Normal view

There are new articles available, click to refresh the page.
Today — 18 May 2024Main stream

Emilia Perez review – Jacques Audiard’s gangster trans musical barrels along in style

18 May 2024 at 14:40

A thoroughly implausible yarn about a Mexican cartel leader who hires a lawyer to arrange his transition, but is carried along by its cheesy Broadway energy

Anglo-progressives and US liberals might worry about whether or not certain stories are “theirs to tell”. But that’s not a scruple that worries French auteur Jacques Audiard who, with amazing boldness and sweep, launches into this slightly bizarre yet watchable musical melodrama of crime and gender, set in Mexico. It plays like a thriller by Amat Escalante with music and lyrics by Lin-Manuel Miranda, and a touch of Almodovar.

Argentinian trans actor Karla Sofia Gascon plays Juan “Manitas” Del Monte, a terrifyingly powerful and ruthless cartel leader in Mexico, married to Jessi (Selena Gomez), with two young children. Manitas is intrigued by a high-profile murder trial in which an obviously guilty defendant gets off due to his smart and industrious lawyer Rita (Zoe Saldana); she is nearing 40 and secretly wretched from devoting her life to protecting unrepentant slimeballs, who go on to get ever richer while she labours for pitiful fees. Manitas kidnaps Rita and makes her an offer she can’t refuse: a one-off job for an unimaginably vast amount of money on which she can retire.

Continue reading...

💾

© Photograph: Shanna Besson

💾

© Photograph: Shanna Besson

You think Parisians grumble a lot? Don’t get them started on the Olympic Games | Robert McLiam Wilson

18 May 2024 at 12:00

From price rises to a ridiculous mascot, the French have had it up
to here with the event

We tend to view Paris as a fairytale princess, all romance and half-seen glitter. But for all its glamour, Paris has actually been depressed and irritable for a couple of hundred years now.

Far from being subdued by it, the citizens of Paris wear this perma-gloom like a disconsolate badge of honour. More tightly packed than in any housing estate high-rise, Parisians lead their stressed, underpaid lives defiantly. They mock and complain. They rail and grumble. Unlike anywhere I’ve ever known, in this city, if you say something nice about the place, the citizens disdainfully correct you. Paris doesn’t believe it is the best place. It just knows everywhere else is worse.

Continue reading...

💾

© Photograph: Denis Balibouse/Reuters

💾

© Photograph: Denis Balibouse/Reuters

Caught by the Tides review – two-decade relationship tells story of China’s epic transformation

18 May 2024 at 10:51

The 20-year failed romance between a singer and a dodgy music promoter becomes the vehicle for director Jia Zhangke’s latest exploration of China’s momentous recent history

As so often in the past, Chinese film-maker Jia Zhangke swims down into an ocean of sadness and strangeness; his new film is a mysterious quest narrative with a dynamic, westernised musical score. It tells a human story of a failed romance spanning 20 years, and brings this into parallel with a larger panorama: the awe-inspiring scale of millennial change that has transformed China in the same period, a futurist fervour for quasi-capitalist innovation that has turned out to co-exist with some very old-fashioned state coercion.

Caught by the Tides reflects with a kind of numb astonishment at all the novelties that the country has been required to welcome, all the vast upheavals for which the people have had to make sacrifices. The film shows us the mobster-businessmen who have done well in modern China, the patriotic ecstasy of Beijing getting picked to host the 2008 Olympic Games, the creation of the Three Gorges hydroelectric dam which meant so much unacknowledged pain for the displaced communities. (This latter was the subject of Jia’s Venice Golden Lion winner Still Life in 2006.) And finally of course there is the misery of the Covid lockdown.

Continue reading...

💾

© Photograph: X Stream Pictures

💾

© Photograph: X Stream Pictures

Red flag? Samuel Alito scandal casts further doubt on supreme court’s impartiality

18 May 2024 at 07:00

The court will play a crucial role in November’s election. Alito’s pro-Trump flag adds fuel to an already raging ethics debate

With less than six months to go before America chooses its next president, the US supreme court finds itself in a profoundly unenviable position: not only has it been drawn into the thick of a volatile election, but swirling ethical scandals have cast doubt on its impartiality.

The US supreme court’s discomfort worsened dramatically on Thursday night when the New York Times published a photograph of an upside-down American flag being flown outside the Alexandria, Virginia, home of the hard-right justice Samuel Alito. The photo was taken on 17 January 2021, days after the insurrection at the US Capitol and days before Joe Biden’s inauguration.

Continue reading...

💾

© Photograph: Douglas Rissing/Getty Images

💾

© Photograph: Douglas Rissing/Getty Images

Cannes 2024 week one roundup – the jury’s out, the sun isn’t…

18 May 2024 at 07:00

The weather didn’t play ball, but Magnus von Horn’s fierce fairytale and Andrea Arnold’s kitchen-sink take on English mysticism should count among the first-week highlights for Greta Gerwig’s jury

The Cannes film festival opens just as the heavens do, too. It’s raining on the red carpet and on the black limousines and on the immaculate white pavilions that line up on the beach. The rain falls on the A-listers as they climb the stairs to the Palais, and on the stoic huddled masses who gather behind the police cordons. Everybody’s bedraggled and windswept; it feels as though the whole town’s been at sea. “My main wish is that we see some great films this year,” says Iris Knobloch, the festival’s president, casting an anxious eye at the sky. “But also I’m wishing for a little sunshine as well.”

If it’s raining in Cannes, it means there’s a glitch in the script. It’s one of the event’s in-built paradoxes that a festival which predominantly plays out in darkened rooms should be so dependent on good weather; so in thrall to its complementary circus of photocalls, yacht parties and open-air film screenings. All it takes is a downpour to trigger a disturbance in the force, a creeping sense of existential dread. The punters came expecting Technicolor. But the scene is all wrong: the world has gone monochrome.

Continue reading...

💾

© Photograph: Loïc Venance/AFP/Getty Images

💾

© Photograph: Loïc Venance/AFP/Getty Images

Political violence could benefit far right parties in the EU elections – if we let it

18 May 2024 at 02:00

The attempted assassination of a leader sympathetic to Putin has Europe on edge. But exaggerating the fascist threat is also dangerous

The shooting of the Slovakian prime minister, Robert Fico, has dramatised the increasingly angry and polarised landscape of European politics. With just weeks to go before the European parliament elections, it is time to step back from the brink.

This eruption of violence in the midst of the campaign is so shocking that it may, at best, have a chastening effect, softening the venomous tone of political discourse by reminding democracies old and new of what they stand to lose.

Paul Taylor is a senior visiting fellow at the European Policy Centre

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

💾

© Photograph: Kenzo Tribouillard/AFP/Getty Images

💾

© Photograph: Kenzo Tribouillard/AFP/Getty Images

The Surfer review – beach bum Nic Cage surfs a high tide of toxic masculinity

17 May 2024 at 20:00

An office drone must suffer the machismo of an Australian coastal town in this barmy, low-budget thriller about a would-be wave-chaser

Here is a gloriously demented B-movie thriller about a middle-aged man who wants to ride a big wave and the grinning local bullies who regard the beach as home soil. “Don’t live here, don’t surf here,” they shout at any luckless tourist who dares to visit picturesque Lunar Bay on Australia’s south-western coast, where the land is heavy with heat and colour. Tempers are fraying; it’s a hundred degrees in the shade. The picture crash-lands at the Cannes film festival like a wild-eyed, brawling drunk.

The middle-aged man is unnamed, so let’s call him Nic Cage. Lorcan Finnegan’s film, after all, is as much about Cage – his image, his career history, his acting pyrotechnics – as it is about surfing or the illusory concept of home. The Surfer sets the star up as a man on the edge – a sad-sack office drone who desperately wants to belong – and then shoves him unceremoniously clear over the cliff-edge. Before long, our hero is living out of his car in the parking lot near the dunes, drinking from puddles, foraging for food from bins, and scheming all the while to make his way down to the shore.

Continue reading...

💾

© Photograph: Tea Shop Productions - Lovely Productions

💾

© Photograph: Tea Shop Productions - Lovely Productions

Yesterday — 17 May 2024Main stream

Kinds of Kindness review – sex, death and Emma Stone in Lanthimos’s disturbing triptych

17 May 2024 at 13:01

Cannes film festival
Yorgos Lanthimos reinforces how the universe keeps on doing the same awful things with a multistranded yarn starring Emma Stone, Willem Dafoe and Jesse Plemons

Perhaps it’s just the one kind of unkindness: the same recurring kind of selfishness, delusion and despair. Yorgos Lanthimos’s unnerving and amusing new film arrives in Cannes less than a year after the release of his Oscar-winning Alasdair Gray adaptation Poor Things. It is a macabre, absurdist triptych: three stories or three narrative variations on a theme, set in and around modern-day New Orleans.

An office worker finally revolts against the intimate tyranny exerted over him by his overbearing boss. A police officer is disturbed when his marine-biologist wife returns home after months of being stranded on a desert island, and suspects she has been replaced by a double. Two cult members search for a young woman believed to have the power to raise the dead.

Continue reading...

💾

© Photograph: Atsushi Nishijima

💾

© Photograph: Atsushi Nishijima

The Cannes red carpet so far: from Naomi Campbell in 90s Chanel to Anya Taylor-Joy in Dior – in pictures

17 May 2024 at 12:06

Jane Fonda in an animal print coat, Lily Gladstone in Gucci and Chris Hemsworth in an old Hollywood jacket – there was a lot to enjoy on the Croisette this week

Continue reading...

💾

© Photograph: Valéry Hache/AFP/Getty Images

💾

© Photograph: Valéry Hache/AFP/Getty Images

Biden and Trump are betting on debates to help magnify the other’s weaknesses

17 May 2024 at 10:31

Trump will look to again cast Biden as greatly diminished while Biden will aim to remind voters why they rejected Trump in 2020

It’s game on for a pair of presidential debates between two unpopular candidates most Americans wish weren’t running for the nation’s highest office.

In a ratatat social media exchange on Wednesday, Joe Biden and Donald Trump agreed to participate in two debates on 27 June, hosted by CNN, and on 10 September, hosted by ABC.

Continue reading...

💾

© Photograph: Jonathan Ernst/Reuters

💾

© Photograph: Jonathan Ernst/Reuters

Before yesterdayMain stream

Android 15 gets “Private Space,” theft detection, and AV1 support

15 May 2024 at 13:00
The Android 15 logo. This is "Android V," if you can't tell from the logo.

Enlarge / The Android 15 logo. This is "Android V," if you can't tell from the logo. (credit: Google)

Google's I/O conference is still happening, and while the big keynote was yesterday, major Android beta releases have apparently been downgraded to Day 2 of the show. Google really seems to want to be primarily an AI company now. Android already had some AI news yesterday, but now that the code-red requirements have been met, we have actual OS news.

One of the big features in this release is "Private Space," which Google says is a place where users can "keep sensitive apps away from prying eyes, under an additional layer of authentication." First, there's a new hidden-by-default portion of the app drawer that can hold these sensitive apps, and revealing that part of the app drawer requires a second round of lock-screen authentication, which can be different from the main phone lock screen.

Just like "Work" apps, the apps in this section run on a separate profile. To the system, they are run by a separate "user" with separate data, which your non-private apps won't be able to see. Interestingly, Google says, "When private space is locked by the user, the profile is paused, i.e., the apps are no longer active," so apps in a locked Private Space won't be able to show notifications unless you go through the second lock screen.

Read 7 remaining paragraphs | Comments

Google strikes back at OpenAI with “Project Astra” AI agent prototype

14 May 2024 at 15:11
A video still of Project Astra demo at the Google I/O conference keynote in Mountain View on May 14, 2024.

Enlarge / A video still of Project Astra demo at the Google I/O conference keynote in Mountain View on May 14, 2024. (credit: Google)

Just one day after OpenAI revealed GPT-4o, which it bills as being able to understand what's taking place in a video feed and converse about it, Google announced Project Astra, a research prototype that features similar video comprehension capabilities. It was announced by Google DeepMind CEO Demis Hassabis on Tuesday at the Google I/O conference keynote in Mountain View, California.

Hassabis called Astra "a universal agent helpful in everyday life." During a demonstration, the research model showcased its capabilities by identifying sound-producing objects, providing creative alliterations, explaining code on a monitor, and locating misplaced items. The AI assistant also exhibited its potential in wearable devices, such as smart glasses, where it could analyze diagrams, suggest improvements, and generate witty responses to visual prompts.

Google says that Astra uses the camera and microphone on a user's device to provide assistance in everyday life. By continuously processing and encoding video frames and speech input, Astra creates a timeline of events and caches the information for quick recall. The company says that this enables the AI to identify objects, answer questions, and remember things it has seen that are no longer in the camera's frame.

Read 14 remaining paragraphs | Comments

The Cyber Express Sets the Stage to Host World CyberCon META Edition 2024 in Dubai 

World CyberCon META Edition 2024

This May, the heartbeat of the cybersecurity industry will resonate through Dubai, where The Cyber Express is set to host the much-anticipated third iteration of the World CyberCon META Edition 2024.   Scheduled for May 23, 2024, at Habtoor Palace Dubai, this premier event promises a comprehensive day filled with immersive experiences tailored to address the dynamic challenges and innovations in cybersecurity.  This year’s theme, "Securing Middle East’s Digital Future: Challenges and Solutions," lays the foundation for a unique gathering that is crucial for any professional navigating the cybersecurity landscape.   The World CyberCon META Edition will feature a stellar lineup of more than 40 prominent Chief Information Security Officers (CISOs) and other cybersecurity leaders who will share invaluable insights and strategies. Notable speakers include: 
  • Sithembile (Nkosi) Songo, CISO, ESKOM  
  • Dina Alsalamen, VP, Head of Cyber and Information Security Department, Bank ABC  
  • Anoop Kumar, Head of Information Security Governance Risk & Compliance, Gulf News  
  • Irene Corpuz, Cyber Policy Expert, Dubai Government Entity, Board Member, and Co-Founder, Women in Cyber Security Middle East (WiCSME)   
  • Abhilash Radhadevi, Head of Cybersecurity, OQ Trading  
  • Ahmed Nabil Mahmoud, Head of Cyber Defense and Security Operations, Abu Dhabi Islamic Bank 

The World CyberCon META Edition 2024

[caption id="attachment_68285" align="alignnone" width="1140"]World CyberCon META Edition 2024 Highlights from the 2023 World CyberCon in Mumbai.[/caption] A Comprehensive Platform for Learning & Innovation  The World CyberCon META Edition 2024 promises a rich agenda with topics ranging from the nuances of national cybersecurity strategies to the latest in threat intelligence and protection against advanced threats. Discussions will span a variety of crucial subjects including: 
  • Securing a Digital UAE: National Cybersecurity Strategy 
  • Predictive Cyber Threat Intelligence: Anticipating Tomorrow’s Attacks Today 
  • Navigating the Cyber Threat Terrain: Unveiling Innovative Approaches to Cyber Risk Scoring 
  • Fortifying Against Ransomware: Robust Strategies for Prevention, Mitigation, and Swift Recovery 
  • Strategic Investments in Cybersecurity: Leveraging AI and ML for Enhanced Threat Detection 
Who Should Attend?  The World CyberCon META Edition 2024 is tailored for CISOs, CIOs, CTOs, security auditors, heads of IT, cybercrime specialists, and network engineers. It’s an invaluable opportunity for those invested in the future of internet safety to gain insights, establish connections, and explore new business avenues.  Engage and Network  In addition to knowledge sessions, the conference will feature interactive workshops, an engaging exhibition zone, and plenty of networking opportunities. This event is set to honor the significant contributions of cybersecurity professionals and provide them with the recognition they deserve.  Secure Your Place  Don’t miss this unique chance to connect with leading professionals and gain insights from the forefront of cybersecurity. Reserve your spot at World CyberCon META Edition 2024 by visiting (https://thecyberexpress.com/cyber-security-events/world-cybercon-3rd-edition-meta/).  More Information  For more details on the event sponsorship opportunities and delegate passes, please contact Ashish Jaiswal at ashish.j@thecyberexpress.com.  About The Cyber Express  Stay informed with TheCyberExpress.com, your essential source for cybersecurity news, insights, and resources, dedicated to empowering you with the knowledge needed to protect your digital assets.   Join us in shaping the digital future at World CyberCon META Edition 2024 in Dubai. Let’s secure tomorrow together! 

CBSE Results 2024 Under Threat: Database Vulnerability Could Compromise Student Scores

CBSE results 2024

As the Central Board of Secondary Education (CBSE) in India released the CBSE results 2024 for its class 10th and 12th examinations, a significant cybersecurity flaw was discovered on the official website. This vulnerability, identified by The Cyber Express, could potentially allow unauthorized individuals to view and alter students' examination results. The exams for Class 12 were held from February 15 to April 2, and for Class 10 from February 15 to March 13, conducted using traditional pen-and-paper methods where a total of 3,860,051 students appeared. Of these, 1,621,224 students participated in the Class 12 exams, while a significantly larger group of 2,238,827 students took the Class 10 exams. On Monday, students could access their results online by entering details such as their date of birth, roll code, and roll number. But the security loophole, discovered early this morning, could potentially lead to a massive CBSE data leak, affecting millions of students across India.  The vulnerability was first noticed early this morning when the results were supposed to be securely accessible to students and their families. The flaw on the CBSE website revolves around the exposure of administrative credentials and a technical misconfiguration in the SQL database system, specifically within a stored procedure called 'Getcbse10_All_2024'. To the average person, this might merely seem like a glitch, but it's a significant security flaw that provides an opportunity for malicious actors to manipulate and misuse crucial information, including outcomes. The ramifications are profound, as this vulnerability endangers the personal and academic data of countless students, potentially impacting their future opportunities.

CBSE Results 2024: Student Data Risk Explained

[caption id="attachment_68160" align="alignnone" width="2648"]CBSE Results 2024 The error message also includes connection string details, which are critical for connecting to the database but should never be exposed as they can lead to security risks.[/caption] The code message displayed on the website originates from a database query related to retrieving data concerning CBSE (Central Board of Secondary Education) Class 10 results for the year 2024. 'Getcbse10_All_2024' refers to a stored procedure in the database. A stored procedure is a prepared SQL code that you can save and reuse. In this case, it's likely a procedure intended to retrieve all data related to the CBSE Class 10 results for the year 2024. The procedure 'Getcbse10_All_2024' is expecting a parameter named '@admid', but it was not provided in the call to the procedure. The '@admid' likely stands for "Administrator ID" or a similar identifier that should be passed to the procedure to execute properly. The absence of this parameter means the procedure cannot run as intended, leading to an error. The error message also includes connection string details, which are critical for connecting to the database but should never be exposed as they can lead to security risks. provider=MSOLEDBSQL: This specifies the provider used for SQL Server. MSOLEDBSQL is a Microsoft OLE DB provider for SQL Server. server=10.***.10.***: This is the IP address of the server where the database is hosted. Knowing the server address can allow unauthorized users to attempt connections to the database. Database=****results**: This is the name of the database. Knowing the database name helps in directing queries and commands to the correct database. uid=cbseresults24; pwd=****************** : These are the credentials (username 'uid' and password 'pwd') used to authenticate to the database. With these credentials, an unauthorized user could potentially gain full access to the database, allowing them to view, modify, or delete data. Although the exposed data presents a significant risk, a researcher from the AI-powered threat intelligence platform, Cyble, noted that the threat potential is somewhat mitigated by incomplete information disclosure. “The IP address is internal and not public, which means that for a threat actor to extract information or gain access, they would need to engage in offensive actions like SQL injections or other methods. However, this does not diminish the seriousness of the exposed ID and password, which could still be exploited if the correct server address is discovered,” the researcher explained. The error message not only indicates a technical issue in the database query execution but also highlights a potential vulnerability. If exploited by an individual skilled in database management and privilege escalation, this vulnerability could allow unauthorized access to the database. Such unauthorized access could lead to various security risks, including data manipulation, deletion, or use for malicious purposes such as phishing or blackmail. Immediate steps should be taken to secure the database, which include changing the database credentials, reviewing logs to check for unauthorized access, and implementing better security practices like not exposing sensitive information in error messages or logs.

Why CBSE Matters

The Central Board of Secondary Education (CBSE) is a prominent national education board in India, overseeing both public and private schools. It is under the direct purview of the Ministry of Education, Government of India. The CBSE administers comprehensive examinations for students completing their 10th and 12th grades, which are crucial for advancing to higher education and professional pathways. The board is recognized for its rigorous curriculum and is influential in setting educational standards across the country. The Cyber Express has contacted officials at the Central Board of Secondary Education (CBSE) to notify them of a detected vulnerability. We inquired if they are aware of the issue, the causes of this glitch, and the steps they intend to take to address it. We are currently awaiting a response from the organization.

Technical Aspect of the CBSE Data Exposure: Potential Risks

The exposure of the admin database ID and password in the CBSE data leak opens up several potential risks. While none of these events have occurred, the exposure of such critical credentials could lead to severe consequences if not addressed promptly. 1. Unauthorized Access and Control: With the admin credentials exposed, there is a potential for unauthorized users to gain full access to the CBSE's SQL database. This would allow them to view, copy, and manipulate sensitive data, including examination results and student personal information. 2. Risk of Data Manipulation: The ability to alter data is a significant risk. Although no data has been reported as altered, the possibility exists. Unauthorized changes could include tampering with examination results or modifying student records, which could severely undermine the integrity of the CBSE's educational assessments. 3. Threat of Data Theft: The exposed credentials could potentially be used to access and extract sensitive information. This data, which could include personal details of students and staff, is at risk of being used for malicious purposes such as identity theft or fraud. 4. Potential for Operational Disruption: While no disruptions have occurred, the exposed credentials could be used to damage data integrity or lock out legitimate users, potentially causing significant disruptions to CBSE's operations and affecting educational activities. 5. Foundation for Further Attacks: The leak itself could facilitate further attacks. With administrative access, attackers could deploy additional malicious software, establish backdoors for continued access, or leverage the compromised database to launch attacks on connected systems. The situation remains fluid, and updates are expected as more information becomes available. Stay subscribed to The Cyber Express to learn more about the story as it proceeds. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

the winner takes it all

11 May 2024 at 04:12
Good morning Europe! The Grand Final of the 68th Eurovision Song Contest 2024 will take place today in Malmö, Sweden (detailed previously on the Blue). At least, it's supposed to.

Never a simple show to arrange, this year has been particularly dogged by controversies and protests around the inclusion of Israel in the lineup, with many criticising the EBU's "apolitical" stance. But what looks to be the biggest upset in the running of the event so far is the unknown incident involving Dutch singer Joost Klein, who was supposed to perform in yesterday's dress rehearsal (which would also be shown to the worldwide juries for their votes) but was stopped at the last minute, much to the disgust of the crowd in the stadium. The specifics of the incident are still unknown, but this morning Dutch media reported that the police received a complaint about Klein and will be investigating. Nobody knows if Joost will be performing tonight, or whether the Netherlands will be formally disqualified, resulting in potentially signficiant changes to the voting outcome. Unfortunately, this has had an impact on the opening of the 'Rest of the World' voting, which was supposed to begin 24 hours before the final and has still not started as of this post, leaving a much narrower window for voters and for the organisers to verify the results.

Fear, Cynicism, Nihilism, and Apathy

By: Rhaomi
9 May 2024 at 18:26
Even in a state where surveillance is almost total, the experience of tyranny and injustice can radicalize people. Anger at arbitrary power will always lead someone to start thinking about another system, a better way to run society. [...] If people are naturally drawn to the image of human rights, to the language of democracy, to the dream of freedom, then those concepts have to be poisoned. [...] Here is a difficult truth: A part of the American political spectrum is not merely a passive recipient of the combined authoritarian narratives that come from Russia, China, and their ilk, but an active participant in creating and spreading them. Like the leaders of those countries, the American MAGA right also wants Americans to believe that their democracy is degenerate, their elections illegitimate, their civilization dying. The MAGA movement's leaders also have an interest in pumping nihilism and cynicism into the brains of their fellow citizens, and in convincing them that nothing they see is true. Their goals are so similar that it is hard to distinguish between the online American alt-right and its foreign amplifiers, who have multiplied since the days when this was solely a Russian project. Tucker Carlson has even promoted the fear of a color revolution in America, lifting the phrase directly from Russian propaganda.
The New Propaganda War: Autocrats in China, Russia, and elsewhere are now making common cause with MAGA Republicans to discredit liberalism and freedom around the world. [SLAtlantic]

Biden Announces $3.3 Billion Microsoft AI Center at Trump’s Failed Foxconn Site

8 May 2024 at 16:27
The president’s visit to Wisconsin celebrated the investment by Microsoft in a center to be built on the site of a failed Foxconn project negotiated by his predecessor.

© Tom Brenner for The New York Times

President Biden at the Intel campus in Chandler, Ariz., in March. His “Investing in America” agenda has focused on bringing billions of private-sector dollars into manufacturing and industries such as clean energy and artificial intelligence.

Kaseya Connect Global 2024 Day 3 Recap

By: Kaseya
7 May 2024 at 17:55

Navigating Cybersecurity at Kaseya Connect Global 2024 The final day of Kaseya Connect Global 2024 offered a deep dive intoRead More

The post Kaseya Connect Global 2024 Day 3 Recap appeared first on Kaseya.

The post Kaseya Connect Global 2024 Day 3 Recap appeared first on Security Boulevard.

Global Infosec Awards 2024: Cyble Wins Nine Accolades, Recognized Among the Best in Cybersecurity

Global Infosec Awards 2024 Cyble

Cyber Defense Magazine (CDM), marking its 12th anniversary as the leading electronic information security magazine, announced the winners of the prestigious Global InfoSec Awards at the RSA Conference 2024  After an exhaustive six-month search across 3500 companies worldwide, CDM has identified the top innovators in cybersecurity, awarding nearly 10% of these as winners for their outstanding contributions to the industry.  This year's RSA Conference, a cornerstone event for cybersecurity professionals, has been especially significant. It showcased groundbreaking advancements amid increasing challenges such as sophisticated ransomware, business email compromise, and exploits targeting Cloud, IoT, and OT environments, alongside a surge in cyber-crime and cyber-terrorism.  In a new age of hybrid workforces and advances in AI, there's an equally exponential growth in new kinds of ransomware, business email compromise, Cloud, IoT and OT exploitation, deep phishing attacks, cyber-crime and cyber terrorism. Only the most innovative and forward-thinking Cybersecurity solutions will give us a fighting chance," said Yan Ross, Editor-in-Chief of Cyber Defense Magazine.  [caption id="attachment_67131" align="alignnone" width="1600"]Cyble Team at RSAC 2024 Cyble Team at RSAC 2024[/caption]

Global Infosec Awards 2024: Cyble Clinches 9 Honors

Shortly thereafter, Cyber Defense Magazine also published a list of Global Infosec Awards for 2024 Winners by category -- Company. Among the standout recipients, AI-based cyber threat intelligence firm Cyble has notably excelled, securing multiple accolades in key cybersecurity arenas. Renowned for their proactive and visionary approach, Cyble has been honored with: 
  • Cyble: Editor's Choice – Account Takeover Protection 
  • Cyble: Trailblazing – Attack Surface Management 
  • Cyble: Pioneering – Continuous Threat Exposure Management (CTEM) 
  • Cyble: Pioneering – Cyber Exposure Management 
  • Cyble: Pioneering – Data Loss Prevention (DLP) 
  • Cyble: Pioneering – Digital Risk Protection 
  • Cyble: Pioneering – Third Party Cyber Risk 
  • Cyble: Trailblazing – Threat Intelligence 
  • Cyble: Trailblazing – Vulnerability Intelligence 
These awards emphasize Cyble's commitment to building strong cybersecurity defenses aimed at protecting businesses from today's most critical threats.  "Receiving these accolades at the Global InfoSec Awards is a tremendous honor for us," said Beenu Arora, the co-founder of Cyble. It’s a testament to the hard work and dedication of our team, particularly in our innovative AI technology. As we face increasingly complex cyber threats, these recognitions reinforce our commitment to pushing the boundaries of AI-driven cybersecurity solutions to better protect our clients."  Cyble, the leading provider of AI-driven cybersecurity solutions, is currently participating at the prestigious RSA Conference 2024, held at Moscone South Expo, San Francisco, from May 6 to May 9.  Visitors at Cyble's Booth N-2353 at RSAC 2024 can see firsthand how Cyble is transforming cybersecurity practices and strengthening network resilience. At RSA Conference 2024, Cyble is showcasing its innovative Cyble Vision Platform through engaging live demonstrations, illustrating how it enables organizations to proactively address cybersecurity threats.  For more information or to schedule a personal meeting with any of the leadership team members, please visit the event page at https://cyble.com/upcoming-events/rsa-conference-2024/  RSA Conference is the global stage for the cybersecurity industry, providing a platform for professionals to connect, share insights, and advance security technologies. This annual event brings together the brightest minds in cybersecurity, featuring in-depth sessions, keynotes, and training from leading experts in the field.   About Cyber Defense Magazine  With over five million monthly readers, Cyber Defense Magazine is the premier source of IT Security information. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products and services in the information technology industry. About Cyble Cyble, a trailblazer in Cyber Threat Intelligence, is committed to democratizing Dark Web Threat Intelligence through advanced AI and Machine Learning solutions. Recognized as one of the most sought-after workplaces, Cyble’s culture fosters innovation, collaboration, and professional growth. With a proven track record in delivering cutting-edge research and proactive monitoring, Cyble stands at the forefront of the cybersecurity landscape. Headquartered in Atlanta, Georgia, and with a global presence spanning Australia, Malaysia, Singapore, Dubai, Saudi Arabia, and India, Cyble is the trusted authority empowering organizations to proactively combat evolving cyber threats.

U.S. Unveiled International Cyberspace and Digital Policy Strategy at RSAC 2024

International Cyberspace and Digital Policy Strategy

The U.S. Secretary of State Antony Blinken unveiled an International Cyberspace and Digital Policy Strategy on Monday, outlining the Biden administration's plan to engage the global community on various technological security issues. Blinken introduced this robust international cyber strategy while delivering a keynote at the RSA cybersecurity conference in San Francisco. The strategic blueprint outlined in the latest strategy displayed the federal government's multifaceted approach to engaging the global community on a wide array of technological security issues, aiming to foster collaboration and cooperation among allies, partners and stakeholders worldwide.

What’s at the Core of the International Cyberspace and Digital Policy Strategy

At the heart of the plan lies the concept of "digital solidarity," characterized by mutual assistance to victims of malicious cyber activity and other digital harms. Digital solidarity entails collaborating on shared goals, capacity building, and mutual support to enhance security, resilience, self-determination, and prosperity. Against the backdrop of ongoing cyberattacks targeting U.S. allies by foreign actors like Russia, China, North Korea and Iran, efforts focus on supporting allies and partners, particularly emerging economies, in harnessing the benefits of digital technologies while sustaining economic and development objectives. The strategy emphasizes alignment with international partners on technology governance, fostering strong partnerships with civil society and the private sector, and promoting cybersecurity resilience through diverse products and services from trusted technology vendors. Moreover, it underscores cooperative efforts to defend and advance human rights and build digital and cyber capacity for long-term resilience and responsiveness. The Department of State, in collaboration with other federal agencies, will advance digital solidarity through four key areas of action supported by three guiding principles:
  1. Promoting an open, inclusive, secure, and resilient digital ecosystem.
  2. Aligning rights-respecting approaches to digital and data governance with international partners.
  3. Advancing responsible state behavior in cyberspace and countering threats through coalition-building and engagement.
  4. Strengthening international partner digital and cyber capacity.
Efforts to forge digital solidarity will be reinforced by active participation in international fora to shape obligations, norms, standards, and principles impacting cyberspace and digital technology issues. Leadership in these venues is crucial to safeguarding U.S. interests and values in the evolving digital landscape. Recognizing the significance of digital diplomacy, the Department of State will lead interagency efforts to coordinate cyber and digital technology diplomacy to advance U.S. national interests and values in the coming decade.

Cybersecurity Threats from Nation States

The strategy addresses the malign activities of nations such as Russia, China, Iran, and North Korea, condemning their exploitative use of technology for nefarious purposes, including hacking and espionage campaigns. It highlights concerns about these countries' efforts to undermine international regulatory frameworks and undercut U.S. technology manufacturers through state-sponsored subsidies. “Cyber criminals and criminal syndicates operating in cyberspace now represent a specific threat to the economic and national security of countries around the world,” the International Cyberspace and Digital Strategy said. “Cybercrime and online fraud cause significant harm to economic development, with small- to medium-sized enterprises and financial service providers especially at risk. According to one estimate, the global cost of cybercrime is estimated to top $23 trillion in 2027.”

AI Technology Governance

The landscape of AI technology governance is intricate, as per the latest strategy. While AI systems offer promising avenues for societal progress, the complexities of geopolitics further compound the challenges and uncertainties in their regulation and management. AI technologies hold immense potential to drive knowledge expansion, boost prosperity, enhance productivity, and tackle pressing global issues. However, the rapid proliferation of AI technologies also presents substantial risks and ethical considerations. These encompass a spectrum of concerns ranging from exacerbating inequality and economic instability to privacy breaches, discriminatory practices, and amplification of malicious cyber activities. Moreover, the dual-use nature of many AI applications poses challenges in ensuring that emerging technologies are not leveraged for nefarious purposes, including disinformation campaigns and military advancements lacking adequate human rights safeguards. Balancing risks and rewards requires safeguarding democratic values, human rights, and fostering international collaboration to harness AI's benefits while mitigating destabilizing impacts. The strategy also warns against complacency in critical technological domains, cautioning that failure to act could enable authoritarian states to shape the future of technology in a manner detrimental to U.S. interests and values. By advocating for concerted efforts to uphold a rights-respecting, open, and secure cyberspace, the United States aims to advance a vision of global governance that safeguards democratic principles and promotes innovation and prosperity.  Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

OpenAI Releases ‘Deepfake’ Detector to Disinformation Researchers

The prominent A.I. start-up is also joining an industrywide effort to spot content made with artificial intelligence.

© Jim Wilson/The New York Times

OpenAI’s offices in San Francisco. The company said that its new detector can identify 98.8 percent of images created by DALL-E 3, its own generator.

Top 5 Cybersecurity Companies Making Waves at RSAC 2024

RSAC 2024

The RSA Conference 2024, the world's biggest cybersecurity event, is currently underway at the Moscone Center in San Francisco. Over 640 vendors are showcasing their latest offerings at the expo, which began on Monday, May 6, 2024 and runs until Thursday, May 9th. For the second consecutive year, generative AI (GenAI) appears to be a major focus for cybersecurity products unveiled at the event. Here's a look at the top 5 companies making a splash at RSAC 2024:

1. Cyble with Vision X

Cyble, a prominent force in AI-powered cybersecurity, has launched Cyble Vision X, the successor to its award-winning Cyble Vision 2.0 threat intelligence platform. Vision X aims to elevate the user experience by granting decision-makers immediate access to critical information. The first phase of Vision X is poised to introduce a series of impactful enhancements, including a revamped "Executive Insights" dashboard that consolidates the most significant intelligence in a user-friendly interface.  Additionally, an improved filter allows users to effortlessly navigate through their data, and a sleeker, more modern, and intuitive design ensures an optimized user experience. Cyble Vision X also boasts several other improvements, such as: 
  • A new "Alerts Insights" interface, previously known as "Executive Insights" and rebranded to reflect a more granular level of data analysis. 
  • A revamped header and collapsible left pane for a cleaner, more efficient workspace. 
  • A redesigned authentication screen that maintains the same API functionality while incorporating aesthetic enhancements. 
For more information, visit Cyble's booth N-2353 at RSA to explore VisionX and their other services.

2. Theori with Xint

Taking a unified approach, Theori unveiled Xint, a comprehensive Security Posture Management (SPM) solution. Xint streamlines security operations by consolidating data from various sources, enabling organisations to gain a holistic view of their security posture and proactively identify vulnerabilities.  Highlights of Xint include: 
  • Cloud Security: Continuous monitoring and enhanced visibility into cloud configurations, resource utilization, and access controls to swiftly respond to potential security risks. 
  • External Threat Detection: Security tools designed to defend against unauthorized access for externally facing applications, including web applications, APIs, mobile apps, and third-party integrations. 
  • Offensive Security AI Engine: A revolutionary approach to penetration testing that combines the expertise of award-winning offensive cybersecurity veterans with cutting-edge artificial intelligence technology that precisely pinpoints vulnerabilities. 
For more information, visit Theori's Booth: 634.

3. New SEI Tool

The Software Engineering Institute (SEI) introduced a novel tool designed to provide much-needed visibility into DevSecOps pipelines. This tool empowers developers to identify and address security issues early in the development process, preventing them from becoming exploitable vulnerabilities in the final product.  The tool, called Polar, is an observability framework that provides a comprehensive picture of a software system's deployment platform. Polar unlocks data captured by disparate tools within an organization, helping to answer complex questions about performance and security that are crucial for real-time decision-making and agility in the face of threats. For more information, visit SEI's Booth: 1743.

4. Cranium with First-of-its-Kind GenAI Exposure Management Solution

Cranium, a leading enterprise AI security and trust software firm, introduced the industry's first exposure management solution specifically designed for GenAI at RSAC 2024. The Cranium platform features an AI-augmented workflow with a secure LLM architecture paired with proprietary threat intelligence to provide visibility into an AI system, characterize attack surfaces, and assess vulnerabilities within an organization.  As the use of GenAI tools like Microsoft's Copilot for Microsoft 365 grows, concerns around potential misuse and exploitation also rise. Cranium's solution offers a critical layer of protection against such attacks. Their exposure management solution can help organizations identify and mitigate potential security risks associated with GenAI tools, ensuring these powerful AI-driven applications are used securely.

5. Vectra AI Expands Platform to Combat GenAI Attacks

Vectra AI, a leader in hybrid attack detection, investigation, and response, has recognized the evolving threat landscape with the rise of GenAI and has expanded its AI platform to combat GenAI attacks. Vectra's enhanced solution leverages advanced AI and machine learning to detect and neutralize sophisticated attacks that may exploit the capabilities of GenAI tools. Traditional security solutions might struggle to identify these novel attack methods, so Vectra's AI-powered platform offers a vital line of defense.  Catch up with our team at our open house, Attack Labs Live, at the Nasdaq Entrepreneurial Center

RSA Conference 2024: What to Expect from the World’s Largest Cybersecurity Event

RSA 2024

The RSA conference 2024 , the world's largest cybersecurity gathering, commenced in San Francisco from May 6 to 9, 2024. With over 45,000 attendees expected, the event promises to be a hub for industry discussion, product launches, and critical talks on emerging threats. This article explores some of the key themes likely to dominate RSA 2024.

Quantifying Cyber Risk: A Business Imperative

One of the most pressing issues for businesses today is understanding cyber risk in financial terms. While data breaches often headline the news, accurately calculating the potential cost of such an attack remains elusive. This lack of clarity hinders informed decision-making around cybersecurity investments.

However, a potential solution may be emerging. Companies like CDW are developing tools that leverage cybersecurity insurance data and best-practice protocols to quantify cyber risk. By translating risk into dollar figures, businesses can prioritize security investments and make data-driven decisions about mitigation strategies.

The Double-Edged Sword of AI

Artificial intelligence (AI) is rapidly transforming the cybersecurity landscape. While AI-powered tools hold immense potential for automating repetitive tasks and improving efficiency, security professionals are concerned about the technology's potential misuse by attackers.

The fear lies in the possibility of AI exposing sensitive data through large language models, especially in the absence of robust data governance and access control measures. Companies considering AI implementation will need to prioritize these aspects to ensure their data remains secure.

Securing Operational Technology (OT): A Growing Challenge

Critical infrastructure facilities, like power plants and water treatment centers, are increasingly targeted by cybercriminals. These facilities often rely on aging OT systems, not designed for today's internet-connected world, making them vulnerable.

The potential consequences of a successful attack on such facilities are far-reaching, potentially disrupting entire regions. To address this growing threat, a holistic approach is needed. One such approach, the 5D security model, focuses on identifying vulnerabilities, deploying solutions, and fostering a culture of shared accountability between IT and OT teams.

RSA 2024 Beyond Technology: Collaboration and Community

The RSA Conference is more than just a showcase of new technology. This year's RSA Conference theme, "The Art of Possible," reflects a focus on innovation and community collaboration. Keynote speakers such as Secretary of State Antony J. Blinken will discuss the government's efforts to integrate cybersecurity into emerging technologies like AI and quantum computing.

The conference will also feature a diverse roster of speakers from the cybersecurity industry, including technologist Bruce Schneier and former CISA Director Chris Krebs.

Hugh Thompson, RSAC's executive chairman, emphasizes the conference's role in fostering collaboration within the cybersecurity community. This "community problem-solving" approach is crucial in combating evolving threats.

The event will feature a diverse range of speakers, including government officials, technologists, security experts, and even representatives from the arts and entertainment world. This cross-disciplinary approach underscores the importance of collaboration in building a more secure future.

Innovation and Learning Opportunities

With over 500 sessions, RSA 2024 promises to be a hub of knowledge sharing and networking opportunities. Attendees can participate in hands-on cybersecurity labs, networking sessions, and keynote presentations. The Innovation Sandbox will showcase startups competing for the title of "Most Innovative Startup," highlighting the latest advancements in cybersecurity technology.

Cyble's Participation

Cyble, a leading provider of AI-driven cybersecurity solutions, is showcasing its Cyble Vision Platform at RSA 2024. Attendees can visit Cyble's booth to learn how the platform enhances network resilience and proactively tackles cybersecurity threats. Cyble's leadership team will be available to discuss the latest trends and challenges in cybersecurity.

The RSA 2024 remains a cornerstone event for the cybersecurity industry. By addressing critical issues like quantifying cyber risk, securing OT systems, and fostering collaboration, the event aims to equip attendees with the knowledge and tools needed to navigate the ever-evolving threat landscape.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Cyble Showcases Next-Gen Cybersecurity Technologies at RSA Conference 2024

RSA Conference 2024

San Francisco, May 6, 2024 — Cyble, the leading provider of AI-driven cybersecurity solutions, is excited to announce its participation in the prestigious RSA Conference 2024, held at Moscone South Expo, San Francisco, from May 6th to May 9th. Visit Cyble at Booth N-2353 to discover how Cyble is revolutionizing cybersecurity practices and enhancing network resilience. At RSA Conference 2024, Cyble will introduce attendees to its innovative Cyble Vision Platform through compelling live demonstrations, highlighting how it empowers organizations to proactively tackle cybersecurity threats. The Cyble team, including Founder and CEO Beenu Arora, Co-founder and COO Manish Chachada, and other key members of the leadership team, will be present to discuss and provide insights into the latest trends and challenges in cybersecurity.

Engage with Our Founders and Experts at RSA Conference 2024

Cybe at RSA Conference 2024 Beenu Arora - Co-founder and CEO of Cyble. Beenu is a visionary leader with a deep understanding of the cybersecurity landscape and a passion for advancing cybersecurity measures through innovative technologies. Manish Chachada - Co-founder and COO of Cyble. Manish brings strategic oversight to operations and a commitment to delivering exceptional cybersecurity solutions to global clients. Dipesh Ranjan - Chief Partner Officer, SVP – Global Growth. Dipesh drives strategic partnerships and global expansion efforts at Cyble, leveraging his extensive expertise in cybersecurity and market development. Mandar Patil - SVP, Sales. Mandar leads the sales strategies at Cyble, focusing on accelerating growth and enhancing customer engagements through tailored cybersecurity solutions. Taylor Pettis - VP of Marketing. Taylor oversees Cyble’s marketing strategies, enhancing brand visibility and engagement through innovative campaigns and communications.

Event Details:

Date: May 6-9, 2024 Location: Booth N-2353, Moscone South Expo, San Francisco

What to Expect:

Insightful Engagements: Gain valuable insights from our founders Beenu Arora and Manish Chachada, and leadership team members Dipesh Ranjan, Mandar Patil, and Taylor Pettis. Interactive Product Demos: Experience the advanced capabilities of our AI-driven solutions and learn how they can safeguard your digital assets. Expert Discussions: Delve into discussions on the most pressing cybersecurity issues and explore tailored solutions with our experts. "We are excited to showcase our latest innovations and insights at RSA Conference 2024. Meeting with industry professionals and peers is a fantastic opportunity to discuss how Cyble’s solutions can be tailored to meet the evolving challenges of cybersecurity," said Beenu Arora, CEO of Cyble. Join our team at Booth N-2353 for a hands-on look at how our AI-driven solutions can empower your cybersecurity strategy and safeguard your operations. For more information or to schedule a personal meeting with any of our leadership team members, please visit our event page at https://cyble.com/upcoming-events/rsa-conference-2024/ About Cyble: Cyble, a trailblazer in Cyber Threat Intelligence, is committed to democratizing Dark Web Threat Intelligence through advanced AI and Machine Learning solutions. Recognized as one of the most sought-after workplaces, Cyble’s culture fosters innovation, collaboration, and professional growth. With a proven track record in delivering cutting-edge research and proactive monitoring, Cyble stands at the forefront of the cybersecurity landscape. Headquartered in Atlanta, Georgia, with a global presence spanning Australia, Malaysia, Singapore, Dubai, Saudi Arabia, and India, Cyble is the trusted authority empowering organizations to proactively combat evolving cyber threats. Media Contact: Cyble Inc enquiries@cyble.com Ph: +1 678 379 3241

Send not to know for whom the bell tolls (but in this case.......)

5 May 2024 at 18:25
What happens if a US presidential candidate dies? Joe Biden and Donald Trump are the two oldest candidates in US history. If either needs to be replaced, what next? from the Guardian

'....knowingly and willfully mailing or otherwise making "any threat to take the life of, to kidnap, or to inflict great bodily harm upon the president of the United States" is a federal crime in the USA'. (Wiki). Needless to say, please keep this discussion legal.

Best printer 2024 for printing printers who love to print in 2024

By: Rhaomi
5 May 2024 at 14:45
It's weird because the correct answer to the query "what is the best printer" has not changed, but an entire ecosystem of content farms seems motivated to constantly update articles about printers in response to the incentive structure created by that robot's obvious preferences. Pointing out that incentive structure and the culture that's developed around it seems to make a lot of people mad, which is also interesting! Anyway, here's the best printer for 2024: a Brother laser printer. You can just pick any one you like; I have one with a sheet feeder and one without a sheet feeder. Both of them have reliably printed return labels and random forms and pictures for my kid to color for years now, and I have never purchased replacement toner for either one. Neither has fallen off the WiFi or insisted I sign up for an ink-related hostage situation or required me to consider the ongoing schemes of HP executives who seem determined to make people hate a legendary brand with straightforward cash grabs and weird DRM ideas.
Best printer 2024, best printer for home use, office use, printing labels, printer for school, homework printer you are a printer we are all printers / After a full year of not thinking about printers, the best printer is still whatever random Brother laser printer that's on sale. [Previously]

Apple’s Q2 2024 earnings reveal a drop in iPhone, iPad sales

2 May 2024 at 18:32
The Apple Park campus in Cupertino, California.

Enlarge / The Apple Park campus in Cupertino, California. (credit: Anadolu Agency | Getty)

Apple's earnings report for the second quarter of the company's 2024 fiscal year showed a slide in hardware sales, especially for the iPhone. Nonetheless, Apple beat analysts' estimates for the quarter thanks to the company's rapidly growing services revenue.

iPhone revenue dropped from $51.33 billion in the same quarter last year to $45.96 billion, a fall of about 10 percent. This was the second consecutive quarter with declining iPhone revenues. That said, investors feared a sharp drop before the earnings call.

Notably, Apple's revenue in the region it dubs Greater China (which includes China, Taiwan, Singapore, and Hong Kong) fell 8 percent overall. The company fared a little better in other regions. China's economy is slowing even as China-based Huawei is taking bigger slices of the pie in the region.

Read 4 remaining paragraphs | Comments

'Fed up of politics': the view from Blackpool on byelection day – video

Ahead of the byelection in Blackpool South, the Guardian takes the temperature in the once prosperous northern coastal town, with many voters expressing complete apathy and disdain for the state of politics.

The area is going to the polls because the former Tory MP Scott Benton resigned after being found guilty of breaching standards rules in a lobbying scandal. Labour is hopeful of taking back the seat, which Benton won with a majority of 3,690 in 2019

Continue reading...

💾

© Photograph: The Guardian

💾

© Photograph: The Guardian

Biden Delays Ban on Menthol Cigarettes

The proposal had been years in the making, in an effort to curb death rates of Black smokers targeted by Big Tobacco. In an election year, the president’s worries about support among Black voters may have influenced the postponement.

© Mario Tama/Getty Images

Public health groups supporting the ban of menthol cigarettes cited years of data suggesting that the cigarettes, long marketed to African American smokers, make it more palatable to start smoking and more difficult to stop.

The 2024 India Elections Cyber Crisis: AI, Deepfakes, and Democratic Integrity

2024 Indian election cybersecurity, India elections 2024

India is currently hosting its general elections, spanning from April 19 to June 1, 2024, across seven phases to elect 543 members to the Lok Sabha, the lower house of India’s Parliament. Amidst this pivotal democratic India elections 2024, the integrity of the electoral process is under threat from a spectrum of cybersecurity challenges. These threats range from international cyberattacks targeting the election's infrastructure to domestic insiders undermining the system. As the world's largest democracy conducts its elections, the occurrence and sophistication of these cyber threats have intensified. The election battleground is also witnessing an unprecedented use of AI-generated content and deepfakes by political entities and foreign agents, heightening tensions and manipulating public perception. This article delves into the complex cybersecurity landscape of the elections in India, examining the impact of technological exploitation, foreign interference, and internal political strife on the nation's democratic foundations.

India Elections 2024: Experts Warns a 'Year of Deception'

The ongoing elections in India are proving to be exceptionally challenging, with cybersecurity experts predicting a tumultuous voting session. The integrity of the voting process is deeply compromised by the widespread use of deepfakes and the dissemination of false information generated by artificial intelligence. While India is using its own set of cybersecurity measures to combat AI-generated misinformation, Meta recently created a dedicated fact-checking helpline on WhatsApp in collaboration with the Misinformation Combat Alliance (MCA). This initiative aims to empower users to identify and flag deepfakes, offering support in multiple languages, including English, Hindi, Tamil, and Telugu.  Industry leaders in cybersecurity, such as IBM and McAfee, are highlighting the significant challenges that India is expected to face in the ongoing elections in India. The rapid advancement of AI technology provides cybercriminals with powerful tools like deepfakes, voice cloning, and advanced malware, increasing the complexity of threats to the electoral process. The potency of artificial intelligence (AI) in the hands of cybercriminals was highlighted by Pratim Mukherjee, senior director of engineering at McAfee, who also emphasizes the urgent need for proactive cybersecurity solutions to reduce the risks posed by developing threats. Additionally, amid one of the most contentious election seasons in India, Kerala Legislative Assembly Leader of the Opposition VD Satheesan has called for the dismissal of cases about a deepfake video that purports to be directed at CPM leader KK Shailaja. Implying a link between CPM and BJP in the state, he charges CPM leaders of disseminating false information and attacks the government's management of police operations during the annual Hindu temple festival Thrissur Pooram. Thrissur Pooram is an annual Hindu festival held in Kerala, India. It's one of the largest and most colorful temple festivals in India, attracting large crowds and significant media attention.

India Elections 2024: Foreign Interference and Insider Threats

Foreign interference poses another set of threats to the integrity of the Indian electoral process. Chinese hackers, in particular, have been identified as potential adversaries seeking to manipulate public opinion and influence election outcomes.  According to a report by Microsoft, Chinese hackers and influence operatives, along with North Korean agents, may seek to interfere with the electoral process in India and other high-profile elections globally. The use of AI-generated content to sway public opinion is another large risk faced by Indian cybersecurity, however, this is not the only thing that is eroding the integrity of the 2024 general India election.  The 2024 Indian election is facing another threat from domestic political rivalries, with allegations of cyberattacks and misinformation campaigns emerging from within India. The Vadakara Lok Sabha constituency exemplifies this phenomenon, with both the CPI(M) and the Congress accusing each other of launching vicious cyberattacks. The CPI(M), or Communist Party of India (Marxist), and the Congress are major political entities in India. The escalation of these allegations to the Election Commission complicates the decision-making of the general public as misinformation influences the choices made by voters. Previously, in a similar vein, the attempted hack on the website of the Ram Mandir during the Pran Pratishtha ceremony is another reminder of the cybersecurity challenges faced by India's cultural and religious institutions while conducting the upcoming elections. The Ram Mandir refers to a new temple being constructed in Ayodhya, a site of historical and religious significance, and a focal point of long-standing and sometimes contentious political and religious debates in India.

The Cyberattack on Indian Culture: What to Expect and How to Protect?

These incidents highlight the vulnerability of e-platforms to cyberattacks, raising concerns about the broader implications for cybersecurity in the country. As India's cultural and religious heritage intersects with the ongoing 2024 India elections, the need for better cybersecurity measures cannot be ignored.  To strengthen cybersecurity defenses, proactive steps and group efforts are essential as India battles the threat of cyberattacks on several fronts. To reduce the risks associated with foreign meddling and AI-generated disinformation, cooperation between government agencies, cybersecurity professionals, and tech businesses is vital. Campaigns for public awareness can be quite effective in informing the public about the risks posed by false information and the value of being vigilant in the digital era. The cybersecurity measures in the 2024 Indian elections are set to capture global attention, as the threat of cyberattacks is significant. Protecting the integrity of the electoral process will demand a unified effort from all involved parties. Through the strategic use of technology and collaborative initiatives, India aims to confront cybersecurity challenges and maintain democratic integrity. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

‘We Will be Attacked’: Cybersecurity Challenges Loom Over Paris Olympics 2024

Paris Olympics 2024 cyberattack

As the countdown to the Paris Olympics 2024 begins, organizers are gearing up to confront potential cybersecurity threats and the looming specter of terrorism, particularly surrounding the highly anticipated grand opening ceremony. Despite these challenges, there's an atmosphere of confidence regarding their preparedness to tackle any Paris Olympics 2024 cyberattack head-on.  Set to take place from July 26th to August 11th, the XXXII Summer Olympic Games in Paris will be closely monitored for any signs of cyberattacks and security breaches by authorities and cybersecurity organizations.  Franz Regul, the leader of the team tasked with defending against cyber threats for this year's Summer Games in Paris, is well aware of the risks. Speaking from his office in the Paris Olympic organizing committee's headquarters, Regul anticipates the inevitable: "We will be attacked."

Paris Olympics 2024 Cyberattack Risk and Precautions

With teams like Regul's stationed in high-tech rooms equipped with servers and monitoring screens, vigilance against any cyberattacks on Paris Olympics 2024. The Paris operations center even boasts a red alert system to signal the gravest dangers. Thus far, there have been no disruptions, but as the Olympics draw nearer, the frequency and severity of hacking attempts are expected to escalate dramatically. Unlike other organizations that are preparing for potential cyberattacks on Paris Olympics 2024 without a specific timeline, Regul's team knows precisely when to brace for impact: July and August. While security concerns at major events traditionally revolved around physical threats such as terrorism, digital intrusions have brought cyberattacks to the forefront of Olympic organizers' minds. To learn more about the risk of cyberattacks on the Paris Olympics 2024, The Cyber Express has reached out to the organization. Paris Olympics 2024 replied, stating that scammers are impersonating Paris 2024 to target unsuspecting victims.

Scams and Cyberattacks on Paris Olympics 2024

A spokesperson for Paris Olympics 2024 further explained the full extent of cyberattacks and scams targeting the event. Among the ongoing scams, a fraudulent scheme has emerged, with scammers posing as representatives of Paris 2024 or On Location, employing deceptive tactics such as fake emails, sales materials, and legal documents to lure businesses into purported Olympic venue deals. The appeal for the Olympic and Paralympic Games is generating scam attempts by companies posing as Paris 2024 or On Location, the exclusive supplier of hospitality for Paris 2024, to offer fictitious services in connection or in relation with the Games", stated the spokesperson. These scammers target restaurants, shopkeepers, and others, promising slots at hypothetical Olympic venues during the Games and demanding deposits. Paris 2024 and On Location have taken legal action, filing criminal complaints for offenses including fraud, identity theft, and counterfeiting. Victims are encouraged to report incidents to the French police or contact the following addresses: integrityandenforcement@paris2024.org and alertfraud@onlocationexp.com. Paris 2024 emphasizes vigilance, urging individuals to reach out to designated email addresses for assistance if suspicious.

The Paris Olympics 2024 Cybersecurity Plan 

In a conversation with TCE, Paris Olympics 2024 emphasized the significance of the Olympic and Paralympic Games, highlighting them as unparalleled opportunities for a country's image enhancement. They acknowledged the vast audience of billions of television viewers and the multifaceted challenges they entail: technical, technological, and human. Addressing cybersecurity concerns, they outlined a comprehensive strategy built on three pillars: anticipation, coordination, and expertise. This strategy encompasses both the Organizing Committee's systems and those of their external suppliers and partners. By collaborating with government departments, the International Olympic Committee (IOC), and key partners like Atos, Cisco, and Orange, they aim to mitigate any cybersecurity risk during the games. "Our cybersecurity strategy covers both the systems directly under the responsibility of the Organizing Committee, and the external systems of our suppliers and partners, which means we are already preparing external partners to all the risks", said a Paris Olympics 2024 spokesperson. During the Games, various entities, including a Technology Operations Center (TOC), a Cybersecurity Operations Center (CSOC), and the National Strategic Command Center (CNCS), will operate in seamless coordination. These centers will bring together the expertise of the Paris 2024 cybersecurity team and their partners, establishing physical hubs in undisclosed locations around Paris.

The Biggest Challenge for Cybersecurity Experts 

The upcoming Paris Olympics 2024, which are expected to draw over 4 billion viewers, pose a substantial cybersecurity challenge. With ten million spectators, 20,000 journalists, and 15,000 athletes from 206 countries converging on Paris, the scale of the event magnifies the risk. The array of potential cyber threats includes cybercriminals, hacktivists, and even state-sponsored actors, all aiming to disrupt the Games. Their targets range from IT systems supporting press rooms and ticketing to stadium entry systems, TV broadcasts, and even the power supply to event venues. According to experts cited by The New York Times, hacking groups and nations like Russia, China, North Korea, and Iran possess sophisticated capabilities capable of crippling not only computer networks but also digital ticketing systems and event timing systems. The 2018 Pyeongchang Winter Olympics in South Korea serves as a stark reminder of the real-world implications of cyberattacks on major sporting events. A successful attack during the opening ceremony caused widespread disruption, with the Wi-Fi network failing, the official Olympics smartphone app malfunctioning, and broadcast drones being grounded. With the Paris Olympics 2024 drawing closer, the spotlight is on cybersecurity, highlighting the critical need for robust defenses against potential cyber threats that could undermine the integrity and smooth functioning of this global event. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

How thermal batteries are heating up energy storage

15 April 2024 at 06:30

We need heat to make everything from steel bars to ketchup packets. Today, a whopping 20% of global energy demand goes to producing heat used in industry, and most of that heat is generated by burning fossil fuels. In an effort to clean up industry, a growing number of companies are working to supply that heat with a technology called thermal batteries.

It’s such an exciting idea that MIT Technology Review readers have officially selected thermal batteries as the reader’s choice addition to our 2024 list of 10 Breakthrough Technologies. So here’s a closer look at what all the excitement is about.

Storing energy as heat isn’t a new idea—steelmakers have been capturing waste heat and using it to reduce fuel demand for nearly 200 years. But a changing grid and advancing technology have ratcheted up interest in the field. “This is a hot area,” says Jeffrey Rissman, senior director of industry at Energy Innovation, an energy and climate policy and research firm.

Renewable energy sources like wind and solar have seen prices fall dramatically in the past decade. However, these power sources are inconsistent, subject to daily and seasonal patterns. So with the rise in cheap renewable energy has come a parallel push to find ways to store it for applications that require a consistent power source.

Thermal energy storage could connect cheap but intermittent renewable electricity with heat-hungry industrial processes. These systems can transform electricity into heat and then, like typical batteries, store the energy and dispatch it as needed.

Rondo Energy is one of the companies working to produce and deploy thermal batteries. The company’s heat storage system relies on a resistance heater, which transforms electricity into heat using the same method as a space heater or toaster—but on a larger scale, and reaching a much higher temperature. That heat is then used to warm up carefully engineered and arranged stacks of bricks, which store the heat for later use. Air blown over the hot bricks can then be used to generate steam, or delivered directly to heat up equipment. 

By using common materials and designing equipment that can work with existing facilities, Rondo is working to show that its technology can integrate into a sector where cost is key. “We’re proving this is economical right now,” says John O’Donnell, the company’s CEO.

Rondo has been running its first commercial pilot at an ethanol plant in California since March 2023. The company is also scaling up, manufacturing equipment in a factory in Thailand that it’s already announced plans to expand.

A recently announced project with the beverage company Diageo will see Rondo’s heat batteries installed in a Kentucky whiskey distillery where Bulleit bourbon is made, along with one of Diageo’s other facilities. In March, the project got a boost from the US Department of Energy, which selected it to receive $75 million in funding as part of a larger push to clean up industrial emissions. 

Rondo is far from the only contender in the thermal battery space, which now includes companies using everything from molten salt and metal to crushed-up rocks to store heat.

Electrified Thermal Solutions is building thermal batteries that use thermally conductive bricks as both a heating element and a storage medium. Running an electrical current through the bricks generates heat, without the need for any separate component. Antora Energy similarly uses its carbon-based blocks to both generate and store heat. The company is also aiming to turn that heat back into electricity using thermophotovoltaic technology. 

While many companies want to install their storage solutions in industrial facilities, delivering heat, electricity, or both, some are aiming to offer grid-based energy storage to utilities. Malta, which spun out from X (formerly Google X) in 2018, is building technology that will take in electricity, store the energy as heat in a molten-salt system, and then re-generate electricity for use on the grid. 

Brenmiller Energy is among the most experienced players in thermal energy storage. The company, founded in 2011, makes modular systems that use crushed rocks to store heat. Its technology is currently operating at several facilities, including a beverage maker and a hospital.

To make a dent in industrial emissions, companies building thermal energy storage systems need to scale quickly. They’ll also need to convince customers to sign on for a new method of generating heat, a potentially difficult task in industries that can be conservative, says Doron Brenmiller, the company’s chief business officer.With industrial heat demand expected to continue growing this decade, there’s an urgent need to find cleaner options. Thermal batteries could be a key strategy for keeping factories running as efforts to cut their emissions warm up.

Correction: An earlier version of this article misstated the location of Rondo Energy’s factory. It is located in Thailand.

Jackson Hinkle Rides Rage Over Israel to Prominence

Jackson Hinkle’s incendiary commentary has generated over two million new followers on X since October — a surge that some researchers say is aided by inauthentic accounts.

© Ysa Pérez for The New York Times

Jackson Hinkle has become an online celebrity at age 24, a Gen Z symbol of the modern internet.

An A.I. Researcher Takes On Election Deepfakes

2 April 2024 at 13:07
Oren Etzioni was once an optimist about artificial intelligence. Now, his nonprofit, TrueMedia.org, is offering tools for fighting A.I.-manipulated content.

© Kyle Johnson for The New York Times

Oren Etzioni at The AI Institute.

No “Apple magic” as 11% of macOS detections last year came from malware

5 March 2024 at 06:21

We’re going to let you in on a little cybersecurity secret… There’s malware on Mac computers. There pretty much always has been.

As revealed in our 2024 ThreatDown State of Malware report, a full 11% of all detections recorded by Malwarebytes on Mac computers in 2023 were for different variants of malware—the catch-all term that cybersecurity researchers use to refer to ransomware, trojans, info stealers, worms, viruses, and more.

That 11% figure may not sound imposing but remember that many people today still believe that Apple devices, including Mac computers, are invulnerable to cyberinfections because of some sort of vague “Apple magic.”

In reality, “Apple magic” is more a byproduct of old advertising (this 2006 commercial from the “I’m a Mac, and I’m a PC” series did irreparable harm) and faulty conclusions concerning cybersecurity’s biggest breaches and attacks: People mistakenly believe that because most attacks target Windows computers and servers, no attacks target Macs.

The truth is far more nuanced, as the visible, overwhelming focus of cyberattacks on Windows machines is a consequence of Microsoft’s long-standing success in business computing.

For decades, every multinational corporation, every local travel agency, every dentist, every hospital, every school, government, and city hall practically ran on Windows. This mass adoption was good for Microsoft and its revenue, but it also drew and maintained the interests of cybercriminals, who would develop malware that could impact the highest number of victims. This is why the biggest attacks, even today, predominantly target Windows-based malware and the sometimes-unpatched vulnerabilities found in Windows software and applications.  

Essentially, as Windows is the biggest target, cybercriminals zero in their efforts respectively.

But new information last year revealed that could all be changing.

Mac malware tactics shifted in 2023

Apple’s desktop and laptop operating system, macOS, represents a 31% share of US desktop operating systems, and roughly 25% of all businesses reportedly utilize Mac devices somewhere in their networks.

Already, the cybercriminals have taken note.

In April 2023, the most successful and dangerous ransomware in the world—LockBit—was found to have a variant developed for Mac. Used in at least 1,018 known attacks last year, LockBit ransomware, and the operators behind it, destroyed countless businesses, ruined many organizations, and, according to the US Department of Justice, brought in more than $120 million before being disrupted by a coordinated law enforcement effort in February of this year.

While the LockBit variant for Mac was not operational upon discovery, the LockBit ransomware gang said at the time that it was “actively being developed.” Fortunately, LockBit suffered enormous blows this year, and the ransomware gang is probably less concerned with Mac malware development and more concerned with “avoiding prison.”

Separately, in September 2023, Malwarebytes discovered a cybercriminal campaign that tricked Mac users into accidentally installing a type of malware that can steal passwords, browser data, cookies, files, and cryptocurrency. The malware, called Atomic Stealer (or AMOS for short) was delivered through “malvertising,” a malware delivery tactic that abuses Google ads to send everyday users to malicious websites that—though they may appear legitimate—fool people into downloading malware.

In this campaign, when users searched on Google for the financial marketing trading app “TradingView,” they were sometimes shown a malicious search result that appeared entirely authentic: a website with TradingView branding was visible, and download buttons for Windows, Mac, and Linux were clearly listed.

But users who clicked the Mac download button instead received AMOS.

This malvertising site mimics TradingView to fool users into downloading malware for different operating systems.

Just months later, AMOS again wriggled its way onto Mac computers, this time through a new delivery chain that has more typically targeted Windows users.

In November, Malwarebytes found AMOS being distributed through a malware delivery chain known as “ClearFake.” The ClearFake campaign tricks users into believing they’re downloading an approved web browser update. That has frequently meant a lot of malicious prompts mimicking Google Chrome’s branding and update language, but the more recent campaign imitated the default browser on Mac devices—Safari.

A template is used that mimics the official Apple websites and webpages to convince users into downloading a Safari “update” that instead contains malware.

As Malwarebytes Labs wrote at the time:

“This may very well be the first time we see one of the main social engineering campaigns, previously reserved for Windows, branch out not only in terms of geolocation but also operating system.”

Replace “magic” with Malwarebytes

Cyberthreats on Mac aren’t non-existent, they’re just different. But different threats still need effective protection, which is where Malwarebytes Premium can help.

Malwarebytes Premium detects and blocks the most common infostealers that target Macs—including AMOS—along with annoying browser hijackers and adware threats such as Genieo, Vsearch, Crossrider, and more. Stay protected, proactively, with Malwarebytes Premium for Mac.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Malvertising: This cyberthreat isn’t on the dark web, it’s on Google

20 February 2024 at 06:07

On the internet, people need to worry about more than just opening suspicious email attachments or entering their sensitive information into harmful websites—they also need to worry about their Google searches.

That’s because last year, as revealed in our 2024 ThreatDown State of Malware report, cybercriminals flocked to a malware delivery method that doesn’t require they know a victim’s email address, login credentials, personal information, or, anything, really.

Instead, cybercriminals just need to fool someone into clicking on a search result that looks remarkably legitimate.

This is the work of “malicious advertising,” or “malvertising,” for short. Malvertising is not malware itself. Instead, it’s a sneaky process of placing malware, viruses, or other cyber infections on a person’s computer, tablet, or smart phone. The malware that eventually slips onto a person’s device comes in many varieties, but cybercriminals tend to favor malware that can steal a person’s login credentials and information. With this newly stolen information, cybercriminals can then pry into sensitive online accounts that belong to the victim.

But before any of that digital theft can occur, cybercriminals must first ensnare a victim, and they do this by abusing the digital ad infrastructure underpinning Google search results.

Think about searching on Google for “running shoes”—you’ll likely see ads for Nike and Adidas. A Google search for “best carry-on luggage” will invariably produce ads for the consumer brands Monos and Away. And a Google search for a brand like Amazon will show, as expected, ads for Amazon.

But cybercriminals know this, and in response, they’ve created ads that look legitimate, but instead direct victims to malicious websites that carry malware. The websites themselves, too, bear a striking resemblance to whatever product or brand they’re imitating, so as to maintain a charade of legitimacy. From these websites, users download what they think is a valid piece of software, instead downloading malware that leaves them open to further attacks.

A malicious ad for the KeePass password manager appears as a legitimate ad.
The real KeePass website (left) side-by-side with a malvertising site (right).

It’s true that malvertising is often understood as a risk to businesses, but the copycat websites that are created by cybercriminals can and often do impersonate popular brands for everyday users, too.

As revealed in our 2024 ThreatDown State of Malware report, the five most impersonated brands for malvertising last year included:

  1. Amazon
  2. Rufus
  3. Weebly
  4. NotePad++
  5. TradingView

These five brands may not all carry the same familiarity, but their products and services capture a broad swath of user interest, from Weebly’s website creation products, to TradingView’s investment trading platform, to Rufus’s niche-but-useful portable OS booting tool.

Why the increase in malvertising last year?

If Google ads have been around for more than a decade, why are they only being abused by cybercriminals now? The truth is, malvertising has been around for years, but a particular resurgence was recorded more recently.

In 2022, cybercriminals lost access to one of their favorite methods of delivering malware.

That summer, Microsoft announced that it would finally block “macros” that were embedded into files that were downloaded from the internet. Macros are essentially instructions that users can program so that multiple tasks can be bundled together. The danger, though, is that cybercriminals would pre-program macros within certain files for Microsoft Word, Excel, or PowerPoint, and then send those files as malicious email attachments. Once those attachments were downloaded and opened by users, the embedded macros would trigger a set of instructions directing a person’s computer to install malware from a dangerous website online.

Macros were a scourge for cybersecurity for years, as they were effective and easy to deliver.

But when Microsoft restricted macro capabilities in 2022, cybercriminals needed to find another malware delivery channel. They focused on malvertising.

Today’s malvertising is increasingly sophisticated, as cybercriminals can create and purchase online ads that target specific types of users based on location and demographics. Concerningly, modern malvertising can even avoid basic fraud detection as cybercriminals can create websites that determine whether a user is a real person or simply a bot that is trawling the web to find and flag malicious activity.

How to protect against malvertising

The threat of malvertising is multi-layered: There are the fraudulent ads that cybercriminals place on Google search results, the malicious websites that imitate legitimate brands and companies to convince users to download malware, and the malware infection itself.

As such, any successful defense strategy must be multi-layered.

For safe browsing, people can rely on Malwarebytes Browser Guard, a browser extension that blocks third-party tracking and flags malicious websites known to be in the control of cybercriminals. As we wrote before:

“Malwarebytes Browser Guard provides additional protection to standard ad-blocking features by covering a larger area of the attack chain all the way to domains controlled by attackers. Thanks to its built-in heuristic engine it can also proactively block never-before-seen malicious websites.”

The problem with malvertising, though, is that new malicious websites are created every single day. Cybersecurity defenders, then, are often caught in a game of catch-up.

Here, users can find safety from Malwarebytes Premium, which provides real-time protection to detect and stop any cyberthreats that get installed onto a device, even if those threats are masquerading as legitimate apps or software.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Update now! Microsoft fixes two zero-days on February Patch Tuesday

14 February 2024 at 08:17

Microsoft has issued patches for 73 security vulnerabilities in its February 2024 Patch Tuesday. Among these vulnerabilities are two zero-days that are reportedly being used in the wild.

The two zero-day vulnerabilities have already been added to the Cybersecurity & Infrastructure Security Agency’s catalog of  Known Exploited Vulnerabilities, based on evidence of active exploitation. This means that Federal Civilian Executive Branch (FCEB) agencies need to remediate these vulnerabilities by March 5, 2024, in order to protect their devices.

The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The zero-days patched in this round of updates are:

CVE-2024-21351 (CVSS score 7.6 out of 10): a Windows SmartScreen security feature bypass vulnerability. The vulnerability allows a malicious actor to inject code into SmartScreen and potentially gain code execution, which could potentially lead to some data exposure, lack of system availability, or both. An authorized attacker must send the user a malicious file and convince the user to open it.

CVE-2024-21412 (CVSS score 8.1 out of 10): an Internet Shortcut Files security feature bypass vulnerability. An unauthenticated attacker could send the targeted user a specially crafted file that is designed to bypass displayed security checks. However, the attacker would have no way to force a user to view the attacker-controlled content. Instead, the attacker would have to convince them to take action by clicking on the file link.

The bypassed security feature in both cases is the Mark of the Web (MOTW), the technology that ensures Windows pops a warning message when trying to open a file downloaded from the Internet. When a file is downloaded, Windows adds a ZoneId in the form of an Alternate Data Stream to the file which is responsible for the warning message(s).

Another vulnerability worth keeping an eye on is CVE-2024-21413 (CVSS score 9.8 out of 10): a Microsoft Outlook remote code execution (RCE) vulnerability. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and to gain high privileges, which include read, write, and delete functionality. Microsoft notes that the Preview Pane is an attack vector. The update guide for this vulnerability lists a number of required updates before protection is achieved.

Other vendors

Other vendors have synchronized their periodic updates with Microsoft. Here are few major ones that you may find in your environment.

Adobe has released security updates to address vulnerabilities in several products:

The Android Security Bulletin for February contains details of security vulnerabilities for patch level 2024-02-05 or later.

Ivanti has urged customers to patch yet another critical vulnerability.

SAP has released its February 2024 Patch Day updates.


We don’t just report on vulnerabilities—we identify them, and prioritize action.

Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using ThreatDown Vulnerability and Patch Management.

Fat Patch Tuesday, February 2024 Edition

13 February 2024 at 17:28

Microsoft Corp. today pushed software updates to plug more than 70 security holes in its Windows operating systems and related products, including two zero-day vulnerabilities that are already being exploited in active attacks.

Top of the heap on this Fat Patch Tuesday is CVE-2024-21412, a “security feature bypass” in the way Windows handles Internet Shortcut Files that Microsoft says is being targeted in active exploits. Redmond’s advisory for this bug says an attacker would need to convince or trick a user into opening a malicious shortcut file.

Researchers at Trend Micro have tied the ongoing exploitation of CVE-2024-21412 to an advanced persistent threat group dubbed “Water Hydra,” which they say has being using the vulnerability to execute a malicious Microsoft Installer File (.msi) that in turn unloads a remote access trojan (RAT) onto infected Windows systems.

The other zero-day flaw is CVE-2024-21351, another security feature bypass — this one in the built-in Windows SmartScreen component that tries to screen out potentially malicious files downloaded from the Web. Kevin Breen at Immersive Labs says it’s important to note that this vulnerability alone is not enough for an attacker to compromise a user’s workstation, and instead would likely be used in conjunction with something like a spear phishing attack that delivers a malicious file.

Satnam Narang, senior staff research engineer at Tenable, said this is the fifth vulnerability in Windows SmartScreen patched since 2022 and all five have been exploited in the wild as zero-days. They include CVE-2022-44698 in December 2022, CVE-2023-24880 in March 2023, CVE-2023-32049 in July 2023 and CVE-2023-36025 in November 2023.

Narang called special attention to CVE-2024-21410, an “elevation of privilege” bug in Microsoft Exchange Server that Microsoft says is likely to be exploited by attackers. Attacks on this flaw would lead to the disclosure of NTLM hashes, which could be leveraged as part of an NTLM relay or “pass the hash” attack, which lets an attacker masquerade as a legitimate user without ever having to log in.

“We know that flaws that can disclose sensitive information like NTLM hashes are very valuable to attackers,” Narang said. “A Russian-based threat actor leveraged a similar vulnerability to carry out attacks – CVE-2023-23397 is an Elevation of Privilege vulnerability in Microsoft Outlook patched in March 2023.”

Microsoft notes that prior to its Exchange Server 2019 Cumulative Update 14 (CU14), a security feature called Extended Protection for Authentication (EPA), which provides NTLM credential relay protections, was not enabled by default.

“Going forward, CU14 enables this by default on Exchange servers, which is why it is important to upgrade,” Narang said.

Rapid7’s lead software engineer Adam Barnett highlighted CVE-2024-21413, a critical remote code execution bug in Microsoft Office that could be exploited just by viewing a specially-crafted message in the Outlook Preview pane.

“Microsoft Office typically shields users from a variety of attacks by opening files with Mark of the Web in Protected View, which means Office will render the document without fetching potentially malicious external resources,” Barnett said. “CVE-2024-21413 is a critical RCE vulnerability in Office which allows an attacker to cause a file to open in editing mode as though the user had agreed to trust the file.”

Barnett stressed that administrators responsible for Office 2016 installations who apply patches outside of Microsoft Update should note the advisory lists no fewer than five separate patches which must be installed to achieve remediation of CVE-2024-21413; individual update knowledge base (KB) articles further note that partially-patched Office installations will be blocked from starting until the correct combination of patches has been installed.

It’s a good idea for Windows end-users to stay current with security updates from Microsoft, which can quickly pile up otherwise. That doesn’t mean you have to install them on Patch Tuesday. Indeed, waiting a day or three before updating is a sane response, given that sometimes updates go awry and usually within a few days Microsoft has fixed any issues with its patches. It’s also smart to back up your data and/or image your Windows drive before applying new updates.

For a more detailed breakdown of the individual flaws addressed by Microsoft today, check out the SANS Internet Storm Center’s list. For those admins responsible for maintaining larger Windows environments, it often pays to keep an eye on Askwoody.com, which frequently points out when specific Microsoft updates are creating problems for a number of users.

If only you had to worry about malware, with Jason Haddix: Lock and Code S05E04

12 February 2024 at 12:06

Today on the Lock and Code podcast

If your IT and security teams think malware is bad, wait until they learn about everything else.

In 2024, the modern cyberattack is a segmented, prolonged, and professional effort, in which specialists create strictly financial alliances to plant malware on unsuspecting employees, steal corporate credentials, slip into business networks, and, for a period of days if not weeks, simply sit and watch and test and prod, escalating their privileges while refraining from installing any noisy hacking tools that could be flagged by detection-based antivirus scans.

In fact, some attacks have gone so “quiet” that they involve no malware at all. Last year, some ransomware gangs refrained from deploying ransomware in their own attacks, opting to steal sensitive data and then threaten to publish it online if their victims refused to pay up—a method of extracting a ransom that is entirely without ransomware.

Understandably, security teams are outflanked. Defending against sophisticated, multifaceted attacks takes resources, technologies, and human expertise. But not every organization has that at hand.

What, then, are IT-constrained businesses to do?

Today, on the Lock and Code podcast with host David Ruiz, we speak with Jason Haddix, the former Chief Information Security Officer at the videogame developer Ubisoft, about how he and his colleagues from other companies faced off against modern adversaries who, during a prolonged crime spree, plundered employee credentials from the dark web, subverted corporate 2FA protections, and leaned heavily on internal web access to steal sensitive documentation.

Haddix, who launched his own cybersecurity training and consulting firm Arcanum Information Security this year, said he learned so much during his time at Ubisoft that he and his peers in the industry coined a new, humorous term for attacks that abuse internet-connected platforms: “A browser and a dream.”

“When you first hear that, you’re like, ‘Okay, what could a browser give you inside of an organization?'”

But Haddix made it clear:

“On the internal LAN, you have knowledge bases like SharePoint, Confluence, MediaWiki. You have dev and project management sites like Trello, local Jira, local Redmine. You have source code managers, which are managed via websites—Git, GitHub, GitLab, Bitbucket, Subversion. You have repo management, build servers, dev platforms, configuration, management platforms, operations, front ends. These are all websites.”

Tune in today.

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 4.0 License
http://creativecommons.org/licenses/by/4.0/
Outro Music: “Good God” by Wowa (unminus.com)
LLM Prompt Injection Game: https://gandalf.lakera.ai/


Overwhelmed by modern cyberthreats? ThreatDown can help.

The 2024 ThreatDown State of Malware report is a comprehensive analysis of six pressing cyberthreats this year—including Big Game ransomware, Living Off The Land (LOTL) attacks, and malvertising—with strategies on how IT and security teams can protect against them.

Ivanti urges customers to patch yet another critical vulnerability

9 February 2024 at 13:13

In a new blog post, Ivanti says that it has found another vulnerability and urges customers to “immediately take action to ensure you are fully protected”.

This vulnerability only affects a limited number of supported versions–Ivanti Connect Secure (version 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2 and 22.5R1.1), Ivanti Policy Secure version 22.5R1.1 and ZTA version 22.6R1.3.

Please read between the lines that there could be unsupported versions which will never see a patch for this vulnerability.

A patch is available now for Ivanti Connect Secure (versions 9.1R14.5, 9.1R17.3, 9.1R18.4, 22.4R2.3, 22.5R1.2, 22.5R2.3 and 22.6R2.2), Ivanti Policy Secure (versions 9.1R17.3, 9.1R18.4 and 22.5R1.2) and ZTA gateways (versions 22.5R1.6, 22.6R1.5 and 22.6R1.7).

Customers can access the patch via the standard download portal (login required). The instructions are somewhat complicated, to say the least. Due to all the different versions that are available, it is imperative to carefully read the instructions.

Customers can read this KB article for detailed instructions on how to apply the mitigation and apply the patch as each version becomes available. Please ensure you are following the KB article to receive updates. If you have questions or require further support, please log a case and/or request a call in the Success Portal.

Important to note:

  • Customers who applied the patch released on January 31 or February 1, and completed a factory reset of their appliance, do not need to factory reset their appliances again.
  • And once customers applied this newly released patch, they do not need to apply the mitigation or the patches released on January 31 and February 1. 

The vulnerability

The vulnerability, listed as CVE-2024-22024 with a CVSS score of 8.3 out of 10, allows an attacker to access certain restricted resources without authentication.

An XML external entity injection (XXE) is a web security vulnerability that allows an attacker to interfere with an application’s processing of XML data. It often allows an attacker to view files on the application server filesystem, and/or to interact with any back-end or external systems that the application itself can access.

Ivanti found the XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways.

Since Ivanti claims that the vulnerability came up during internal code reviews, it is unlikely that an exploit already exists, but this type of vulnerability is usually easy to exploit, so chances are, this will not take long.

Although we have seen a pretty convincing claim that they did not find it themselves:

According to Ivanti they are unaware of any evidence of customers being exploited by CVE-2024-22024.

Only a week ago all, FCEB agencies received intructions to disconnect vulnerable Ivanti products before the weekend. This because besides the Ivanti vulnerabilities actively exploited in massive numbers we wrote about on January 11, 2024, alerts went off about two new high severity flaws on January 31, 2024.

All in all, since January 10, five vulnerabilities have been reported in Ivanti products. And at least three of them are subject to active exploitation.


We don’t just report on vulnerabilities—we identify them, and prioritize action.

Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using ThreatDown Vulnerability and Patch Management.

❌
❌