, however, a complete reinstallation of Windows 11 Pro is necessary. A few more things need to be taken into account. Detailed instructions on how to activate hardware encryption under Windows 11 Pro, using the Samsung 980 Pro as an example, can be found in this helpful blog post.

You dont necessarily need to encrypt your full drive, however, nor is BitLocker your only option. For more information, check out our guide on how to encrypt files in Windows.

And here you can find out how to switch from Windows 11 Home to Windows 11 Pro without any problems and why youd want to.

This article was translated from German to English and originally appeared on pcwelt.de. It originally published on October 23 but was updated with additional information.

Read more:
Default Windows 11 feature slows SSDs up to 45%: How to fix it ... - PCWorld

Read More..

From Albania to the Middle East: The Scarred Manticore is Listening … – Check Point Research

Key Findings

Check Point Research, in collaboration withSygnias Incident Response Team, has been tracking and responding to the activities ofScarred Manticore, an Iranian nation-state threat actor that primarily targets government and telecommunication sectors in the Middle East. Scarred Manticore, linked to the prolific Iranian actor OilRig (a.k.a APT34, EUROPIUM, Hazel Sandstorm), has persistently pursued high-profile organizations, leveraging access to systematically exfiltrate data using tailor-made tools.

In the latest campaign, the threat actor leveraged the LIONTAIL framework, a sophisticated set of custom loaders and memory resident shellcode payloads. LIONSTAILs implants utilize undocumented functionalities of the HTTP.sys driver to extract payloads from incoming HTTP traffic. Multiple observed variants of LIONTAIL-associated malware suggest Scarred Manticore generates a tailor-made implant for each compromised server, allowing the malicious activities to blend into and be undiscernible from legitimate network traffic.

We currently track this activity as Scarred Manticore, an Iranian threat actor that is most closely aligned withDEV-0861. Although the LIONTAIL framework itself appears to be unique and bears no clear code overlaps with any known malware family, other tools used in those attacks overlap with previously reported activities. Most notably, some of those were eventually linked back to historic OilRig or OilRig-affiliated clusters. However, we do not have sufficient data to properly attribute the Scarred Manticore to OilRig, even though we do believe theyre likely related.

The evolution in the tools and capabilities of Scarred Manticore demonstrates the progress the Iranian actors have undergone over the last few years. The techniques utilized in recent Scarred Manticore operations are notably more sophisticated compared to previous activities CPR has tied to Iran.

In this article, we provide a technical analysis of the latest tools and the evolution of Scarred Manticores activity over time. This report details our understanding of Scarred Manticore, most notably its novel malware framework LIONTAIL, but also provides an overview of other toolsets we believe are used by the same actor, some of which were publicly exposed in the past. This includes, but is not limited to, tools used in the intrusion into the Albanian government infrastructure, web shells observed in high-profile attacks in the Middle East, and recently reported WINTAPIX driver-based implants.

While we finalized this blog post, a technical analysis of part of this activity waspublishedby fellow researchers from Cisco Talos. While it overlaps with our findings to some extent, our report provides additional extended information, in-depth insights, and a broader retrospective regarding the threat actor behind this operation.

LIONTAIL is a malware framework that includes a set of custom shellcode loaders and memory resident shellcode payloads. One of its components is the LIONTAIL backdoor, written in C. It is a lightweight but rather sophisticated passive backdoor installed on Windows servers that enables attackers to execute commands remotely through HTTP requests. The backdoor sets up listeners for the list of URLs provided in its configuration and executes payloads from requests sent by attackers to those URLs.

The LIONTAIL backdoor components are the main implants utilized in the latest Scarred Manticore intrusions. Utilizing access from a publicly facing server, the threat actor chains a set of passive implants to access internal resources. The internal instances of the LIONTAIL backdoors weve seen so far either listen on HTTP(s), similar to the internet-facing instances, or in some cases use named pipes to facilitate remote code execution.

We observed 2 methods of backdoor installation on the compromised Windows servers: standalone executables, and DLLs loaded through search order hijacking by Windows services or legitimate processes.

When installed as a DLL, the malware exploits the absence of some DLLs on Windows Server OS distributions: the backdoor is dropped to the system folderC:windowssystem32aswlanapi.dllorwlbsctrl.dll. By default, neither of theseexist on Windows Server installations. Depending on the Windows Server version, the malicious DLL is then loaded either directly by other processes, such as Explorer.exe, or the threat actors enable specific services, disabled by default, that require those DLLs.

In the case ofwlbsctrl.dll, the DLL is loaded at the start of theIKE and AuthIP IPsec Keying Modulesservice. Forwlanapi.dll, the actors enableExtensible Authentication Protocol:

sc.exe config Eaphost start=autosc.exe start Eaphost

In instances where LIONTAIL is deployed as an executable, a noteworthy characteristic observed in some is the attempt to disguise the executable asCyvera Console, a component of Cortex XDR.

The malware starts by performing a one-byte XOR decryption of a structure containing the malware configuration, which is represented with the following structure:

The fieldlisten_urlsdefines particularURL prefixesto which the malware listens for incoming requests.

All of the samples URL lists include the http://+:80/Temporary_Listen_Addresses/URL prefix, a defaultWCF URL reservationthat allows any user to receive messages from this URL. Other samples include multiple URLs on ports 80, 443, and 444 (on Exchange servers) mimicking existing services, such as:https://+:443/autodiscover/autodiscovers/ https://+:443/ews/exchanges/ https://+:444/ews/ews/

Many LIONTAIL samples contain tailor-made configurations, which add multiple other custom URLs that match existing web folders on the compromised server. As the URLs for the existing folders are already taken by the actual IIS service, the generated payloads contain additional random dictionary words in the path. These ensure the malware communication blends into legitimate traffic, helping to make it more inconspicuous.

Thehostelement of all prefixes in the configuration consists of a single plus sign (+), a strong wildcard that matches all possible host names. A strong wildcard is useful when an application needs to serve requests addressed to one or more relative URLs, regardless of how those requests arrive on the machine or what site (host or IP address) they specify in their Host headers.

To understand how the malware configures listeners on those prefixes and how the approach changes with time, we pause for a short introduction to the Windows HTTP stack.

A port-sharing mechanism, which allows multiple HTTP services to share the same TCP port and IP address, was introduced in Windows Server 2003. This mechanism is encapsulated withinHTTP.sys, a kernel-mode driver that assumes the responsibility of processing HTTP requests, listens to incoming HTTP requests, and directs them to the relevant user-mode processes or services for further handling.

On top of the driver layer, Windows provides theHTTP Server API,a user-mode component that provides the interface for interacting with HTTP.sys. In addition, the Internet Information Services(IIS) under the hood relies on HTTP API to interact with the HTTP.sys driver. In a similar fashion, theHttpListenerclass within the .NET framework is a simple wrapper around the HTTP Server API.

The process of receiving and processing requests for specific URL prefixes by an application (or, in our case, malware) can be outlined as follows:

After extracting the configuration, the malware uses the same one-byte XOR to decrypt a shellcode responsible for establishing the C&C communication channel by listening to the provided URL prefixes list. While the concept of passive backdoors on web-facing Windows servers is not new and wasobservedin the wild hijacking the same Windows DLLwblsctrl.dllas early as 2019 (by Chinese-linkedOperation ShadowHammer), the LIONTAIL developers elevated their approach. Instead of using the HTTP API, the malware uses IOCTLs to interact directly with the underlying HTTP.sys driver. This approach is stealthier as it doesnt involve IIS or HTTP API, which are usually closely monitored by security solutions, but is not a straightforward task given that the IOCTLs for HTTP.sys are undocumented and require additional research efforts by the threat actors.

First, the shellcode registers the URL prefixes with HTTP.sys using the following IOCTLs:

After registering the URL prefixes, the backdoor initiates a loop responsible for handling the incoming requests. The loop continues until it gets the request from a URL equal to theend_stringprovided in the backdoors configuration.

The backdoor receives requests from HTTP.sys using 0x124036 UlReceiveHttpRequestIoctlIOCTL.

Depending on the version of the compromised server, the body of the request is received using 0x12403B UlReceiveEntityBodyIoctlor (if higher than 20348) 0x12403A UlReceiveEntityBodyFastIo. It is then base64-decoded and decrypted by XORing the whole data with the first byte of the data. This is a common method of encryption observed in multiple malware families, including but not limited to DEV-0861s web-deployedReverse proxy.

The decrypted payload has the following structure:

The malware creates a new thread and runs the shellcode in memory. For some reason, it uses shellcode_output and shellcode_output_sizein the request message as pointers to the respective data in memory.

To encrypt the response, the malware chooses a random byte, XOR-encodes the data using it as a key, prepends the key to the result, and then base64-encodes the entire result before sending it back to the C&C server using the IOCTL 0x12403F UlSendHttpResponseIoctl.

In addition to PE implant, Scarred Manticore uses a web shell-based version of the LIONTAIL shellcode loader. The web shell is obfuscated in a similar manner to other Scarred Manticore .NET payloads and web shells.

The web shell gets requests with 2 parameters:

Both parameters are encrypted the same way as other communication: XOR with the first byte followed by base64 encoding.

The structure of shellcodes and of arguments sent to the web shell-based shellcode loader is identical to those used in the LIONTAIL backdoor, which suggests that the artifacts observed are part of a bigger framework that allows the dynamic building of loaders and payloads depending on the actors access and needs.

During our research, we also found loaders that have a similar internal structure to the LIONTAIL samples. Instead of listening on URL prefixes, this version gets its payloads from a named pipe and likely is designated to be installed on internal servers with no access to the public web. The configuration of the malware is a bit different:

The main shellcode starts withconvertingthe string security descriptor"D:(A;;FA;;;WD)into a valid, functional security descriptor. As the string starts with D, it indicates a DACL (discretionary access control list)entry, which typically has the following format:entry_type:inheritance_flags(ACE_type; ACE_flags; rights; object_GUID; inherit_object_GUID; account_SID). In this case, the security descriptor allows (A) File All Access (FA) to everyone (WD).

The security descriptor is then used tocreatea named pipe based on the values provided in the configuration. In the samples we observed, the name of the pipe used is\.pipetest-pipe.

Its noteworthy that, unlike the HTTP version, the malware doesnt employ any more advanced techniques for connecting to the named pipe, reading from it, and writing to it. Instead, it relies on standardkernel32.dllAPIs such asCreateNamedPipe, andReadFileWriteFile.

The communication of named pipes-based LIONTAIL is identical to the HTTP version, with the same encryption mechanism and the same structure of the payload which runs as a shellcode in memory.

After the LIONTAIL loader decrypts the payload and its argument received from the attackers C&C server, it starts with parsing the argument. It is a structure that describes a type of payload for the shellcode to execute and it is built differently depending on the type of payload:

The argument for the API execution has the following structure:

To make things more complicated, Scarred Manticore wraps the final payload in nested shellcodes. For example, one of the shellcodes received from the attackers runs another almost identical shellcode, which in turn runs a final shellcode responsible for machine fingerprinting.

The data gathered by this payload is collected by running specific Windows APIs or enumerating the registry keys, and includes these components:

The final structure, which contains all the gathered information, also has a place for error codes for the threat actor to use to figure out why some of the APIs they use dont work as expected:

In addition to using LIONTAIL, Scarred Manticore was observed leveraging other custom components.

On some of the compromised exchange servers, the actors deployed LIONHEAD, a tiny web forwarder. LIONHEAD is also installed as a service using the same phantom DLL hijacking technique as LIONTAIL and utilizes similar mechanisms to forward the traffic directly to Exchange Web Services (EWS) endpoints.

LIONHEADs configuration is different from LIONTAIL:

The backdoor registers thelisten_urlsprefixes in the same way as LIONTAIL and listens for requests. For each request, the backdoor copies the content type, cookie, and body and forwards it to the/:specified in the configuration. Next, the backdoor gets a response fromforward_serverand sends it back to the URL that received the original request.

This forwarder might be used to bypass the restrictions on external connections to EWS, hide the real consumer of EWS data being external, and consequently conceal data exfiltration.

Scarred Manticore deploys multiple web shells, including those previouslyattributedindirectly to OilRig. Some of these web shells stand out due to their obfuscations, naming conventions and artifacts. The web shells retain class and method obfuscation and a similar string encryption algorithm (XOR with one byte, the key is derived from the first byte or from the first 2 bytes) to many other web shells and .NET-based tools used by Scarred Manticore in their attacks over the past few years.

One of those shells is a heavily obfuscated and slightly modified version of an open-source XML/XSL transform web shell,Xsl Exec Shell. This web shell also contains two obfuscated functions that return the string ~/1.aspx. These functions are never called and likely are remnants from other versions, as we observed them in tools used previously by Scarred Manticore, such as FOXSHELL, which is discussed later:

Based on our visibility into the latest wave of attacks that utilize LIONTAIL, the observed victims are located across the Middle East region, including Saudi Arabia, the United Arab Emirates, Jordan, Kuwait, Oman, Iraq, and Israel. The majority of the impacted entities belong togovernment,telecommunications, military, andfinancialsectors, as well as IT services providers. However, we also observed the infection on the Exchange servers belonging to a regional affiliate of a global non-profit humanitarian network.

The geographic region and the targeted profile are aligned with Iranian interests and in line with the typical victim profile that MOIS-affiliated clusters usually target in espionage operations.

Previously, DEV-0861, a cluster we believed aligns with Scarred Manticore, was publiclyexposedfor the initial access to and data exfiltration from the Albanian government networks, as well as email exfiltration from multiple organizations in the Middle Eastern countries such as Kuwait, Saudi Arabia, Turkey, UAE, and Jordan.

Since at least 2019, Scarred Manticore deployed unique tools on compromised Internet-facing Windows servers in the Middle East region. During these years, their toolset went through significant development. It began as open-source-based web-deployed proxies and over time evolved to become a diverse and powerful toolset that utilizes both custom-written and open-source components.

One of the earliest samples related to the threat actors activity is based on a web shell fromTunna, an open-source tool designed to tunnel any TCP communication over HTTP. The Tunna web shell allows to connect from the outside to any service on the remote host, including those that are blocked on the firewall, as all the external communication to the web shell is done via HTTP. The IP and the port of the remote host are sent to the web shell in the configuration stage, and in many cases, Tunna is mostly used to proxy RDP connections.

The web shell used by the threat actor has the internal versionTunna v1.1g(only version 1.1a is available on Github). The most significant change from the open-source version is the encryption of requests and responses by XORing the data with the pre-defined stringszEncryptionKeyand appending the constant stringK_SUFFIXat the end:

Over time, the code was refactored and lost its resemblance to Tunna. We track this and all further versions as FOXSHELL.

The biggest changes resulted from organizing multiple entities into classes using an objective-oriented approach. The following class structure persists in most of the FOXSHELL versions:

All the functionality responsible for encrypting the traffic moved to a separateEncryptionModuleclass. This class loads a .NET DLL embedded in a base64-encoded string inside the body of FOXSHELL and invokes itsencryptanddecryptmethods:

The embedded encryption modules name isXORO.dll, and its classEncryption.XOROimplements decrypt and encrypt methods the same way as the Tunna-based web shell, using the same hardcoded values:

All requests to the web shell are also encapsulated within a class calledPackage, which handles differentPackageTypes: Data, Config, OK, Dispose, or Error. The PackageType is defined by the first byte of the package, and depending on the type of Package, the web shell parses the package and applies the configuration (opens a new socket to the remote machine specified in the configuration and applies a new EncryptionDll if provided), or disposes of the existing socket, or proxies the connection if the package is type Data:

This version of the web shell is still unobfuscated, and its internal version is specified in the code:

The web shell also contains the default EncryptionDll embedded inside. The modules name isBase64.dll, and the encryption class, which is misspelled asBsae64, exposes the encrypt and decrypt methods. However, both are just simple base64 encoding:

Although this simple encoding could be done in the code of the web shell itself, the existence of other embedded DLLs, such asXORO.dll(described previously), and the ability to provide yet another EncryptionDll on the configuration stage, implies that the attackers prefer to control which specific type of encryption they want to use by default in certain environments.

Other changes in this version are the renaming of the PackageTypeConfigtoRDPconfig, andConfigPackagetoRDPConfigPackage, indicating the actors are focused on proxying RDP connections. The code of these classes remains the same:

Finally, another condition in the code handles the case of the web shell receiving a non-empty parameterWV-RESET,which calls a function to shut down the proxy socket and sends anOKresponse back to the attackers:

The versions that were described above, targeted entities in Middle Eastern countries, such as Saudi Arabia, Qatar, and the United Arab Emirates. This version, in addition to being leveraged against Middle Eastern governmental entities, was part of theattackagainst the Albanian government in May 2021. Through the exploitation of an Internet-facing Microsoft SharePoint server, the actors deployedClientBin.aspxon the compromised server to proxy external connections and thus facilitate lateral movement throughout the victims environment.

The details of the samples may vary but in all of them, the FOXHELL is compiled as DLL and embedded inside the base web shell in base64. The compiled DLL is loaded withSystem.Reflection.Assembly.Load, and then theProcessRequestmethod from it is invoked. The DLL is written in .NET and has the name patternApp_Web_.dll, which indicates an ASP.NET dynamically compiled DLL.

TheApp_Web*DLL is affected by the class and method obfuscation, and all the strings are encrypted with a combination of Base64, XOR with the first byte, and AES:

When the web shell is compiled into DLL, it contains the initialization stub, which ensures that the web shell listens on the correct URI. In this case, the initialization happens in the following piece of code:

Or, after deobfuscation:

This initialization sets the FOXSHELL to listen to the requests on the relative path~/1.aspx, which we observed as an unused artifact in other web shells related to attacks involving LIONTAIL.

Internally, the DLL has the same 1.5 version of FOXSHELL, which includes theWV-RESETparameter to stop the proxy and the same defaultBsae64Encryption DLL as in previous versions.

Since mid-2020, in addition to the FOXSHELL as a means to proxy the traffic, we also observed a rather sophisticated standalone passive backdoor, written in .NET and meant to be deployed on IIS servers. It is obfuscated with similar techniques as FOXSHELL and masquerades asSystem.Drawing.Design.dll. The SDD backdoor was previouslyanalyzedby a Saudi researcher but was never attributed to a specific threat actor or campaign.

C&C Communication

The SSD backdoor sets up C&C communication through an HTTP listener on the infected machine. It is achieved using two classes:

ServerManager is used to extract the sites hosted by the IIS server and build the HashSet of URL prefixes to listen on:

In this specific case, the only relative URI configured in the malware sample is Temporary_Listen_Addresses. The malware then uses the HttpListener class to start listening on the specified URL prefixes:

C&C command execution

The backdoor has several capabilities: execute commands usingcmd.exe, upload and download files, execute processes with specified arguments, and run additional .NET assemblies.

First, if the POST request body contains data, the malware parses it and handles the message as one of the 4 commands it supports. Otherwise, if the request contains a parameterVet, the malware simply decodes its value from base64 and executes it withcmd /c. If none of these is true, then the malware handles the heartbeat mechanism: if the request URL contains the stringwOxhuoSBgpGcnLQZxipain lowercase, then the malware sends backUsEPTIkCRUwarKZfRnyjcG13DFAalong with a200 OKresponse.

The data from the POST request is encrypted using Base64 and simple XOR-based encryption:

After decrypting the data of the message, the malware parses it according to the following order:

The possible commands, as named by the threat actors, include:

The response data is built the same way as the request (returns command type, command name, and output) and then encrypted with the same XOR-based algorithm as the request.

Recently, Fortinetrevealeda wave of attacks against Middle Eastern targets (mostly Saudi Arabia, but also Jordan, Qatar, and the United Arab Emirates) that involve kernel mode drivers that the researchers named WINTAPIX. Although the exact infection chain to install the drivers is unknown, they target only IIS servers as they use the IIS ServerManager object. The high-level execution flow is the following:

The final payload is obfuscated with a commercial obfuscator in addition to already familiar class, method, and string obfuscations, and it combines the functionality of the SDD backdoor and FOXSHELL proxy. To achieve both, it listens on two sets of URL prefixes, using ServerManager and HTTPListener similarly to the SSD backdoor.

The FOXSHELL version used within the driver payload is set to1.7. The main enhancement introduced in this version is the Event Log bypass using a known technique of suspending EventLog Service threads. The default EncryptionDll hardcoded in the driver is the same Bsae64.dll, and the core proxy structure remains largely unaltered when compared to FOXSHELL version 1.5.

As an extensive analysis of the WINTAPIX driver and its versionSRVNET2was already provided, here we only highlight the main overlaps between those and other discussed tools that strengthen their affiliation:

LIONTAIL framework components share similar obfuscation and string artifacts with FOXSHELL, SDD backdoor, and WINTAPIX drivers. Currently, we are not aware of any other threat actors utilizing these tools, and we attribute them all to Scarred Manticore based on multiple code overlaps and shared victimology.

For the last few years, Scarred Manticore has been observed carrying out multiple stealthy operations in Middle Eastern countries, including gaining access to telecommunications and government organizations in the region, and maintaining and leveraging this access for months to systematically exfiltrate data from the victims systems. Examining the history of their activities, it becomes evident how far the threat actor has come in improving their attacks and enhancing their approach which relies on passive implants.

While LIONTAIL represents a logical progression in the evolution of FOXSHELL and still bears some distinctive characteristics that allow us to attribute attacks involving LIONTAIL to Scarred Manticore, it stands out from other observed variants. The LIONTAIL framework does not use common, usually monitored methods for implementing listeners: it no longer depends on Internet Information Services (IIS), its modules, or any other options and libraries provided by the .NET framework to manage IIS programmatically. Instead, it utilizes the lowest level of Windows HTTP Stack by interacting directly with the HTTP.sys driver. In addition, it apparently allows the threat actors to customize the implants, their configuration parameters, and loaders file delivery type. All those have enhanced the stealth ability of the implants, enabling them to evade detection for an extended period.

We expect that Scarred Manticore operations will persist and may spread into other regions as per Iranian long-term interests. While most of the recent activity of Scarred Manticore is primarily focused on maintaining covert access and data extraction, the troubling example of the attack on the Albanian government networks serves as a reminder that nation-state actors may collaborate and share access with their counterparts in intelligence agencies.

Check Point Customers remain protected against attacks detailed in this report, while using IPS, Check PointHarmony Endpoint and Threat Emulation.

IPS:

Backdoor.WIN32.Liontail.A/B

Threat Emulation:

APT.Wins.Liontail.C/D

See original here:
From Albania to the Middle East: The Scarred Manticore is Listening ... - Check Point Research

Read More..

iOS 17.2Amazing New iPhone Features And Fixes Suddenly Revealed – Forbes

17.2 is coming soon, including some brilliant new features and fixing several pesky bugs.SOPA Images/LightRocket via Getty Images

Apples iOS 17.1 has only just arrived, but iOS 17.2 is coming soon, and it includes some brilliant new features and fixes several pesky bugs. Among the new features in iOS 17.2 is a very cool update to iMessage, which will be a huge boost to iPhone security.

First unveiled in December last year as part of new iCloud security features and finally appearing in the iOS 17.2 beta now, iMessage Contact Key verification has been a long time coming.

The new iMessage feature in iOS 17.2 prevents attackers from listening to or reading your conversations if theyve managed to breach cloud servers.

If you have Contact Key Verification enabled in iOS 17.2, you will receive a notification if someone is able to eavesdrop on your conversations. As an extra layer of security, the new iPhone feature also allows you to use a Contact Verification Code on FaceTime or in personjust to make sure the person you are speaking to is who they say they are.

Contact Key Verification in iOS 17.2 is designed for people who could be targets for attacks utilizing iPhone malware called spywarewhich can allow adversaries to see everything you write and hear anything you say.

Over the last year or so, Apple has been busy releasing new iPhone features to protect users from spyware attacks as well as patching numerous security holes that could be used in so-called zero click attacks.

However, while it is a security feature akin to the likes of Apples Lockdown setting, Contact Key Verification doesnt reduce your iPhones functionality like Lockdown Mode does, so there is no security-functionality trade off. That makes it more accessible to all security-conscious iPhone users.

With this in mind, Jake Moore, global cybersecurity advisor at ESET, has praised the new iPhone feature. Contact Key Verification works seamlessly without any direct action needed, making it another security-focused feature working tirelessly in the background. Having the ability to use this new iOS 17.2 feature in strict security situations gives users that vital piece of mind that they are conversing with who they think they are.

As AI steps up, offering quality voice cloning techniques and with relatively good deep fakes in the pipeline, this sort of protection is imperative, Moore says.

Apple has described how Contact Key Verification Works in iOS 17.2 in a new technical blog.

Contact Key Verification is designed to detect sophisticated attacks against iMessage servers and allow users to verify that theyre messaging only with whom they intend, Apple says.

The iPhone maker explains how iMessage Contact Key Verification uses a mechanism called Key Transparency. This builds on the ideas of Certificate Transparencyessentially a security standard for monitoring and auditing digital certificates.

Yet as Apple explains, Contact Key Verification uses a verifiable log-backed map data structure, which can provide cryptographic proofs of inclusion and be audited for consistency over time.

These properties allow for higher scalability and better user privacy, Apple says.

Its certainly an exciting new feature, and when it debuts in iOS 17.2, it can be found in your iPhones Settings > your name > Contact Key Verification, where you can toggle it to on. This applies to Beta users as of now.

So when will iOS 17.2 arrive? It looks like the update will be released around November or December, including other new features such as the Journal app, new AirPlay settings for the Apple Vision Pro headset, collaborative Apple music playlists, new weather widgets and enhancements to the Contacts app.

According to Apple-focused site 9to5Mac, iOS 17.2 will also fix the Wi-Fi connectivity issues that have been plaguing some iPhone users since updating to iOS 17.

Its also likely iOS 17.2 will come with a bunch of security fixes, so keep an eye on my Forbes page for updates.

Kate is an award winning and widely-recognized cybersecurity and privacy journalist with well over a decades experience covering the issues that matter to users, businesses and governments. In addition to Forbes, her work can be found in publications including Wired, The Guardian, The Observer, The Times and The Economist.

With a focus on smartphone security including Apple iOS security and privacy, application security, cyberwarfare and data misuse by the big tech firms, Kate reports and analyzes breaking cybersecurity and privacy stories and trending topics.

She is also a recognized industry commentator and has appeared on radio shows including the WVON Morning Show with Attorney Ernest B. Fenton, BBC Radio 5 Live and podcasts such as the Guardians Today in Focus. Kate can be reached atkate.oflaherty@techjournalist.co.uk.

The rest is here:
iOS 17.2Amazing New iPhone Features And Fixes Suddenly Revealed - Forbes

Read More..

Application Hosting Market to Surpass USD 178.1 Billion by 2030 on Account of Rising Demand for Mobile Applications and Cloud Computing Advancements |…

SNS Insider pvt ltd

Based on SNS Insiders research, the application hosting market continues to thrive, driven by technological innovations, security concerns, and the evolving needs of businesses and consumers.

Pune, Oct. 31, 2023 (GLOBE NEWSWIRE) --

The SNS Insider report states that the Application Hosting Market was valued at USD 67.0 billion in 2022 and is projected to reach USD 178.1 billion by 2030, with a compound annual growth rate (CAGR) of 13% anticipated during the forecast period from 2023 to 2030.

Market Overview

Application hosting is the practice of deploying and operating software applications on remote servers, making them accessible to users over the internet. Instead of installing and running applications locally on individual devices, users can access these applications via a web browser. The hosting service provider is responsible for maintaining the servers, ensuring uptime, and handling technical aspects, allowing businesses and individuals to focus on using the applications rather than managing the underlying infrastructure.

Market Analysis

The proliferation of smartphones and the increasing reliance on mobile apps across various industries have significantly boosted the demand for application hosting services. As businesses develop mobile applications to enhance customer engagement and expand their reach, reliable hosting solutions become crucial. Application hosting providers offer optimized infrastructure to ensure seamless performance and accessibility of these mobile apps, catering to the growing market needs. In an era where data breaches and cyber threats are prevalent, businesses prioritize the security and compliance aspects of application hosting. Hosting providers are investing heavily in robust security measures, including encryption protocols, multi-factor authentication, and regular security audits. Moreover, adherence to industry-specific regulations and compliance standards ensures that businesses can trust their hosting partners with sensitive data, thereby fueling application hosting market growth.

Story continues

Get a Sample Report of Application Hosting Market@ https://www.snsinsider.com/sample-request/3365

Key Company Profiles Listed in this Report are:

IBM

Google

Rackspace

Microsoft

Liquid Web

Sungard AS

DXC

Apprenda

Navisite

GoDaddy & Other Players

Application Hosting Market Report Scope:

Report Attributes

Details

Market Size in 2022

US$ 67.0 Bn

Market Size by 2030

US$ 178.1 Bn

CAGR

CAGR of 13% From 2023 to 2030

Base Year

2022

Forecast Period

2023-2030

Report Scope & Coverage

Market Size, Segments Analysis, CompetitiveLandscape, Regional Analysis, DROC & SWOT Analysis, Forecast Outlook

Key Regional Coverage

By Hosting Type (Managed, Cloud, Colocation) By Service Type (Application Monitoring, Application Programming Interface Management, Infrastructure Services, Data Based Administration, Backup, Application Security) By Application (Mobile Based, Web Based) By Organization Size (Large Enterprise, Small and Medium Size Enterprise) By Industry (BFSI, Retail and Ecommerce, Healthcare, Media and Entertainment, Energy and Utilities, Telecommunications and IT, Manufacturing)

Key Takeaway from Application Hosting Market Study

The application monitoring segment stands out as a crucial segment, dominating the market with its advanced technologies and innovative solutions. This segment is marked by its ability to monitor applications in real-time, ensuring seamless performance, optimal user experience, and robust security protocols.

The large enterprise segment stands as a powerhouse, driving innovation and shaping the industry's future. Large enterprises, characterized by their extensive resources, complex infrastructures, and diverse customer bases, are at the forefront of adopting advanced application hosting solutions. Their unique requirements and substantial investments fuel the growth of this segment, making it a dominant force in the application hosting market.

Recent Developments

HostPapa has recently announced its acquisition of Cloud 9 Hosting. HostPapa's reputation for reliability and Cloud 9 Hosting's expertise in advanced hosting solutions seem to complement each other seamlessly, promising customers a host of benefits.

Kinsta, a leading player in the web hosting industry, has recently unveiled its innovative Application Hosting and Database Hosting services. Kinsta's new Application Hosting services are designed to cater to the dynamic needs of modern applications.

Do you have any specific queries or need any customization research on Application Hosting Market, Enquiry Now@ https://www.snsinsider.com/enquiry/3365

Market Dynamics Analysis

As enterprises increasingly migrate their operations to cloud-based applications, the demand for reliable and scalable hosting solutions surges. Moreover, the growing trend of remote workforces amplifies this need, pushing organizations to invest in hosting services that ensure seamless access and data security. Additionally, the rapid advancements in technologies such as edge computing and IoT devices are compelling businesses to seek hosting solutions capable of handling complex and data-intensive applications. However, amidst these opportunities, there exist significant challenges and restraints. Security concerns loom large as cyber threats become more sophisticated, posing a substantial threat to hosted applications and sensitive data. Compliance with regulations and standards also presents a challenge, especially for industries with strict data governance requirements. Furthermore, the fast-paced evolution of hosting technologies creates a challenge for businesses to keep up, requiring constant adaptation and skill development. In this dynamic application hosting market, the competition among hosting service providers intensifies, making it essential for companies to differentiate their offerings and provide unparalleled value to their clients.

Application Hosting Market Key Segmentation:

By Hosting Type

By Service Type

Application Monitoring

Application Programming Interface Management

Infrastructure Services

Data Based Administration

Backup, Application Security

By Application

By Organization Size

By Industry

Key Regional Developments

North America stands tall as the hub of technological innovation, fostering a highly developed application hosting market. The presence of major tech giants and a robust IT infrastructure drive the market growth. Europe embraces a diverse landscape of hosting solutions tailored to meet the unique needs of various industries. The market in Europe is characterized by a mix of cloud, dedicated, and shared hosting services. The Asia-Pacific region is witnessing unprecedented growth in digital transformation, propelling the market to new heights. Countries like China, India, and Japan are experiencing a surge in e-commerce, mobile apps, and online services, leading to an increased demand for hosting services.

Impact of Recession on Application Hosting Market Growth

The recession has accelerated the shift from traditional in-house hosting to manage hosting services. With managed hosting, businesses can outsource their hosting needs to specialized providers, reducing the burden on their IT departments and cutting operational costs. This trend is likely to continue as companies recognize the value of expert management and support, especially when facing economic uncertainties. Despite the challenges posed by the recession, the application hosting market is witnessing a surge in innovation. Hosting providers are investing in research and development to offer more efficient, secure, and user-friendly hosting solutions.

Buy a Single-User PDF of Application Hosting Market Report 2023-2030@ https://www.snsinsider.com/checkout/3365

Table of Contents

1. Introduction

2. Research Methodology

3. Market Dynamics

4. Impact Analysis

5. Value Chain Analysis

6. Porters 5 forces model

7. PEST Analysis

8. Application Hosting Market Segmentation, by Hosting Type

9. Application Hosting Market Segmentation, by Service Type

10. Application Hosting Market Segmentation, by Application

11. Application Hosting Market Segmentation, by Organization Size

12. Application Hosting Market Segmentation, By Industry

13. Regional Analysis

14. Company Profile

15. Competitive Landscape

16. USE Cases and Best Practices

17. Conclusion

Access Complete Report Details@ https://www.snsinsider.com/reports/application-hosting-market-3365

[For more information or need any customization research mail us at info@snsinsider.com]

About Us:

SNS Insider is one of the leading market research and consulting agencies that dominates the market research industry globally. Our company's aim is to give clients the knowledge they require in order to function in changing circumstances. In order to give you current, accurate market data, consumer insights, and opinions so that you can make decisions with confidence, we employ a variety of techniques, including surveys, video talks, and focus groups around the world.

Read More ICT Market Research Report

Read more here:
Application Hosting Market to Surpass USD 178.1 Billion by 2030 on Account of Rising Demand for Mobile Applications and Cloud Computing Advancements |...

Read More..

Ransomware Readiness Assessments: One Size Doesn’t Fit All – Dark Reading

Ransomware attacks can be devastating for organizations, causing significant damage to operations and reputations. Therefore, it's crucial to prepare for such an eventuality with a comprehensive ransomware response plan. However, it's also essential to understand that ransomware readiness assessments aren't a one-size-fits-all solution.

Let's explore why a tailored approach to ransomware readiness assessments is necessary and highlight some scenarios you may encounter during a ransomware attack.

The impact and severity of a ransomware attack can vary depending on the attacker's objectives, the organization's security posture, and other factors. Therefore, a comprehensive response plan must be tailored to the specific circumstances of different types of impacts from an attack.

For example, a ransomware attack may impact servers only within a particular geographic region, cloud environment, or data center. Alternatively, the attack may affect authentication of every user due to compromised Active Directory servers. Or you may not know the viability of backups, or the threat actor may provide a decryption tool.

Preparing for different scenarios requires a thorough ransomware readiness assessment to better understand the current maturity of response and to develop or improve an incident-response plan that considers each potential scenario's unique characteristics. There is definitely value in identifying and resolving what keeps the business up at night and hyperfocusing on that in the assessment's first pass. For instance, prioritizing backup immutability can be a critical step in ensuring the organization's resilience against ransomware attacks. Your assessment could focus solely on immutability or disaster-recovery strategies.

Here are a few questions that can help you think through your ransomware readiness preparations:

If you obtain a decryption tool from the threat actor, do you have a plan in place to safely and effectively decrypt servers?

To prepare for the various scenarios that can arise during a ransomware attack, you can hold workshops on topics such as emergency implementation of containment measures, backup tooling and configurations, critical application assessment, Active Directory and network architecture, coordination processes, and surge resourcing.

Workshops on emergency server, end-user, network, and backup system containment help identify the steps required to contain an attack, minimize malware spread, and isolate affected systems.

Backup tooling and configuration workshops help ensure you have backups available and accessible during a ransomware attack. Identify and address any risks, such as privileged credential misuse, and establish backup restoration times sufficient to recover critical systems.

Assessing critical applications and executive user backup capabilities is another essential workshop topic. It allows you to identify your most critical systems and institute adequate backup capabilities. Addressing any risks identified during the assessment enables you to recover critical applications in the event of an attack.

Active Directory and network architecture workshops are necessary to understand the lateral movement that may occur during a ransomware attack. This knowledge can help minimize the severity of an attack and limit the attacker's ability to move laterally within the network.

Workshops on coordination processes help organizations stay aligned while executing recovery operations. These workshops bring together key technical engineering teams, such as server admins, backup system admins, security teams, outsourced IT providers, and third-party service providers, to make recovery efforts coordinated, efficient, and effective.

Workshops on surge resourcing help you obtain access to the necessary resources to restore servers, build new servers, install and validate apps, provide help desk support, and so on. Identifying potential surge resourcing scenarios in advance can help you respond effectively during a ransomware attack.

Overall, conducting workshops on these topics is critical to help organizations prepare to respond to a ransomware attack. These workshops can help you identify your organization's strengths and weaknesses in terms of readiness and create a response plan that considers your unique circumstances.

Ransomware attacks are a significant threat to organizations, and their impact and severity can vary. Therefore, it's wise to develop a comprehensive ransomware response plan for the specific circumstances of each type of attack. By conducting tailored ransomware readiness assessments and workshops, you can develop a comprehensive response plan that minimizes damage and restores operations quickly.

See the article here:
Ransomware Readiness Assessments: One Size Doesn't Fit All - Dark Reading

Read More..

How to Become a Security Engineer – Dice Insights

A security engineer ensures that an organizations software, networks, hardware, and data are safe from intrusion and theft. Lets first look at the details of what a security engineer does and the skills needed, and then what training and career paths look like.

Security engineers ensure the network and IT engineers are using best security practices, such as keeping firmware and device software up-to-date with the latest security patches and minimizing whats known as an attack surface. For instance, when dealing with software applications that require connectivity to a database server, it's essential to decrease the attack surface by limiting that database servers unnecessary exposure to the internet.

Companies that build their own software also need security engineers to ensure software is secure as its being built; the security engineer will work with the developers on best practices to harden the software against potential attacks. This includes using proper password techniques, as well as ensuring the software doesnt inadvertently provide an intruder with access via backdoors.

Security engineers work full-time. This is not a job that an application developer does a little bit on the side. A security engineer needs to devote his or her entire work to security, becoming an expert in its impact on their company and industry. An organization shouldnt simply trust its security requirements to application developers or project managers who know a little bit of security. They need either an expert on staff full time, or a part-time consultant from a firm that hires full-time security engineers.

Security engineers help test existing systems for vulnerabilities, as well as advise the IT team as theyre building such systems. Here are some skills needed for that:

Penetration testing: This refers to the task of intentionally breaking into a system from the outside. Security engineers typically have a set of software tools that assist in this. The tools will attempt to break into the software through multiple means, including using different software ports. Some tools are run manually by the security engineer; other tools the security engineer must install and configure to run automatically on a regular basis.

Vulnerability and security assessment: Once penetration testing is complete, the security engineer will put together an assessment showing where all the problems are, and what needs to be done to correct the problems.

Intrusion detection: Security engineers install software that detects an active intrusion and immediately notifies the security engineers and other people in the organization, and possibly even the regular security staff or even police. (Note that this could mean being awakened in the night!)

Setting up new systems securely: In addition to testing existing systems, security engineers will help the IT team build networks that are secure. The security engineer meets with the IT team before the network is built and advises them on the steps to build a secure network, the best software and devices to use, and the best way to configure everything. The security engineer will also work with them as the network is being built, doing penetration testing early on to catch problems before the system goes live. After going live, the security engineer will continue doing penetration tests on a regular basis afterwards.

Security policies: Security engineers will help the IT team put together policies to be enforced, such as lists of the only software allowed to be installed on computers; lists of software thats blacklisted; rules on password management, and so on. They will also likely train employees on how to keep their passwords safe and how to not fall for phishing scams.

Compliance: Companies that work with certain organizations such as government agencies typically need to meet regulatory compliance. The security engineer is the one who needs to understand such regulations, how to implement them correctly, and how to report that the system is compliant.

Assisting application developers: For companies that build software, security engineers work in a specialized field called application security engineer, whereby they help the software developers follow best security practices. This requires skills in addition to the above, such as:

There are some steps to landing the first job:

Training. Training is vital. While some IT professions you can learn on your own, security requires as much training as you can stand to get. The reason is liability. Organizations trust the people they hire. An organization can usually survive if their software crashes and restarts. There might be some annoyed users, but if no data is lost, theres likely little financial liability.

Security engineers, on the other hand, need to ensure that intruders wont break in and steal millions of customer records; such an intrusion can result in the company getting sued for tens of millions of dollars or even more. Theres a high risk in hiring the right security engineer.

If you want a recruiter or hiring manager to be totally comfortable with the idea of you as a security engineer, it helps to have a collection of courses, certifications, and degrees on your resume and other application materials. If you already have a bachelors degree in a related field such as computer science, another option is to go back and get a masters degree in security.

People networking. As with most jobs these days, its important to grow your network. Large corporations will typically hire teams of security engineers. A software development firm might hire just one, compared to dozens of software developers. And security firms will typically be hiring multiple people. That means finding these companies, and ideally, meeting people who work there who can get your resume to the top of the list. You can meet people through job networking sites such as LinkedIn, as well as by attending conferences and meetups.

But remember, because competition is tight, youll need to be ready to prove yourself, both with your certification and your skillset. Plan to be the best you can and shine above the others.

As with many tech careers, there are junior, mid-level, and senior level security engineers. In large companies and security consulting firms that hire multiple security engineers, you would be starting out at a junior level working under people with years of experience who can help teach you additional skills beyond your training.

Medium-sized companies that have an opening for one security engineer are likely to go with somebody with more experience than a junior level. When you reach such a position, you would have a great deal of autonomy.

Senior engineers at a large corporation or security firm might not be doing so much hands-on work and might be managing teams of security engineers. Or as you advance in your career, instead of managing, you can become more specialized. You might focus on only cloud security, network security, or the application security we already mentioned.

And as you advance, plan to keep training and learning through your entire career. With every new version of operating systems and software, you need to update your skills to know the new features and security risks of those features. You also need to learn about new methods of attacks and intrusion and how to prevent them, and what to do if an intrusion happens.

Note finally that some security engineers start out as software developers. Such people are in demand as they can take on the job of security application engineer. But again, since security is a full-time job (with very solid pay), this is a full career change, not just a side gig for an application developer.

Security engineering is a difficult field and requires continual training and certification updates. But it can be exciting and rewarding. Plan to work hard, and soon youll find yourself getting your first position.

More here:
How to Become a Security Engineer - Dice Insights

Read More..

Q3 2023 cloud results: AI investments drive up revenue and CapEx – DatacenterDynamics

Growth across the board, some more than others

Amazon Web Services (AWS), Microsoft, and Google have all posted their Q3 results for 2023.

AWS saw a strong quarter with double-digital year-on-year sales growth, with sales and income for the unit also jumping more than $1 billion from Q2.

Microsoft reported higher-than-expected AI consumption, driving up Azure results.

Though it posted consecutive profits, Googles operating income for Q3 was down, despite revenue being up.

Wikimedia Commons

AWS segment sales increased 12 percent year-over-year to $23.1 billion. Operating income was $7 billion, compared with operating income of $5.4 billion in the third quarter of 2022.

Q2 sales were $22.1bn, while operating income was $5.4 billion.

We had a strong third quarter as our cost to serve and speed of delivery in our Stores business took another step forward, our AWS growth continued to stabilize, our Advertising revenue grew robustly, and overall operating income and free cash flow rose significantly, said Andy Jassy, Amazon CEO. The AWS team continues to innovate and deliver at a rapid clip, particularly in generative AI, where the combination of our custom AI chips, Amazon Bedrock being the easiest and most flexible way to build and deploy generative AI applications.

Overall, the wider company saw Net sales increase 13 percent to $143.1 billion in the third quarter; Operating income increased to $11.2 billion, and Net income increased to $9.9 billion. AWS makes up 16 percent of the company's net sales.

During the earnings call, CEO Jassy said the customer reaction to its generative AI Bedrock service had been very positive and its launch into general availability had buoyed that further.

He said the GenAI opportunity could equate to tens of billions of dollars of revenue for the company over the next several years.

CapEx investments were $50 billion for the trailing 12-month period ended September 30, down from $60 billion in the comparable prior year period. The company said lower fulfillment and transportation CapEx would be partially offset by increased infrastructure CapEx to support AWS, including additional investments related to generative AI and large language model efforts.

Brian Olsavsky said AWS margin improvements were partly down to headcount reductions in Q2 and also continued slowness in hiring.

There's been also a lot of cost control in non-people categories, things like infrastructure costs and also discretionary costs, he said. Natural gas prices and other energy costs have come down a bit in Q3 as well.

For Q3, Microsofts Revenue in the Intelligent Cloud unit which includes Azure was $24.3 billion and increased 19 percent year on year. The company said server products and cloud services revenue increased 21 percent; Azure and other cloud services revenue grew 29 percent and 28 percent.

For Q2 2023, Microsofts Intelligent Cloud unit posted revenue of $24 billion.

For the wider company, quarterly revenue was $56.5 billion (up 12 percent), while operating income was $26.9bn and net income was $22.3bn.

Satya Nadella, chairman and chief executive officer of Microsoft, said: "We are rapidly infusing AI across every layer of the tech stack and for every role and business process to drive productivity gains for our customers.

Microsofts capital expenditures, including finance leases, were $11.2 billion for the quarter to support cloud demand, including investments to scale AI infrastructure.

In the earnings call, CFO Amy Hood said higher-than-expected AI consumption contributed to revenue growth in Azure, but Microsoft Clouds slight margin gains in Azure were partially offset by the impact of scaling AI infrastructure to meet growing demand.

She said growth was ahead of expectations primarily driven by increased GPU capacity and better-than-expected GPU utilization of AI services, and on-premises server business revenues increased 2 percent, ahead of expectations and driven primarily by demand in advance of Windows Server 2012 end of support.

Google Cloud reported Q3 2023 revenues of $8.41 billion. This was up from Q3 2022s $6.86bn, and Q2 2023s $8.03bn.

Operating income for Google Cloud this quarter was $266 million, up from the previous years $440m loss, but down on Q2s $395m profit.

The wider company announced revenues of $76.69 billion, operating income of $21.34bn, and a net income of $19.69bn.

Sundar Pichai, CEO, said: Im pleased with our financial results and our product momentum this quarter, with AI-driven innovations across Search, YouTube, Cloud, our Pixel devices, and more. Were continuing to focus on making AI more helpful for everyone; theres exciting progress and lots more to come.

In the results, Google said adjusting the estimated useful life of servers from four years to six years and the estimated useful life of certain network equipment from five years to six years has resulted in a depreciation expense reduction of $977 million and $2.9 billion respectively, and an increase in net income of $761 million and $2.3 billion for the three and nine months ended September 30, 2023.

Capital expenditures were $8.1 billion for the three months ended September 30, 2023. Company CFO Ruth Porat said this was driven overwhelmingly by investment in technical infrastructure, with the largest component for servers, followed by data centers, reflecting a meaningful increase in investments in AI compute.

We do continue to expect elevated levels of investment in our technical infrastructure. It will be increasing in the fourth quarter, she said. We will continue to grow CapEx in 2024.

Data from Synergy Research Group released this week shows that Q3 enterprise spending on cloud infrastructure services was over $68 billion worldwide, up by $10.5 billion from the third quarter of last year.

"The current economic and political climate has crimped some growth in cloud spending, but there is clear evidence that generative AI technology and services are starting to help overcome those barriers," the company said.

"While the law of large numbers continues to exert downward pressure on cloud market growth rates, AI is giving the market an added boost. Helped by AI, there are signs that many enterprises are through their period of belt-tightening and of optimizing rather than growing their cloud operations. AI is helping to open up a wide range of new cloud workloads."

Read more:
Q3 2023 cloud results: AI investments drive up revenue and CapEx - DatacenterDynamics

Read More..

Are cloud computing stocks going to take off in 2024? – The Armchair Trader

There is a whiff of recovery in the stock markets at least in the US, and it is time to look for stocks that have the potential to outperform the market going into next year.

High on that list are tech stocks. They have been through a few waves of selling this year but their underlying growth potential is still strong. Precisely because of their recent weakness now may be a good time to look at them again.

At the Armchair Trader we particularly like the prospect for cloud computing and cybersecurity companies, two parts of the tech universe that will be in high demand even when companies or retail buyers try to reign in their spending.

The BVP Nasdaq Emerging Cloud Index has gained over 11% since the start of the year and increased in value by almost 50% over the last five years. Compare this with a year-to-date increase of 2.12% and a 5-year rally of 30% in the DJIA and the case speaks for itself.

The value of the cloud computing market reached $405 billion in 2022 and is expected to mushroom to $1.46 trillion over the next five years.

There are good reasons for it. Cloud computing offers significant cost advantages over using physical infrastructure such as servers and data centres and this is more so the case in the post-COVID hybrid work environment. Cloud computing services companies maintain their high profitability and margins because their services are relatively easy to scale, they are very flexible and increasingly indispensable. Profit margins are high, and providers continue to benefit from economies of scale.

This is an exceptionally dynamic field where technological innovation, such as the development of advanced AI capabilities, edge computing, or hybrid cloud solutions, can significantly impact a companys competitive advantage.

Apart from the biggest players such as Amazon [NASDAQ:AMZN], the industrys first mover and market share leader, and Google parent company Alphabet [NASDAQ:GOOGL] there is whole host of smaller and medium sized companies worth a look.

One of them is US-Dutch company Elastic NV [NYSE:ESTC], a search company that builds self-managed and software offerings for search, logging and analytics use cases. It recently released strong Q1 earnings which featured both stable growth rates and high net expansion rates and forecast a significant increase in year-on-year profitability.

Elastic NVs valuation is still only moderate, even after a share price increase of 40% year-to-date to 70.87. Several forecasters expect the average Elastic NV share price to increase to at least 84 over the next 12 months with some optimistic views reaching as high as 108.

Another prospect is cybersecurity firm Zscaler [NASDAQ:ZS]. The ever more widespread use of AI has also introduced new security issues in the form of AI-enabled cybersecurity attacks and companies are increasing their spending in order to fend off such attacks.

Zscaler has reported revenue of $1.62 billion for the full year 2023, a 48% increase y-o-y and is expanding its product portfolio to cover the whole cybersecurity market. Year-to-date Zscaler share price increased 42%, the stock is up 287% over the last five years.

Also on the radar is Uipath [NYSE:PATH], a company which was founded in Romania but has since become a global software player with headquarters in New York. The company builds platforms that provide what in the past would have been called autopilots technologies designed to carry out definable, repeatable and manageable workplace tasks from basic to increasingly more complex tasks. UiPaths share price is up nearly 40% on the year, trading at 17.07.

Go here to see the original:
Are cloud computing stocks going to take off in 2024? - The Armchair Trader

Read More..