Valve To Gamers: Upgrade Your Microsoft OS To At Least Windows 10 Or You Can’t Play Our Games

Posted in Commentary with tags on March 30, 2023 by itnerd

There’s a lot of gamers out there that have top of the line hardware and are also running Windows 10 or 11. But there’s also a significant camp of gamers who don’t have the latest and greatest hardware, and are also running operating systems like Windows 7. If you’re in the latter camp, Valve who makes the popular Steam game distribution system have a message for you. You need to upgrade to at least Windows 10 by the start of 2024, or else:

As of January 1 2024, Steam will officially stop supporting the Windows 7, Windows 8 and Windows 8.1 operating systems. After that date, the Steam Client will no longer run on those versions of Windows. In order to continue running Steam and any games or other products purchased through Steam, users will need to update to a more recent version of Windows.

This change is required as core features in Steam rely on an embedded version of Google Chrome, which no longer functions on older versions of Windows. In addition, future versions of Steam will require Windows feature and security updates only present in Windows 10 and above.

Now I’ve seen some outrage online about this. But seriously folks, Windows 7, 8 and 8.1 have been deemed end of support in the case of Windows 8.1, and end of life in the case of Windows 7. That means that there’s no technical support, no bug fixes, and no security fixes. The latter is the important part as no security fixes means that your chances of getting pwned by something are way higher than the person running Windows 10 or 11. But beyond that, you’ll be seeing messages from other software companies saying that they can’t support you with new versions of their software, not to mention bug fixes. So as difficult as it may by it’s time to bite the bullet and buy that new gaming rig that you know that you want with Windows 11 or Windows 10 on it. You’ll be better off as a result.

Hackers Spoof French Energy Company in Phishing Campaign

Posted in Commentary with tags on March 30, 2023 by itnerd

Avanan, a Check Point Software company has a dive deep on their blog which analyzes an attack that spoofed a reputable energy company in France, TotalEnergies, to steal funds.  

In this attack, hackers change the reply-to address to send emails from what appears to be a reputable company, however it is a spoofed account. The email is asking for a quotation surrounding the purchase of a centrifuge and a document is attached that has all the requested information. The hackers’ ultimate goal is for users to steal victims’ money at the end of the attack. 

You can read the deep dive here.

Cado Security Introduces Masked-AI: Open Source Library to Secure Sensitive Data 

Posted in Commentary with tags on March 30, 2023 by itnerd

Cado Security, provider of the first cloud forensics and incident response platform, today announced the availability of Masked-AI. This open-source library enables the usage of Large Language Models (LLM) APIs such as OpenAI/GPT-4 more securely without sending out sensitive information. Available as a download from the GitHub repository, Masked-AI allows developers to use APIs such as OpenAI without worrying about security concerns.

Previously, the company introduced an Interactive Incident Response feature within the Cado Platform utilizing GPT-3 to further streamline forensic investigations and expedite response. Cado noted several potential issues with using GPT-3 in production environments for the incident response use case, including privacy-related concerns. Introducing Masked-AI is Cado Security’s initiative to foster a community around speeding up incident response in the cloud while leveraging LLM APIs securely to increase the efficiency of security teams.

Sharing highly-sensitive data with a third-party API is a massive security and privacy concern. Even with data usage policy changes, there have still been security issues causing concerns amongst the industry including the exploitation of users’ AI conversations. With these types of incidents still at large, the launch of Masked-AI offers users the ability to conceal sensitive data shared via API to ensure confidentiality and greater security, while continuing to take advantage of all of the benefits AI has to offer.

Masked-AI currently masks individuals’ names, credit card numbers, email addresses, phone numbers, web links, and IP addresses. The tool is “masking” or replacing sensitive data with a placeholder and sending the masked request to the API. The solution stores a lookup table locally to then later reconstruct the API output to include the sensitive data for the user to consume.  

The Python SDK and CLI tool is a free, open-source companion to Cado’s enterprise/commercial product for cloud forensics and incident response. The new open-source tool developed by Cado’s software engineering team has also been integrated with the Cado platform to further optimize and expedite the end-to-end incident response process.

For more information on getting started with Masked-AI, please visit https://www.cadosecurity.com/introducing-masked-ai-an-open-source-library-that-enables-the-usage-of-llm-apis-more-securely/.

To learn more about the Cado Platform, visit https://www.cadosecurity.com/platform/.  

ByteDance Appears To Have A Backup Plan For A TikTok Ban… And It’s Called Lemon8

Posted in Commentary with tags on March 30, 2023 by itnerd

The United States and various other countries are looking to ban TikTok because it is seen as a tool of the Chinese Communist Party to spread misinformation and gather information on people that they can use against them. That’s sent TikTok’s parent company ByteDance looking for options to keep itself alive. And the company over the last month has started to push an app called Lemon8 towards US audiences. This app seems to be a version of Instagram that allows users to share photos. It doesn’t appear to have video support, but I am sure that’s coming. And the thing is that TikTok users can link their TikTok accounts to Lemon8. And apparently that’s happening with the biggest influences on TikTok not only linking their accounts to Lemon8, but actively promoting the app. Thus it’s no shock that the app is getting downloads as a result. In fact according to TechCrunch, Lemon8 is already in the top ten of the US version of the Apple App Store. Though I will point out that the app has been around since 2020 and is extremely popular in other parts of the world. Though the app is not yet available in Canada as I type this.

But I have to ask the question, is this really a backup plan? I ask because I’ve written about the RESTRICT act which if passed would give the US the ability to ban apps like TikTok. The way the law is written, it’s beyond a safe bet that Lemon8 would meet the same fate. So why should ByteDance bother with this? My guess is that ByteDance was originally going to go after Instagram with this app, but they appear to now shifted it to being a haven for TikTok users in the short term if TikTok were to be banned. Thus kind of forcing the US government and other governments into a game of “whack a mole”. Also, during the disastrous (for ByteDance) hearings last week on Capitol Hill, ByteDance sent an army of influencers to the hill to lobby politicians against banning TikTok. I’m also guessing that by shifting those influencers to Lemon8, it’s a means to show how powerful that community is and that Congress can’t ignore them.

It will be interesting to see how this plays out as I have to believe that it’s only a matter of time before the RESTRICT act passes congress and lands on the President’s desk. And once he signs it, then it’s game on in terms of what happens to ByteDance and all their apps.

New Research Reveals 15+ Million Vulnerable Instances That Are Susceptible To APTs From CISA’s KEV Catalog

Posted in Commentary with tags on March 30, 2023 by itnerd

Rezilion has released its latest research report, a comprehensive analysis of the CISA Known Exploited Vulnerabilities (KEV) Catalog that reveals the vast attack surface created by software vendors’ lack of awareness and action regarding KEV vulnerabilities. These are prime targets for APT groups and financially motivated threat actors.

Rezilion’s research identifies over 15 million vulnerable instances, primarily Microsoft Windows instances, and emphasizes prioritizing patching based on exploitability. 

  1. These vulnerabilities account for less than 1% of the total vulnerabilities discovered by organizations yearly.
  2. Most vulnerabilities are rated as critical or high (250 marked as CRITICAL and 535 marked as HIGH).

APT groups and profit-driven threat actors frequently exploit these vulnerabilities, often connecting to or receiving sponsorship from nation-states such as Russia, Iran, China, and North Korea. Millions of systems remain vulnerable to KEV, despite the availability of patches to resolve them.

You can read the report here.

Geotab Publishes Their Sustainability and Impact Report

Posted in Commentary with tags on March 30, 2023 by itnerd

Geotab Inc., a global leader in connected transportation solutions — today released its 2022 Sustainability and Impact Report, titled “Unlocking the power of data for a sustainable future,” which outlines the company’s environmental, social and ethical impact, and highlights how data intelligence is a key driver of success in the carbon reduction journey. The report also includes examples of how organizations in the transportation sector are starting and managing carbon reduction initiatives using data intelligence to inform their decision-making and transition.

Accelerating decarbonization in the transportation industry

With over 3.2 million connected vehicles around the world, Geotab is uniquely positioned to help accelerate decarbonization in the transportation sector by providing a full suite of data-driven tools and insights to support fleets on their sustainability journeys (including the EV Suitability Assessment (EVSA) and Green Fleet Dashboard), scaling electrification and technology innovation through education (such as the Geotab Fleet Electrification Knowledge Center), and collaborating on research projects.

Fleet sustainability is a win-win

For many fleets, sustainability is proving to have financial advantages. Electrification studies featured in the report show the potential to save millions of dollars through lower fuel and maintenance costs while reducing CO2 emissions. A recent Geotab survey of U.S. fleet professionals found that 63% of respondents confirmed that their fleet sustainability data helped their organization reduce operating costs in the past year. 

Driving forward on our own sustainability journey

With a target of net zero emissions by 2040, Geotab is on its own sustainability journey, minimizing the environmental footprint of its operations and supply chain across all three scopes and developing sustainability-focused products and solutions for fleets. Geotab is developing a supplier program to increase supply chain sustainability. At the end of 2022, 50% of Geotab’s top 10 suppliers (by spend) were reporting their environmental data to CDP. Geotab’s goal is to have 100% of its top 10 suppliers make a public commitment to reduce greenhouse gas (GHG) emissions by 2030.

2022 Report highlights: 

  • In September 2022, Geotab was the first dedicated telematics company to receive validation from the Science Based Targets Initiative (SBTi) for its emissions reduction targets.
  • Geotab was awarded a Bronze medal from EcoVadis, ranking in the top 50% of companies scored by EcoVadis according to their criteria.
  • Geotab joined the UN Global Compact, the world’s largest corporate sustainability initiative.
  • Scope 2 emissions were reduced by 34% compared to our 2019 baseline.
  • Updated Geotab GO Recycle Program providing take-back services for customers in North America and the EU. 
  • Research collaborations demonstrating the potential of electrification and accelerating EV adoption at scale, including the North American fleet electrification study and Profitable Sustainability: The Potential of European Fleet Electrification
  • Next-generation STEM program with over 200 participants in the company’s Internship and Co-op programs.

View the full report at: https://www.geotab.com/about/corporate-sustainability/

Wozniak, Musk & More Call For AI Development Pause

Posted in Commentary with tags on March 29, 2023 by itnerd

There’s an open letter signed by over 1200 people who are asking for an immediate six-month halt on AI technology more powerful than ChatGPT-4. The open letter was created by an organization called the Future of Life Institute. The aim of this organization is to “steer transformative technology towards benefitting life and away from extreme large-scale risks.” Among those who signed are Steve Wozniak who co-founded Apple, Elon Musk the clown prince of tech and the guy who runs Twitter, SpaceX, and Tesla among other companies. This does bring up all sorts of questions about AI and how it should be used.

I have a number of comments on AI in general and specifically this open letter. The first is from Baber Amin, COO, Veridium:

Thoughts on AI development and application:

“For great leaps in technology, we often need to establish safety measures and regulations – for example, when we split the atom to harness nuclear power. While nuclear energy has provided many advantages in fields like medicine and energy, it has also given rise to the terrible threat of nuclear weapons. However, the difficulty of accessing and managing nuclear materials has provided a natural form of protection.

“AI model development and training, on the other hand, lack these same natural barriers, making it easier to develop without appropriate safety measures in place. That’s why it’s important to take a step back and create responsible systems that are accurate, transparent, trustworthy, and potentially even capable of self-regulation.

Risks for companies using the OpenAI API.

      “As organizations turn to OpenAI’s API for their artificial intelligence needs, it’s important to keep in mind the following considerations:

  1. Data Privacy: OpenAI’s models are trained on large amounts of data, which until recently could have included sensitive information from organizations. Starting March 1, OpenAI will no longer use customer data submitted via API to train their models without explicit consent. However, the data will still be kept for 30 days for monitoring purposes.
  2. Bias: OpenAI’s training data comes from the real world, which means it may contain biases that are reflected in their models. Organizations using OpenAI should be aware of this possibility and take corrective measures.
  3. Misinformation and Fake Data: OpenAI’s generative models can create text that is indistinguishable from real data, which could be used to generate fake news or blog posts. Organizations need to be cautious of inadvertently spreading misinformation.
  4. Phishing Attacks: OpenAI’s generative models can also be used to create sophisticated phishing attacks or deepfakes, which could lead to propaganda and possible slander.
  5. Spam: Lastly, OpenAI’s generative AI can be used to generate spam, resulting in unsolicited emails or social media posts, causing reputational damage to an organization

     “By keeping these considerations in mind, organizations can use OpenAI’s API effectively and responsibly.

      “For security protections, looking at OpenAI, they do have the following security controls in place, which all seem very reasonable.  

  • Data encryption at rest and in transit.
  • Access control around data and models.
  • Monitoring for suspicious activity.
  • Patching for latest security patches.
  • Auditing of access to data and models.

Matt Mullins, Senior Security Researcher, Cybrary is next:

   “There are a number of benefits to AI and its applications that are being explored. While there are a great deal of efficiencies created there, other non-beneficial aspects arise. The disruption of a number of industries being the most profound, in ways that were not easily predictable. Things associated (typically) with “human-ness” are being found to be more vulnerable than other aspects.

   “For example… art, music, essays, and other things that were an established trope of human creativity as normality are significantly being destabilized as AIs are able to quickly ingest, seed, and innovate in ways that were not previously predicted.

   “Aside from these disruptions, the potential for attacks on baseline ‘truth’ have been established as well. Consider the modification of voice, visual imagery, and video which can all be done so effectively that a zoom call could potentially be spoofed. The ramifications of such realistic mimicry have direct threats to establishments of truth and sub sequentially democratic process itself.

Overall, AI is presenting a removal of entry level aspects to IT and security. Beyond this entry level the veil seems to be easy to pierce with a critical eye for understanding code. The bigger issues presented are the capabilities that AI presents to disrupt how we see the world.”

David Maynor, Senior Director of Threat Intelligence, Cybrary has this to add:

Addressing major tech calling for a 6 mo. AI moratorium:

   “It is funny that technologist that have been disruptive to industries and use mantras like “fail fast” are aligning against AI research. While conspiracy theories point to worrying about a Skynet like AI turning on humans I personally feel that AI availability will disrupt the disruptors and make their fiefdoms ripe for replacement.”

It will be interesting to see how this play out. I for one do not see the AI arms race as I call it stopping anytime soon unless governments get interested in terms of slowing down AI development.

UPDATE: Dr. Chenxi Wang (she/her), Founder and General Partner, Rain Capital added this comment:

A pause in the AI fever is needed, not just from the business standpoint, but also from the point of view of security and privacy. Until we understand how to assess data privacy, model integrity, and the impact of adversarial data, continued development of AI may lead to unintended social, technical, and cyber consequences. 

Lumen Technologies Gets Pwned. Installs “Enhanced Security Software” And Discovers Another Attack

Posted in Commentary with tags on March 29, 2023 by itnerd

On Monday, Lumen Technologies filed two cybersecurity incidences with the SEC, both of which occurred within a week of each other. 

Last week Lumen discovered that a malicious actor had installed ransomware in on its servers, degrading the operations of a “handful of our enterprise customers.” Additionally, the company’s installation of “enhanced security software,” allowed them to discover that a separate intruder had accessed a number of their internal systems, conducted reconnaissance, installed malware and extracted data.

Based on the ongoing investigation, Lumen said it does not believe the incident will have a material impact on its financials, operations or ability to serve customers.

Dave Ratner, CEO, HYAS had this comment:

   “The unfortunate truth in today’s world is that everyone will be breached. It’s clear today, now more than ever, that visibility into any and all anomalous communication across both IT and OT environments needs to be a critical part of a modern security architecture. Since malware and other nefarious intrusions must communicate with their external adversary infrastructure, real-time visibility and early detection into any and all anomalous communication can be the difference between rapid containment and true business resiliency or data exfiltration and costly business impacts.”

I’d love to know what this “enhanced security software” was that Lumen installed as it allowed them to find another intruder in their internal systems. Whatever it is, maybe other companies should copy what Lumen has done to keep themselves safe and secure.

HP Unveils Bold New Offerings and Partner Program Updates at Amplify Partner Conference

Posted in Commentary with tags on March 29, 2023 by itnerd

HP has another announcement from its Amplify Partner Conference today. The theme of the carbon-neutral event – Future Ready, Together We Win – invites partners to join HP to take advantage of opportunities across high-growth segments including gaming, hybrid work, workforce services, security, and sustainability.

The key highlights are (with links to more detailed announcements):

  • Doubles Down on Partner Growth with Groundbreaking Program Enhancements: As of November 1, all HP products, solutions and distribution across its vast portfolio will be integrated into the HP Amplify Program, delivering one global platform as the foundation for partner engagement.
  • Debuts Advanced Sustainable Printing Solutions Designed for Growing Businesses: Launched the new HP Color LaserJet 4200/4300 and the HP Color LaserJet Enterprise 5000/6000 and X500/X600 printing solutions for businesses of all sizes. All new HP Color LaserJet series printers are powered by HP’s next generation sustainable toner, which delivers up to 27% reduced energy use and up to 78% less plastic in the packaging.
  • Leads in Hybrid Work with Future-Ready Portfolio: HP today announced new products and solutions to usher in the next era of hybrid work for everyone with the world’s most comprehensive set of computing solutions for hybrid flexibility.
  • Expands Boundaries for Remote PC Management through HP Wolf Connect: Wolf Connect, an IT management connectivity solution that provides a highly resilient and secure connection to remote PCs, enabling IT to manage devices even when powered down or offline. Using a cellular-based network, HP Wolf Connect’s robust connectivity helps ensure IT teams can readily manage a dispersed hybrid workforce.
  • Boosts Gaming Solutions for Awe-Inspiring Experiences: The new OMEN Transcend 16 Laptop, OMEN 16 Laptop, Victus 16 Laptop, and a vast range of stunning OMEN monitors offer casual, hobbyist, lifestyle, and hardcore gamers the power and flexibility to play and work hard. To bring everything together, new enhancements in OMEN Gaming Hub offer a variety of performance and personalization features.

Trend Micro Details How Cybercriminals Use LinkedIn to Victimize Users and Companies

Posted in Commentary with tags on March 29, 2023 by itnerd

Trend Micro has put out research on how LinkedIn has become a great target for cybercriminals.

LinkedIn is considered the largest platform catering to professionals and companies’ information with approximately 875 million users in over 200 countries.

As in other social networks, sharing data is the principal activity done on this platform, and this opens people to threats targeting all kinds of users – from a cybercriminal perspective, LinkedIn is an optimal platform to gather information on potential targets and for initial reconnaissance given its large user base and business orientation.

From utilizing AI-generated headshots to create real-looking profiles to using LinkedIn messaging to target marketing and HR professionals, threat actors have found new ways to exploit the platform’s information to build sophisticated attacks that could result in personal, professional, social, and organizational damage.

To learn more about how data is been stolen and used against users and organizations you can read the full report here: A Growing Goldmine: Your LinkedIn Data Abused For Cybercrime