Archive for October 24, 2024

Zoho Corporation to Leverage NVIDIA NeMo to Build LLMs

Posted in Commentary with tags on October 24, 2024 by itnerd

Zoho Corporation, a global technology company headquartered in Chennai, announced today that it will be leveraging the NVIDIA AI accelerated computing platform – which includes NVIDIA NeMo, part of NVIDIA AI Enterprise software – to build and deploy its large language models (LLMs) in its SaaS applications. Once the LLMs are built and deployed, they will be available to Zoho Corporation’s 700,000+ customers across ManageEngine and Zoho.com globally. Over the past year, the company has invested more than USD 10 million in NVIDIA’s AI technology and GPUs, and plans to invest an additional USD 10 million in the coming year.

Zoho prioritises user privacy from the outset to create models that are compliant with privacy regulations from the ground up, rather than retrofitting them later. Its goal is to help businesses realize ROI swiftly and effectively by leveraging the full stack of NVIDIA AI software and accelerated computing to increase throughput and reduce latency.

Zoho has been building its own AI technology for over a decade and adding it contextually to its wide portfolio of over 100 products across its ManageEngine and Zoho divisions. Its approach to AI is multi-modal, geared towards deriving contextual intelligence that can help users make business decisions. The company is building narrow, small and medium language models, which are distinct from LLMs. This provides options for using different size models in order to provide better results across a variety of use cases. Relying on multiple models also means that businesses that do not have a large amount of data can still benefit from AI. Privacy is also a core tenet in Zoho’s AI strategy, and its LLM models will not be trained on customer data.

Through this collaboration, Zoho will be accelerating its LLMs on the NVIDIA accelerated computing platform with NVIDIA Hopper  GPUs, using the NVIDIA NeMo end-to-end platform for developing custom generative AI—including LLMs, multimodal, vision, and speech AI. Additionally, Zoho is testing NVIDIA TensorRT-LLM to optimize its LLMs for deployment, and has already seen a 60% increase in throughput and 35% reduction in latency compared with a previously used open-source framework. The company is also accelerating other workloads like speech-to-text on NVIDIA accelerated computing infrastructure.

Easterseals Pwned By Ransomware Group

Posted in Commentary with tags on October 24, 2024 by itnerd

Disability nonprofit Easterseals filed a breach notification with regulators after the Rhysida ransomware group attempted to extort $1.3 million from the organization this week.

Easterseals, which provides support to disabled children, seniors, military veterans and others, stated that on April 1 its Peoria-based Central Illinois location “experienced a network disruption that impacted the functionality and access of certain systems.”

The investigation determined that the bad actor accessed certain files from Easterseals’ network, some of which includes personal information of almost 15,000 individuals, such as:

  • Full names
  • Addresses
  • Driver’s licenses
  • SSNs 
  • Medical information
  • Passports 

The nonprofit serves more than 1.5 million people across the country and provides additional services to 100,000 physicians. Easterseals says that more than 80% of its fundraising is spent directly on care for the disabled. 

Stephen Gates, Principal Security SME, Horizon3.ai had this to say:

  “Nonprofits are no longer immune to cyberattacks, despite their humanitarian missions. Attackers likely target them for three main reasons: their vast stores of confidential donor data, often weak security postures, and constrained IT budgets. These organizations face the growing challenge of doing more with less.

  “Now is the time for non-profits to conduct thorough assessments of their networks, identifying blind spots beyond just known vulnerabilities. Easily compromised credentials, exposed data, misconfigurations, weak security controls, and inadequate policies are significant threats. The cost of traditional, human-led risk assessments can be prohibitive, but autonomous solutions are now available to deliver affordable, efficient assessments that anyone can use.”

This of course isn’t good. But it does illustrate that any sector is a target from threat actors like these. Thus every group needs to do what they need to do to keep threat actors out, and by extension not become the next headline.

TELUS originals celebrates 10 years of powerful storytelling 

Posted in Commentary with tags on October 24, 2024 by itnerd

TELUS is celebrating the 10-year anniversary of TELUS originals and a decade of empowering independent Canadian and Indigenous filmmakers creating compelling, social-purpose driven documentaries and docuseries that inspire change and connect communities. Since 2014, TELUS originals has invested more than $27 million, bringing over 350 projects to screens across Canada and highlighting the diverse stories of British Columbia and Alberta. Viewers can watch these powerful TELUS original films on Optik TV channel 8, via TELUS Stream+ and for free at watch.telusoriginals.com

This fall alone, 10 TELUS original films, including Ari’s Theme, The Chef and the Daruma, Curl Power and Iniskim – Return of the Buffalo, were selected by top-tier Western Canadian film festivals in Vancouver, Calgary and Edmonton, underscoring the positive impact of the program for Canadian storytellers, local communities and the country’s film industry at large.

To celebrate the 10-year anniversary of TELUS originals, viewers are invited to explore the diverse range of new TELUS originals content including Aitamaako’tamisskapi Natosi: Before the SunThe Interceptors, and Handle With Care: The Legend of the Notic Streetball Crew available on TELUS Optik TV channel 8, via Stream+ and online at watch.telusoriginals.com

For more information about TELUS originals, visit watch.telusoriginals.com

Introducing Layer 7 Policy Routes and Outbound Rules in EnGenius Cloud

Posted in Commentary on October 24, 2024 by itnerd

EnGenius has announced the launch of two new powerful features in EnGenius Cloud and the VPN Router ESG series: Layer 7 Policy Routes and Outbound Rules. These enhancements offer a more granular level of control over your network traffic, allowing you to optimize performance, improve security, and streamline your management efforts.

Layer 7 Policy-based Route

You can create policy-based routing rules to direct specific applications to different WAN interfaces without specifying IP addresses or port ranges

The Benefits

  • Optimized Traffic Management: Direct critical applications to a primary WAN while routing less important traffic to a secondary WAN
  • Enhanced Network Performance: Improve network efficiency by balancing load between WAN interfaces based on application
  • Simplified Rule Management: No need to update routing rules for changing IP addresses or port ranges

Layer 7 Firewall Rules:

You can create firewall rules to block specific applications without specifying IP addresses or port ranges. This feature is particularly useful when applications frequently change their IP addresses or use multiple Ips

The Benefits

  • Flexible Traffic Management: Define custom rules to control outbound traffic, blocking or allowing specific destinations, applications, or protocols.
  • Improved Network Security: Prevent unauthorized data leakage and protect your network from external threats.
  • Enhanced Network Visibility: Gain deeper insights into outbound traffic patterns and identify potential security risks.

To learn more about these new features and how they can benefit your network, please click here.

Cyware, ECS enter design partnership to strengthen Gov’t & CI cybersecurity

Posted in Commentary with tags on October 24, 2024 by itnerd

Cyware, the leading provider of threat intelligence management, low-code/no-code automation, and cyber fusion solutions, and ECS, a leader in advanced technology solutions for U.S. public sector customers, including defense and intelligence organizations, today announce their design partnership which will serve to enhance Cyware’s Intel Exchange product enabling government entities to improve their security posture. This partnership aims to leverage ECS’s deep public-sector knowledge and cybersecurity expertise to tailor Cyware’s Intel Exchange to address the unique needs of government entities, with a focus on strengthening collective defense and securing the nation’s critical infrastructure.

To address the security challenges that impact federal entities, Cyware and ECS are working together to:

  • Enhance Intel Exchange’s automated Threat Intel Risk Score engine to bring flexibility and advancement in the algorithm to accommodate time sensitive government CTI operations and workflows. The new risk score is customizable based on the weightage given to the quality, credibility, relevance, and confidence level of the threat data sources, enrichment sources, and attributes of threat objects.
  • Introduce a custom scoring module in addition to the above Risk Score engine that will allow CTI teams to design scoring parameters tailored for government use cases for any threat data ingested into the platform and enable them to prioritize relevant threats for actioning.
  • Simplify triaging and operationalization of the large volume of threat data in the platform with automated rules leveraging the newly introduced scoring modules. CTI analysts can now create custom rules to score threat data depending on different priorities and perspectives.

The full range of enhanced capabilities for Intel Exchange are expected to be unveiled for the public sector in early November 2024. Cyware and ECS remain committed to supporting federal agencies through innovative and tailored cybersecurity solutions that promote collective defense and protect the nation’s most critical infrastructure.

Fortinet Has A Beyond Critical Vulnerability That You Need To Patch ASAP

Posted in Commentary with tags , on October 24, 2024 by itnerd

Fortinet has confirmed a critical vulnerability in FortiManager which is being tracked as CVE-2024-47575, and has a CVSS score 9.8 which is basically the worst score you can get, is being actively exploited. Mandiant has details about what this vulnerability is and how it is exploited.

But that’s not the bad part.

Apparently according to Bleeping Computer, this was disclosed to customers a week ago and….:

The company privately warned FortiManager customers about the flaw starting October 13th in advanced notification emails seen by BleepingComputer that contained steps to mitigate the flaw until a security update was released.

However, news of the vulnerability began leaking online throughout the week by customers on Reddit and by cybersecurity researcher Kevin Beaumont on Mastodon, who calls this flaw “FortiJump.”

Fortinet device admins have also shared that this flaw has been exploited for a while, with a customer reporting being attacked weeks before the notifications were sent to customers.

“We got breached on this one weeks before it hit “advance notifications” – 0-day I guess,” reads a now-deleted comment on Reddit.  

That’s not good at all. Patches to FotiManager are either here or are coming. And I highly recommend that you install those patches ASAP. Having said that, Fortinet is going to have to answer some hard questions about how they handled this because their response seems a bit suspect to me.

45% of energy sector breaches linked to third-parties 

Posted in Commentary with tags , on October 24, 2024 by itnerd

According to new research (registration required) by SecurityScorecard and KPMG, the US energy sector is particularly vulnerable to supply chain attacks, with 45% of security breaches in the past year linked to third-parties.

This compares to a global average of 29% for supply chain breaches across all other industries, while 90% of attacks on energy companies breached more than once involved third parties.

Also notable, 67% of third-party related breaches involved external software and IT providers and 22% involved other energy companies.

The largest contributor to third-party breaches in the energy sector was the exploitation of the MOVEit file transfer software vulnerability in 2023, accounting for 39% of breaches.

“With geopolitical and technology-based threats on the rise, this complex system is facing an equally generational risk exposure that could harm citizens and businesses alike,” Prasanna Govindankutty, Principal, Cyber Security US Sector Leader at KPMG commented.

Emily Phelps, Director, Cyware had this to say:

“The rising threat to the energy sector, particularly from third-party vulnerabilities, underlines the urgent need for a collective defense approach. As cyberattacks increasingly exploit supply chain weaknesses, organizations can no longer afford to operate in silos. Collaboration between trusted companies and industries, alongside the operationalization of threat intelligence, is critical to staying ahead of attackers. By turning intelligence into actionable insights, organizations can identify risks earlier, coordinate defenses, and reduce the time it takes to respond. Proactivity is key – relying solely on reactive measures leaves critical infrastructure and businesses exposed to recurring threats. Only through shared intelligence and coordinated efforts can we address these complex, evolving risks effectively.”

We’re at a point now where every sector needs to ensure that they are taking steps to protect themselves. Because the threat landscape is only growing, which is a bad thing for all of us.

Testers Challenge 2024 announced 

Posted in Commentary with tags on October 24, 2024 by itnerd

The annual Testers Challenge by TestDevLab has been announced, inviting anyone around the world to compete in the multi-level challenge for valuable prizes and the glory of being named a top tester in the world. The competition will go live on November 7, and will last until November 18th. It is made up of 3 stages in 3 complexity levels, wherein participants will look for software bugs and solve them using logical thinking to advance to the next level. The first three to reach the finish line will be crowned winners.

The challenge is created for people who like to tinker with tech and break things. This can range from professional software testers to people who just like to play around with software and logic puzzles. Each level will have one problem that needs to be solved, ranging from functional, security, and accessibility topics to audiovisual bugs and challenges. Interested participants are invited to try out the warmup round on the Testers Challenge website to get a taste of what lies ahead.

The Testers Challenge has been hosted for four years. The previous Testers Challenge had over 3,000 participants worldwide, and the first-place winner was an IT student from the UK. 

TestDevLab organizes a variety of initiatives for the testers community. In addition to the Testers Challenge, they also organize TDL School – a set of courses to develop a career in the software testing industry. 

This year, first, second, and third-place winners will have the chance to select their prize from the prize pot made up of an Oura Ring, InMotion V10F Unicycle, and Sony WH-1000XM5/L Wireless Noise-Cancelling Headphones.