Are Ukraine’s drone capabilities being throttled in Russia-Ukraine conflict?

Read Time:31 Second

Chinese drone producer DJI Global has been accused of limiting the capabilities of its AeroScope technology for the Ukrainian army, giving a significant air reconnaissance edge to Russian invaders amid the Russia-Ukraine conflict. The unconfirmed claims were made by a Twitter user on March 10.

Volodymyr Shymanskyy, co-founder of Blynk IoT Platform, made the claims on Twitter. He said his information comes from its working group within the Ukrainian Forces. A DJI spokesperson in the U.S. rebuffed the accusations, stating that a technical problem is responsible for some systems malfunctioning in Ukraine.

To read this article in full, please click here

Read More

Nearly 70% of tested ServiceNow instances leaking data

Read Time:30 Second

A configuration error in the SaaS platform of an S&P 500 company is leaking data on the internet. News of the misconfiguration mistake found in nearly 70% of ServiceNow instances tested was reported Wednesday by AppOmni, a SaaS security provider.

According to AppOmni, the misconfiguration resulted from a combination of customer-managed configurations and over-provisioning of permissions to guest users. ServiceNow has more than 25,000 customers, most of them with 50 to 200 employees and with revenues in the $1 million to $10 million range.

To read this article in full, please click here

Read More

Operationalizing a “think like the enemy” strategy

Read Time:39 Second

Security professionals have always been told to “think like the enemy.”  This philosophy could start with a series of questions like: How could an adversary gain a foothold in one of our systems? How would they circumvent our security controls? How would they find and exfiltrate our sensitive data? Armed with knowledge about what an adversary would do, security teams could then design countermeasures to impede or even stop the bad guys in the tracks.

Good strategy, but most security professionals don’t have the knowledge or skills to take an adversary’s perspective. CISOs, recognizing the value of thinking like the enemy, have overcome this deficit by conducting penetration testing or red teaming exercises, attacking themselves to test their defenses.   

To read this article in full, please click here

Read More

linux-firmware-20220310-130.fc34

Read Time:1 Minute, 5 Second

FEDORA-2022-e5c03af85e

Packages in this update:

linux-firmware-20220310-130.fc34

Update description:

Update to upstream 20220310 linux firmware release:

Update AMD cpu microcode
ath11k: add links for WCN6855 hw2.1
ath11k: WCN6855 hw2.0: add WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3
ath11k: WCN6855 hw2.0: add board-2.bin and regdb.bin
add firmware for MT7986
update firmware for MT7921 WiFi device
update firmware for mediatek bluetooth chip(MT7921)
amdgpu: update picasso/raven/raven2 VCN firmware
amdgpu: Update GPU firmwares to the 21.50 release
amdgpu: add firmware for SDMA 5.2.7 IP block
amdgpu: add firmware for PSP 13.0.8 IP block
amdgpu: add firmware for DCN 3.1.6 IP block
amdgpu: add firmware for GC 10.3.7 IP block
rtw89: 8852a: update fw to v0.13.36.0
iwlwifi: add/Update new FWs from core68-60 release
Update Intel Bluetooth FW for 7265/8260/8265/9260/9462/9560/AX2xx
Update AMD SEV firmware
Mellanox: Add new mlxsw_spectrum firmware xx.2010.1406
rtl_bt: Update RTL8852A BT USB firmware to 0xDFB7_6D7A
rtl_bt: Update RTL8822C BT USB firmware to 0x19B7_6D7D
rtl_bt: Update RTL8822C BT UART firmware to 0x15B7_6D7D
wfx: update to firmware 3.14
wfx: add antenna configuration files

Read More