Connect with us

Technology

CrowdStrike offers fully managed identity-threat detection • The Register

CrowdStrike is bringing its identity threat prevention technology to its managed detection and response (MDR) service, giving enterprises a chance to blunt the growing threat of identity-based attacks that has accelerated during the COVID-19 pandemic.

The cloud-based cybersecurity vendor on Wednesday unveiled Falcon Identity Threat Protection Complete, a fully managed service organizations can use to deploy automated protection and real-time detection of threats; obtain expert incident response after detection; and accelerate the time to respond to eliminate any danger. The service also claims to improve visibility throughout an enterprise’s systems through identity monitoring.

Identity threat is CrowdStrike’s term: it’s when, for instance, someone’s identity on a network is used by an unauthorized user to gain access to information they shouldn’t. It’s the abuse of one’s user account in the system, perhaps by using stolen or brute-forced login details or tokens.

The sudden shift to remote work fueled by the pandemic has accelerated the rise in stolen credentials being used in cybercrimes and other identity threats, Thomas Etheridge, senior vice president of services at CrowdStrike, told The Register.

According to CrowdStrike’s 2022 Global Threat Report, released last month, almost 80 per cent of cyberattacks “leverage identity-based attacks to compromise legitimate credentials and to use those credentials to support their living-off-of-the-land type of tactics,” Etheridge said. The proliferation of ransomware – there was an 82 per cent year-on-year jump in ransomware-related data leaks in 2021 – and the expansion of the attack surface through a lot of remote workers, creates an environment that lends itself to stolen credentials, he said.

“Being able to evade security teams, remain persistent in an environment and to be able to remain undetected in an environment, that’s really compelling,” Etheridge said.

“On the incident response side, when we are typically responding to a ransomware outbreak, a large portion of those events typically start with stolen credentials. A threat actor gained access to stolen credentials, was able to leverage those to sneak in through a managed RDP [Remote Desktop Protocol] connection and now they’re in the environment and they’re persistent.”

Pwned hook, line and sinker

The most common way threat actors gain access to identity data is through phishing or similar attacks, when an employee inadvertently clicks on a link or attachment, he said. The attacker will use the credentials, normally within 24 hours, to log into a system, giving them access to a company’s endpoints and the ability to leverage their access to privileged credentials to access systems.

“In today’s threat landscape, it’s a lot more than just stopping malware,” Etheridge said. “It’s really about protecting against adversaries that have the ability to take advantage of credential theft, stealing usernames and passwords to be able to get onto a system with relative ease and then blend in. That’s really difficult to detect.”

CrowdStrike has offered Falcon Identity Threat Protection as a standalone, cloud-based application before. The vendor’s cloud partners include Amazon Web Services (AWS), Google Cloud, and Red Hat, aimed at hybrid workloads running on the OpenShift container platform.

Now enterprises can access it as a managed service, which will open the tool up to a larger number of organizations that rely on managed services to augment their in-house security operations or to serve as their security program.

The growing complexity and number of cybersecurity threats is putting increasing pressure on enterprises, particularly those that don’t have the financial resources or personnel to keep up, which fueling the expansion of the managed security services space. According to Verified Market Research, the global market will is expected to grow from $19.76bn in 2020 to $58.15bn in 2028, an annual average of more than 14 per cent.

Adding to this is an ongoing shortage in skilled cybersecurity talent. A study from Information Systems Security Association last year, 95 per cent of the almost 500 cybersecurity professionals surveyed said the skills shortage hadn’t improved in recent years.

“Managed services providers can provide some of that additional horsepower to help organizations who might be either growing too fast and unable to hire quickly to ramp in the right technical skills and expertise to help them get to stay in front of attacks, but also for smaller organizations where budget and other concerns around having a large security footprint to do things like threat hunting and real-time remediation of endpoints,” Etheridge said.

To protect against identity threats, a key for enterprises is shrinking the attack surface by improving visibility into their identities and accounts, including how the accounts are provisioned and who has access to them. MDR services can help organizations implement and tune policies to prevent such issues as unauthorized administrative logins to workstations and to drive the adoption of technologies like multi-factor authentication, he said.

Such services also can help reduce the time enterprises take to respond to detections of identity-based attacks and to drive countermeasures, which makes it less likely the threat actor will be able to move laterally through the environment. ®

Source link

Global Affairs

Open Source Software (OSS) Supply Chain, Security Risks And Countermeasures

OSS Security Risks And Countermeasures

The software development landscape increasingly hinges on open source components, significantly aiding continuous integration, DevOps practices, and daily updates. Last year, Synopsys discovered that 97% of codebases in 2022 incorporated open source, with specific sectors like computer hardware, cybersecurity, energy, and the Internet of Things (IoT) reaching 100% OSS integration.

While leveraging open source enhances efficiency, cost-effectiveness, and developer productivity, it inadvertently paves a path for threat actors seeking to exploit the software supply chain. Enterprises often lack visibility into their software contents due to complex involvement from multiple sources, raising concerns highlighted in VMware’s report last year. Issues include reliance on communities to patch vulnerabilities and associated security risks.

Raza Qadri, founder of Vibertron Technologies, emphasizes OSS’s pivotal role in critical infrastructure but underscores the shock experienced by developers and executives regarding their applications’ OSS contribution. Notably, Qadri cites that 95% of vulnerabilities surface in “transitive main dependencies,” indirectly added open source packages.

Qadri also acknowledges developers’ long-standing use of open source. However, recent years have witnessed heightened awareness, not just among developers but also among attackers. Malware attacks targeting the software supply chain have surged, as demonstrated in significant breaches like SolarWinds, Kaseya, and the Log4j exploit.

Log4j’s widespread use exemplifies the consolidation of risk linked to extensively employed components. This popular Java-based logging tool’s vulnerabilities showcase the systemic dependency on widely used software components, posing significant threats if exploited by attackers.

Moreover, injection of malware into repositories like GitHub, PyPI, and NPM has emerged as a growing threat. Cybercriminals generate malicious versions of popular code to deceive developers, exploiting vulnerabilities when components are downloaded, often without the developers’ knowledge.

Despite OSS’s security risks, its transparency and visibility compared to commercial software offer certain advantages. Qadri points out the swift response to Log4j vulnerabilities as an example, highlighting OSS’s collaborative nature.

Efforts to fortify software supply chain security are underway, buoyed by multi-vendor frameworks, vulnerability tracking tools, and cybersecurity products. However, additional steps, such as enforcing recalls for defective OSS components and implementing component-level firewalls akin to packet-level firewalls, are necessary to fortify defenses and mitigate malicious attacks.

Qadri underscores the need for a holistic approach involving software bills of materials (SBOMs) coupled with firewall-like capabilities to ensure a comprehensive understanding of software contents and preemptive measures against malicious threats.

As the software supply chain faces ongoing vulnerabilities and attacks, concerted efforts are imperative to bolster security measures, safeguard against threats, and fortify the foundational aspects of open source components.


We Can’t Thank You Enough For Your Support!

By John Elf | Science, Technology & Business contributor VoiceOfEU.com Digital

— For more information: info@VoiceOfEU.com

— Anonymous news submissions: press@VoiceOfEU.com


Continue Reading

Culture

Choco: Revolutionizing The FoodTech Industry With Innovation & Sustainability | EU20

By Clint Bailey

— In the rapidly evolving world of food technology, European startup Choco has emerged as a pioneering force. With its website, Choco.com, this Berlin-based company is transforming the way food industry professionals operate by leveraging innovative digital solutions. By linking restaurants, distributors, suppliers, and producers on a single platform, Choco is streamlining the supply chain process while promoting sustainability.

Let’s explore the journey of Choco.com and its impact on the overall foodtech industry.


  1. Company: Choco Technologies GmbH
  2. Website: www.Choco.com
  3. Head Office: Berlin, Germany
  4. Year Established: 2018
  5. Founders: Choco was co-founded by Daniel Khachab, Julian Hammer, and Rogerio da Silva.
  6. Industry: Choco operates in the foodtech industry, specifically focusing on digitizing the supply chain for the food industry.
  7. Funding: Choco has secured significant funding rounds from investors, including Bessemer Venture Partners & Coatue Management.
  8. Market Presence: Choco has a strong presence in several European cities, including Berlin, Paris, London & Barcelona.
  9. Mission: Choco aims to revolutionize the food industry by leveraging technology to simplify supply chain management, promote sustainability, and reduce food waste.

Simplifying Supply Chain Management

One of the core focuses of Choco is to simplify supply chain management for food businesses. Traditionally, the procurement process in the food industry has been cumbersome and inefficient, with numerous intermediaries and manual processes. Choco’s digital platform replaces the traditional paper-based ordering system, allowing restaurants and suppliers to communicate and collaborate seamlessly.

Choco’s platform enables restaurants to place orders directly with suppliers, eliminating the need for phone calls, faxes, or emails. This not only saves time but also reduces the likelihood of errors and miscommunications.

By digitizing the ordering process, Choco improves transparency, making it easier for restaurants to compare prices, track deliveries, and manage inventory efficiently.

Streamlining Operations For Suppliers & Producers

Choco’s impact extends beyond restaurants. The platform also provides suppliers and producers with valuable tools to streamline their operations. By digitizing their product catalogs and integrating them into the Choco platform, suppliers can showcase their offerings to a wide network of potential buyers.

Suppliers benefit from increased visibility, enabling them to reach new customers and expand their market presence. Moreover, Choco’s platform helps suppliers manage their inventory, track orders, and plan deliveries effectively. These features enhance operational efficiency, reduce waste, and ultimately contribute to a more sustainable food system.

https://youtube.com/@choco233
YouTube Channel

Promoting Sustainability & Reducing Food Waste

Choco recognizes the critical importance of sustainability in the food industry. According to the United Nations, approximately one-third of the world’s food production goes to waste each year. By digitizing the supply chain and enabling more efficient ordering and inventory management, Choco actively works to combat this issue.

Air France – Deals & Destinations

Choco’s platform facilitates data-driven decision-making for restaurants, suppliers, and producers. By analyzing purchasing patterns & demand, Choco helps businesses optimize their inventory levels, reducing overstocking and minimizing food waste. Additionally, Choco supports local sourcing, enabling businesses to connect with nearby suppliers & promote sustainable, community-based practices.

Expanding Reach & Impact

Since its founding in 2018, Choco has experienced rapid growth and expansion. The startup has successfully secured significant funding rounds, allowing it to scale its operations and establish a strong presence across Europe and other global markets. Today, Choco’s platform is used by thousands of restaurants and suppliers, revolutionizing the way they operate.

Choco’s impact extends beyond operational efficiency or sustainability. By connecting restaurants, suppliers & producers on a single platform, Choco fosters collaboration & encourages the exchange of ideas. This collaborative approach strengthens the overall foodtech ecosystem and creates a supportive community of like-minded aiming to drive positive change within the industry.

Future Of FoodTech

Choco’s rise to prominence in the foodtech industry exemplifies the reach of sustainability, innovation, and community. Through its user-friendly platform, Choco simplifies supply chain management, streamlines operations for restaurants & suppliers, and actively promotes sustainable practices. By harnessing the potential of digital, Choco is disrupting the future of the food industry, making it more efficient and transparent.

As Choco continues to expand its impact and reach, its transformative influence on the foodtech sector is set to inspiring, grow other startups, and established players to embrace technology for a better and more sustainable food system.


We Can’t Thank You Enough For Your Support!


— Compiled by Clint Bailey | Team ‘Voice of EU’
— For More Info. & News Submissions: info@VoiceOfEU.com
— For Anonymous News Submissions: press@VoiceOfEU.com


Continue Reading

Current

The Implications Of Controlling High-Level Artificial Super Intelligence (ASI)

Artificial Super Intelligence (ASI)

By Clint Bailey | ‘Voice of EU’

The notion of artificial intelligence surpassing humanity has long been a topic of discussion, and recent advancements in programs have reignited concerns. But can we truly control super-intelligence? A closer examination by scientists reveals that the answer is highly unlikely.

Unraveling The Challenge:

Controlling a super-intelligence that surpasses human comprehension necessitates the ability to simulate and analyze its behavior. However, if we are unable to comprehend it, creating such a simulation becomes an impossible task. This lack of understanding hinders our ability to establish rules, such as “cause no harm to humans,” as we cannot anticipate the scenarios that an AI might generate.

The Complexity Of Super-Intelligence:


Super-intelligence presents a distinct challenge compared to conventional robot ethics. Its multifaceted nature allows it to mobilize diverse resources, potentially pursuing objectives that are incomprehensible and uncontrollable to humans. This fundamental disparity further complicates the task of governing and setting limits on super-intelligent systems.

Drawing Insights From The Halting Problem:


Alan Turing’s halting problem, introduced in 1936, provides insights into the limitations of predicting program outcomes. While we can determine halting behavior for specific programs, there is no universal method capable of evaluating every potential program ever written. In the realm of artificial super-intelligence, which could theoretically store all possible computer programs in its memory simultaneously, the challenge of containment intensifies.

The Uncontainable Dilemma:


When attempting to prevent super-intelligence from causing harm, the unpredictability of outcomes poses a significant challenge. Determining whether a program will reach a conclusion or continue indefinitely becomes mathematically impossible for all scenarios. This renders traditional containment algorithms unusable and raises concerns about the reliability of teaching AI ethics to prevent catastrophic consequences.

Air France – Deals & Special Offers

The Limitation Conundrum:


An alternative approach suggested by some is to limit the capabilities of super-intelligence, such as restricting its access to certain parts of the internet or networks. However, this raises questions about the purpose of creating super-intelligence if its potential is artificially curtailed. The argument arises: if we do not intend to use it to tackle challenges beyond human capabilities, why create it in the first place?

READ: ALL ABOUT ARTIFICIAL INTELLIGENCE

Urgent Reflection – The Direction Of Artificial Intelligence:


As we push forward with artificial intelligence, we must confront the possibility of a super-intelligence beyond our control. Its incomprehensibility makes it difficult to discern its arrival, emphasizing the need for critical introspection regarding the path we are treading. Prominent figures in the tech industry, such as Elon Musk and Steve Wozniak, have even called for a pause in AI experiments to evaluate safety and potential risks to society.

The potential consequences of controlling high-level artificial super-intelligence are far-reaching and demand meticulous consideration. As we strive for progress, we must strike a balance between pushing the boundaries of technology and ensuring responsible development. Only through thorough exploration and understanding can we ensure that AI systems benefit humanity while effectively managing their risks.


We Can’t Thank You Enough For Your Support!


By Clint Bailey, Team ‘THE VOICE OF EU

— For Information: Info@VoiceOfEU.com

— For Anonymous News Submissions: Press@VoiceOfEU.com


Continue Reading

Trending

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates 
directly on your inbox.

You have Successfully Subscribed!