Purported massive leak of Russian soldiers’ data could sink morale, digital security

Read Time:49 Second

In what security experts say is an unprecedented wartime leak, Ukrainian newspaper Ukrayinska Pravda published what it claims are the personal details of 120,000 Russian service personnel fighting in Ukraine. The nearly 6,000 pages of information, if accurate, contain names, registration numbers, and place of service for well over half of the estimated number of Russian soldiers who have invaded Ukraine.

The data was obtained by a Ukrainian think tank called The Center for Defense Strategies, which was created to monitor defense reforms and develop key government policies affecting Ukraine’s security and defense sector, with a particular focus on building independent analytical capabilities “at the level of the United States and Britain.” The Center is headed by former Ukraine Defense Minister Andriy Zahorodniuk. Its board includes international security expert Alina Frolova, state asset management expert Oleksiy Martsenyuk, former Ukrainian Foreign Minister Volodymyr Ohryzko, and economic and energy security expert Oleksandr Kharchenko.

To read this article in full, please click here

Read More

​​​​​​​Staying safe online when you live off-grid

Read Time:3 Minute, 9 Second

This blog was written by an independent guest blogger.

Over 250,000 people in the US live off the grid, meaning they do not rely on public utilities such as electricity and water. Their aim is generally to live more independently and self-sufficiently, rely on solar or other eco-friendly technologies, and build a stronger connection with nature. However, most people who choose this lifestyle are very much reliant on the Internet. Over 4.7 million people work remotely at least part-time in the US, and most need to keep in touch with clients and colleagues via the Internet. Online connections are also key for security systems and communication. If you are living off-grid, what cybersecurity risks could you be exposed to and how can you avoid them?

Off-grid and on the move

Those who live off-grid in RVs usually rely on one of two sources of power to connect to the Internet. One is their cell phone, which can be used as a wireless hub. Another is via Satellite, which is generally more costly, but which guarantees Internet access regardless of where the user is (except for underground surfaces, of course). Regardless of the system users choose, they should follow a variety of measures—including using strong passwords, relying on fingerprint logins, using only authorized or well-reputed apps, disabling location services when these are unnecessary, using remote wiping software, backing up their phone often and keeping their software updated.

Cyber vulnerabilities in security systems

Because RV users change the place they call ‘home’ often, many install mobile home security cameras. These can have handy features like panic buttons, night vision, motion detectors and alerts, and similar. Quality systems usually have cloud storage, which allows for live view and playback. However, security systems have specific cyber vulnerabilities—including human error, outdated systems, and poor maintenance. If you live in an RV, invest in device lifecycle management and be proactive with respect to maintenance. Install updates when the manufacturer makes them available, secure the entire network (including devices) your security system supports, and have strict access policies in place.

Risks faced by homes with solar energy

If you are relying on solar energy for your online needs, you can be attacked by cybercriminals in a similar fashion to if you relied on fuel-based energy. In the past, this risk was much smaller for solar energy, since very few systems were deployed and most solar inverters (which convert direct current electricity to alternating current electricity) did not communicate for monitoring purposes. However, as more solar power is installed and inverters become more sophisticated, the data of inverters can be hacked and manipulated. Therefore, it is vital to keep the software that controls your inverter updated and safe. 

Different layers of protection

Security software alerts you if there is any abnormal behavior though in reality, keeping your system safe against hackers involves various ‘layers’ of protection. In addition to installing anti-virus software in components like inverters, you should also install anti-virus protection on the firewalls and servers that integrate your solar energy into the wider system of grid operation. You can also control who has access to your system, either physical or online.

Conclusion

A quarter of a million people in the US live off the grid, with some using renewable energies to power their homes and others relying on their cell phone or satellite. Those living on solar energy can face attacks to their inverters and other systems. Those in RVs, meanwhile, can be vulnerable to equipment such as security systems. Updating software, maintaining systems proactively, and using various layers of prediction can all help off-grid residents enjoy the benefits of the Internet while keeping their devices and data safe against attacks.

Read More

New CSO appointments in India

Read Time:32 Second

With security taking centre stage across the enterprise, the role of the CSO or CISO is becoming increasingly complex and challenging, but exciting, nonetheless. As these executives find new roles in which they can bring their experience and vision to bear, we’ll keep you up to date on new appointments and movements in the world of cybersecurity.

If you have any appointment or job news to share, please let us know.

February 2022

Airtel appoints Varun Singla as CISO

Varun Singla has joined Airtel as chief information and security officer. Previously, he was CSO at Micron Technology.

To read this article in full, please click here

Read More

3 steps to supply chain resilience

Read Time:39 Second

The COVID pandemic has taught us a lot of things, one of which is that supply chain resilience matters a lot. Having a resilient supply chain in the business sense can be the difference between thriving under dynamic market conditions or experiencing critical business disruptions, including those caused by cyberattacks. These disruptions can not only have an impact on your revenue. but they also can impact your organizational brand and market reputation.

The modern business ecosystem is an increasingly complex web of relationships and exchanges of goods and services. Everyone is essentially someone else’s vendor. This point isn’t lost on malicious actors, as we’ve seen an increase in supply chain attacks, particularly in the digital domain.

To read this article in full, please click here

Read More

radare2-5.6.4-1.el8

Read Time:54 Second

FEDORA-EPEL-2022-49fa7851f7

Packages in this update:

radare2-5.6.4-1.el8

Update description:

Bugfix release.
fixes CVE-2022-0518 2055256, 2055130 – https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa
fixes CVE-2022-0519 2055103, 2055104 – https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5
fixes CVE-2022-0520 2055145, 2055146 – https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8
fixes CVE-2022-0521 2055043, 2055044 – https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5
fixes CVE-2022-0522 2055029, 2055030 – https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6
fixes CVE-2022-0523 2055152, 2055153 – https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269
fixes CVE-2022-0559 2055256. 2055257 – https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e
fixes CVE-2022-0676 2056758, 2056759 – https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6
fixes CVE-2022-0712 2057173, 2057174, 2057175, 2057176 – https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7
fixes CVE-2022-0713 2057707, 2057708, 2057709, 2057710 – https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1
fixes CVE-2022-0476 2057712, 2057713, 2057714, 2057715 – https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b
fixes CVE-2022-0695 2058522, 2058523, 2058525 – https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf

Read More

radare2-5.6.4-1.fc36

Read Time:54 Second

FEDORA-2022-85b277e748

Packages in this update:

radare2-5.6.4-1.fc36

Update description:

Bugfix release.
fixes CVE-2022-0518 2055256, 2055130 – https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa
fixes CVE-2022-0519 2055103, 2055104 – https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5
fixes CVE-2022-0520 2055145, 2055146 – https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8
fixes CVE-2022-0521 2055043, 2055044 – https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5
fixes CVE-2022-0522 2055029, 2055030 – https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6
fixes CVE-2022-0523 2055152, 2055153 – https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269
fixes CVE-2022-0559 2055256. 2055257 – https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e
fixes CVE-2022-0676 2056758, 2056759 – https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6
fixes CVE-2022-0712 2057173, 2057174, 2057175, 2057176 – https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7
fixes CVE-2022-0713 2057707, 2057708, 2057709, 2057710 – https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1
fixes CVE-2022-0476 2057712, 2057713, 2057714, 2057715 – https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b
fixes CVE-2022-0695 2058522, 2058523, 2058525 – https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf

Read More

News, Advisories and much more

Exit mobile version