Daily Drop (653): DP World: Backlog, IRCG: Cyber CAP's, YMTC Sues Micron, Illegal Botnet Proxy Service, IR: Al-Mayadeen TV Website, LockBit Vs. China, Hikvision, Iran's Cyber Strategy, Zyxel Zero Days
11-14-23
Tuesday, Nov 14, 2023 // (IG): BB // The Leek Sino-Satire // Coffee for Bob
DP World Slowly Resolves Freight Backlog in Australia After Cyber Attack
Bottom Line Up Front (BLUF): DP World, one of the world's largest port operators, is gradually addressing a backlog of over 20,000 freight containers at Australian ports following a severe cyberattack. The attack disrupted port operations and coincided with labor strikes, further impeding a return to normalcy. While DP World has moved approximately 5,400 containers from affected ports since the cyberattack, it may take weeks for operations to fully recover.
Analyst Comments: The primary issues include a significant backlog of over 20,000 freight containers caused by a recent cyberattack and concurrent labor strikes organized by the Maritime Union of Australia. While efforts are being made to address the backlog and resume normal operations, progress has been slow due to the complexity of the situation. The aftermath of the cyberattack, which disrupted network operations, requires investigation and network security enhancements, prolonging the recovery process. The labor strikes, driven by demands for an 8% annual pay increase over two years, further complicate DP World's ability to clear the backlog. Overall, the situation underscores the far-reaching consequences of cyberattacks and the challenges of recovering from such incidents, especially when combined with labor disputes.
FROM THE MEDIA: DP World is gradually addressing the significant backlog of freight containers at Australian ports caused by a cyberattack and concurrent labor strikes. The slow progress highlights the challenges companies face in recovering from cyber incidents and dealing with labor disputes. DP World's capacity remains reduced due to ongoing strikes, adding complexity to the situation as the company seeks to return to normal operations.
READ THE STORY: IJ
Assessing Iran's Cyber Capabilities and Intentions in the Global Digital Landscape
Bottom Line Up Front (BLUF): Iran is increasingly likely to acknowledge carrying out cyberattacks against the United States, contrasting with the more covert approaches of China and Russia.
Analyst Comments: Iran stands out in the cyber realm for its readiness to openly admit to launching cyberattacks, in contrast to other major cyber adversaries like China and Russia. According to cybersecurity expert Mark Montgomery, while China and Russia possess more formidable cyber capabilities, Iran is more inclined to carry out cyberattacks against the United States and claim responsibility for them. Iran often employs proxies to execute these attacks, providing a level of deniability while still achieving its objectives. The Cyberspace Solarium Commission, established by Congress in 2018, has emphasized the need for a comprehensive overhaul of U.S. cyber policy. Mark Montgomery, a former executive director of the commission, highlights that while China and Russia have advanced cyber tools, Iran's unique approach involves targeting specific businesses and regions, impacting individual companies and smaller sectors rather than broad industrial sectors.
FROM THE MEDIA: Iran's evolving stance in the cyber realm presents a unique challenge to the United States. While lacking the sophistication of China and Russia's cyber arsenals, Iran compensates with a willingness to be more overt about its cyber operations, often leveraging proxies to execute attacks. This approach marks a departure from the more clandestine tactics of other major cyber adversaries. The targeting of specific American business sectors and regional operations by Iranian cyberattacks has necessitated heightened vigilance and robust cybersecurity defenses. Iran's current cyber focus on Israel, particularly in sectors like transportation and logistics, underscores the shifting priorities and strategies within its digital warfare playbook. The United States and its allies must adapt to this evolving threat landscape, enhancing cyber defenses and developing strategies to counter and attribute these attacks effectively.
READ THE STORY: Washington Times
China's YMTC Sues Micron Over 3D-NAND Patents
Bottom Line Up Front (BLUF): The National Intelligence Service (NIS) of South Korea has discovered 38 fake Korean-language news websites operated by Chinese public relations firms, indicating a concerted effort by China to influence public opinion and disseminate pro-China and anti-U.S. content in South Korea.
Analyst Comments: YMTC's lawsuit against Micron Technology alleges that Micron improperly utilized YMTC's patented technology to compete in the 3D-NAND flash memory market without appropriate compensation. While YMTC is considered a relatively small player in this sector, it has demonstrated the capability to compete with industry leaders such as Samsung, SK Hynix, and Micron. The lawsuit, filed in the US District Court for the Northern District of California, raises concerns over the use of patented technology and fair competition in the memory and data storage industry. YMTC's confidence in a swift resolution indicates the seriousness of the allegations and the potential impact on Micron's operations.
FROM THE MEDIA: The lawsuit brought by YMTC against Micron over 3D-NAND patents adds another layer of complexity to Micron's operations in China. While the outcome of the legal action remains uncertain, it highlights the competitive nature of the memory and data storage industry and the significance of intellectual property protection. Micron's ability to navigate these challenges and maintain relationships in China will be crucial in determining its future in the region's semiconductor market. This case underscores the importance of legal and regulatory compliance in the global technology sector.
READ THE STORY: EENews Analog
Russian and Moldovan National Pleads Guilty to Operating Illegal Botnet Proxy Service that Infected Tens of Thousands of Internet-Connected Devices Around the World
Bottom Line Up Front (BLUF): A Russian and Moldovan national, Sergei Makinin, has pleaded guilty to operating an illegal botnet proxy service connected to the IPStorm malware. The botnet, which initially targeted Windows systems, later expanded to infect Linux, Mac, and Android devices, affecting computers and electronic devices globally. Makinin controlled these compromised devices, turning them into proxies for profit, selling illegitimate access through his websites. He earned over $550,000 from this scheme. Makinin's guilty plea involves three counts of violating 18 U.S.C. § 1030(a)(5)(A), with each count carrying a maximum ten-year prison sentence. The case highlights US law enforcement's commitment to pursuing cybercriminals regardless of their location.
Analyst Comments: Sergei Makinin's guilty plea in connection with the operation of the IPStorm malware and botnet proxy service underscores the international reach of cybercrime. Makinin's operation infected a wide range of devices, victimizing users worldwide. The fact that this cybercriminal was brought to justice serves as a warning to others engaging in similar illegal activities. It also showcases the dedication of US law enforcement in collaborating with international partners to dismantle cybercrime operations. The financial aspect of this case, where Makinin profited significantly from his activities, highlights the lucrative nature of cybercrime and the need for continued vigilance in countering such threats.
FROM THE MEDIA: Sergei Makinin, a Russian and Moldovan national, has pleaded guilty to operating a botnet proxy service connected to the IPStorm malware. This operation infected a multitude of devices, ranging from Windows systems to Linux, Mac, and Android devices, impacting users globally. Makinin's illegal scheme involved selling access to these compromised devices through his websites, proxx.io and proxx.net, earning him more than $550,000. His guilty plea involves three counts of violating 18 U.S.C. § 1030(a)(5)(A), each carrying a maximum prison sentence of ten years. This case serves as a warning to cybercriminals worldwide that law enforcement is committed to pursuing those who engage in cybercrimes. It also highlights the need for ongoing efforts to combat cyber threats and protect users' privacy and security.
READ THE STORY: DoJ
Israel Blocks Pro-Iran Al-Mayadeen TV Website Over Security Concerns
Bottom Line Up Front (BLUF): In an unprecedented move, Israel has blocked web access to Al-Mayadeen TV, a Lebanese satellite channel known for its pro-Iran stance, citing security concerns. This decision adds to Israel's recent actions against media outlets it perceives as threats to national security, raising questions about freedom of the press and potential regional consequences.
Analyst Comments: Israel's decision to block web access to Al-Mayadeen TV, a channel known for its pro-Iran stance, comes as a response to what it perceives as security concerns. Communications Minister Shlomo Karhi, backed by the security cabinet, announced this move, emphasizing the need to prevent potential harm to the state's security. The Israeli government has accused Al-Mayadeen of broadcasting content that supports "despicable terror organizations" and labeled it a "mouthpiece of Hezbollah." Defense Minister Yoav Gallant further accused the channel's journalists of supporting terrorism while posing as reporters. Israel plans to take additional measures to prevent Al-Mayadeen reporters from working within the country.
FROM THE MEDIA: Israel's decision to block web access to Al-Mayadeen TV due to security concerns adds to the ongoing debate about freedom of the press and media restrictions in the region. Accusations of the channel's support for terror organizations and its alleged ties to Hezbollah have led to this unprecedented move. The broader implications include questions about media freedom, potential consequences for regional tensions, and the evolving landscape of media regulation in the Middle East.
READ THE STORY: i24
LockBit vs. Chinese Bank's U.S. Arm Sparks rumors of APT response
Bottom Line Up Front (BLUF): The LockBit ransomware gang's audacious attack on the U.S. arm of China's largest bank, the Industrial and Commercial Bank of China (ICBC), has raised concerns about potential retribution from powerful nations. The attack, which caused financial turmoil and involved a Chinese government-owned bank, may lead to repercussions from China, the United States, and possibly Russia, where LockBit is believed to operate. Cyber experts suggest that LockBit's actions have made them targets for retaliatory measures, putting their operations and affiliates in jeopardy.
Analyst Comments: LockBit, a ransomware gang widely attributed to Russia, conducted a high-profile attack on ICBC's Financial Services division, a U.S.-based branch of a Chinese government-owned bank. The attack caused significant disruption and financial instability, potentially inviting retaliation from affected nations. Given the Chinese connection and the rarity of ransomware attacks targeting banks with U.S. operations, it becomes challenging for China and the United States not to respond to the attackers. Russia, as the alleged host nation for LockBit, may also face consequences due to its history of harboring hackers who target foreign entities.
FROM THE MEDIA: The LockBit ransomware gang's audacious attack on ICBC's U.S. arm, a Chinese government-owned bank, has raised concerns of retaliation from China, the United States, and possibly Russia. The attack, which caused financial turmoil, has put LockBit and its affiliates at risk of facing retribution. The Chinese connection and the rarity of bank-targeted ransomware attacks involving U.S. operations make it difficult for the involved nations to ignore the incident. China, in particular, is expected to be deeply displeased with the attack, potentially prompting retaliatory measures against LockBit.
READ THE STORY: The Washington Post
Hikvision's Alleged Involvement in Identifying Fasting Muslim Students: An Examination of the Controversy
Bottom Line Up Front (BLUF): Chinese video surveillance equipment company Hikvision is facing allegations that it engaged in a contract to develop technology capable of identifying Muslim students fasting during Ramadan based on their dining records. While Hikvision denied these claims and stated that it did not develop such features, the controversy raises concerns about privacy, surveillance, and the company's role in facilitating potential human rights violations.
Analyst Comments: Hikvision, a prominent Chinese surveillance technology firm, has been accused by a US-based research group, IPVM, of participating in a contract to create technology that could identify Muslim students fasting during Ramadan by analyzing their dining records. The contract, valued at $9 million, was aimed at building a "Smart Campus" system for Minjiang University in China's Fujian province. According to IPVM, the tender document for the project included a system called the "Assisted Analysis Of Ethnic Minority Students," designed to support administrative decision-making. This system allegedly featured an alert mechanism to identify students suspected of fasting during Ramadan. In addition to fasting, the Smart Campus project collected extensive data on students' daily habits, including library activity, holiday destinations, passport use, student club participation, family information, and affiliation with the Chinese Communist Party.
FROM THE MEDIA: The allegations against Hikvision regarding its involvement in identifying fasting Muslim students through surveillance technology raise significant concerns about privacy, surveillance ethics, and potential human rights violations. While Hikvision has denied these claims, the controversy underscores the need for transparency and accountability in the deployment of surveillance technology, especially in regions with documented human rights issues.
READ THE STORY: The Register
Iran's Cyber Strategy: A Unique Challenge for the United States
Bottom Line Up Front (BLUF): Iran's cyber strategy poses a distinctive challenge to the United States and its allies due to its willingness to overtly admit to cyberattacks, often using proxies to execute them. While not as technically sophisticated as China or Russia, Iran's actions target specific American business sectors and regional operations, necessitating robust cybersecurity defenses and effective attribution strategies.
Analyst Comments: Iran stands out in the cyber realm for its readiness to openly admit to launching cyberattacks, in contrast to other major cyber adversaries like China and Russia. According to cybersecurity expert Mark Montgomery, while China and Russia possess more formidable cyber capabilities, Iran is more inclined to carry out cyberattacks against the United States and claim responsibility for them. Iran often employs proxies to execute these attacks, providing a level of deniability while still achieving its objectives.
FROM THE MEDIA: Iran's cyber strategy differs significantly from that of other major cyber adversaries, such as China and Russia. While lacking the technical sophistication of these nations, Iran compensates with a willingness to be overt about its cyber operations and employs proxies to carry them out. This approach poses a unique challenge to the United States, as Iran's cyberattacks target specific sectors and regions, requiring enhanced vigilance and robust cybersecurity defenses. As Iran's cyber focus shifts towards Israel and sectors like transportation and logistics, it underscores the evolving nature of this threat. The United States and its allies must adapt to this changing landscape by improving their cybersecurity defenses, developing effective attribution strategies, and promoting international cooperation to address these challenges effectively. Iran's distinctive cyber strategy demands a tailored response to safeguard critical infrastructure and national security interests.
READ THE STORY: FT
Zyxel Zero Days and Nation-State Involvement in Denmark's Worst Cybersecurity Incident
Bottom Line Up Front (BLUF): In May 2023, Denmark experienced its most severe cyberattack on critical infrastructure to date, with 22 organizations falling victim to a series of relentless cyberattacks. The attacks forced some of these entities into an "island mode" operation, disconnecting them from the internet and non-essential networks. The breaches primarily exploited unpatched vulnerabilities in Zyxel firewalls, with some attackers employing undisclosed zero-day vulnerabilities. Multiple threat actors were involved, including suspicions of Russia's GRU-linked Sandworm operation. The incident underscores the critical need for improved cybersecurity practices and international collaboration.
Analyst Comments: Denmark's critical infrastructure endured a wave of cyberattacks that targeted 22 organizations, posing a significant threat to the nation's security. The attacks exploited unpatched vulnerabilities in Zyxel firewalls, which were prevalent among the targeted entities. Some attackers leveraged undisclosed zero-day vulnerabilities, demonstrating a high level of sophistication. The involvement of multiple threat actors suggests a coordinated effort to compromise Denmark's critical infrastructure. Notably, suspicions arose regarding the infamous Sandworm operation, associated with Russia's GRU, although attribution remains uncertain due to limited evidence.
FROM THE MEDIA: Denmark faced an unprecedented cyberattack on its critical infrastructure in May 2023, resulting in 22 organizations falling victim to relentless assaults. Exploiting unpatched vulnerabilities in Zyxel firewalls, some attackers even used undisclosed zero-day vulnerabilities, raising concerns about their sophistication. The involvement of multiple threat actors, including suspicions of Russia's GRU-linked Sandworm operation, highlighted the complexity of the attacks. Coordination among the attackers was remarkable, indicating extensive planning and resources.
READ THE STORY: The Register
Unauthorized Use of China's Beidou Satellite System Raises National Security Concerns in Taiwan
Bottom Line Up Front (BLUF): The Taiwan Statebuilding Party (TSP) has voiced concerns about national security due to Taiwanese fishing vessels' unauthorized use of China's Beidou Navigation Satellite System (BDS). The BDS, akin to the U.S. GPS system, is employed by China's military, industries, and citizens. TSP asserts that the BDS has been utilized to infiltrate and monitor military traffic. Despite Taiwan's Fisheries Agency and National Communications Commission (NCC) prohibiting BDS usage and its terminal equipment, a Taiwanese fishing vessel was recently discovered to have illicitly installed the BDS system.
Analyst Comments: Tensions between Taiwan and China are already heightened, and the improper use of BDS could exacerbate the situation. The installation of BDS on fishing vessels not only endangers their safety by exposing their positions but also poses a serious national security threat by potentially affecting military mobilization efforts. TSP Chairperson Wang Hsing-huan has called for a thorough investigation by the NCC and Digital Affairs Ministry to address this issue. Fisheries Agency Deputy Director-General Wang Cheng-fang emphasized that all communication equipment used by fishing vessels must receive prior approval from the NCC, and unauthorized actions are subject to punishment under the Telecommunications Act.
FROM THE MEDIA: The unauthorized use of China's Beidou Navigation Satellite System (BDS) on Taiwanese fishing vessels has raised significant concerns about national security. Taiwan's Taiwan Statebuilding Party (TSP) has pointed out that BDS, similar to the U.S. GPS, has been exploited to penetrate and monitor military traffic. This development comes at a time of heightened tensions between Taiwan and China, making it crucial to address this security breach promptly. Fisheries Agency Deputy Director-General Wang Cheng-fang has stressed the need for prior approval for communication equipment used by fishing vessels and warned against unauthorized installations, as they are in violation of telecommunications regulations. The issue underscores the importance of safeguarding national security in an increasingly complex geopolitical environment.
READ THE STORY: RTI
ICCL Raises Alarm Over Online Advertising's Real-Time Bidding (RTB) Threat to EU and US Security
Bottom Line Up Front (BLUF): The Irish Council for Civil Liberties (ICCL) has uncovered a concerning trade in highly detailed internet browsing data, potentially jeopardizing the security of prominent figures in the EU and the US. In reports titled "Europe’s Hidden Security Crisis" and "America’s Hidden Security Crisis," the ICCL reveals that foreign states and non-state actors are accessing "extraordinarily sensitive" information via online advertising's real-time bidding (RTB) system. This data includes profiles of key EU and US individuals, military personnel, and politicians, and covers aspects such as their movements, financial status, mental health, and vulnerabilities, including potential survivors of sexual abuse. The ICCL highlights the risk of blackmail, hacking, and compromise posed by this data.
Analyst Comments: Real-time bidding (RTB), a system widely used by websites and apps, has inadvertently exposed highly detailed information about key individuals in the EU and the US, posing significant security risks. The ICCL points out that this data, originally intended for personalized marketing, has unexpectedly become a treasure trove for malicious actors. The information covers a broad range of professions, including judges, utilities managers, military personnel, and politicians. Crucially, the data often includes location information and timestamps, making it relatively easy to identify specific individuals. Foreign states and non-state actors can exploit this data to spy on individuals' sensitive information, even if they use secure devices.
FROM THE MEDIA: The ICCL's findings reveal a serious security threat arising from the exposure of sensitive information through online advertising's real-time bidding (RTB) system. Detailed profiles of key EU and US figures are accessible to foreign entities, enabling potential blackmail, hacking, and compromise. The ICCL has called on industry leaders like Google and IAB TechLab to revise their protocols to prevent personal data from being included in RTB broadcasts and to remove all identifying and linkable data. Urgent action is deemed necessary to safeguard elected leaders and military personnel from these emerging security risks. Google and Microsoft have been contacted for their response to these revelations.
READ THE STORY: Forbes
ETSI Opens TETRA Radio Encryption Algorithms to Public Domain After Security Concerns
Bottom Line Up Front (BLUF): The European Telecommunications Standards Institute (ETSI) has reversed its stance on the secrecy of encryption algorithms used in TETRA (Terrestrial Trunked Radio) emergency radio communications. These algorithms, vital to governments, law enforcement, military, and emergency services in Europe, the UK, and other nations, were previously undisclosed. However, the revelation of five vulnerabilities in mid-2023 raised concerns within the security community regarding the lack of third-party testing due to proprietary encryption algorithms. Consequently, ETSI's technical committee has unanimously decided to make all TETRA Air Interface cryptographic algorithms open source. This move will allow academic research and independent reviews, enhancing security.
Analyst Comments: The decision to open source the TETRA encryption algorithms is a positive step in addressing vulnerabilities in emergency radio communications systems. The proprietary nature of these algorithms had hindered external testing and scrutiny, potentially exposing critical networks to security risks. By making the algorithms publicly accessible, ETSI aims to bolster security by enabling experts to assess and improve the encryption methods. The move also aligns with the need for transparency and collaboration in enhancing security protocols.
FROM THE MEDIA: ETSI has decided to release TETRA encryption algorithms into the public domain following the discovery of vulnerabilities in these crucial encryption methods. TETRA, used extensively by law enforcement, emergency services, and military organizations, had kept its encryption algorithms undisclosed, raising concerns about potential security risks. The decision to open source these algorithms will facilitate independent research and evaluation, contributing to improved security for these vital communication systems. ETSI has not yet specified a timeline for when the algorithms will be made accessible to the public.
READ THE STORY: The Register
Nordic Semiconductor Achieves Milestone as Combined Wi-Fi, Cellular IoT, and Satellite Location Silicon Vendor
Bottom Line Up Front (BLUF): Norway-based Nordic Semiconductor has taken a significant step towards becoming the world's first silicon vendor to offer a combined Wi-Fi, cellular IoT, and satellite (GNSS) location solution. This achievement comes with the launch of the nRF7000 low-power Wi-Fi 6 IC, designed to complement satellite location data with Wi-Fi SSID-based positioning. The chip scans both 2.4 and 5 GHz bands, leveraging Wi-Fi SSID databases to enhance location accuracy, especially indoors or in densely populated areas. Nordic Semiconductor's innovative approach opens doors for improved asset tracking, essential for various industrial and logistical applications.
Analyst Comments: Nordic Semiconductor's strategic expansion into the world of Wi-Fi, starting with the acquisition of Wi-Fi assets from Imagination Technologies, is proving fruitful. The addition of the nRF7000 Wi-Fi 6 IC to complement GNSS-based location and cellular IoT location technology presents a powerful solution for asset tracking systems. By incorporating Wi-Fi SSID-based location data, Nordic Semiconductor offers a more efficient and power-efficient alternative compared to competitive products. This innovation addresses the need for precise location data, particularly in challenging environments where satellite signals may be unreliable.
FROM THE MEDIA: Nordic Semiconductor's recent launch of the nRF7000 low-power Wi-Fi 6 IC marks a significant milestone in the company's journey to provide a comprehensive location solution. By combining Wi-Fi SSID-based positioning with cellular IoT and GNSS technologies, Nordic Semiconductor offers a versatile and power-efficient means of determining location, particularly suitable for asset tracking applications. This innovation not only expands the possibilities for industrial and logistical tracking but also enhances location accuracy, even in areas where satellite signals may be limited. Nordic Semiconductor's commitment to Wi-Fi integration is revolutionizing location data solutions.
READ THE STORY: Wi-Fi Now
CI/CD Risks: Protecting Your Software Development Pipelines
Bottom Line Up Front (BLUF): Dependabot, a tool widely praised for automating dependency checks and updates in software projects hosted on GitHub, is facing a new threat. Security firm Checkmarx has highlighted malicious actors attempting to impersonate Dependabot by mimicking its pull request suggestions, potentially deceiving developers into accepting harmful changes. This incident underscores the broader vulnerabilities within Continuous Integration and Continuous Deployment (CI/CD) pipelines. While CI/CD workflows have streamlined software development, they also connect the external world of development tools with internal processes, creating security risks that need attention.
Analyst Comments: CI/CD pipelines have transformed software development, allowing for rapid integration and deployment. However, they also introduce potential risks, such as the inclusion of malicious code from third-party libraries or the exposure of sensitive credentials in logs. Attacks like typosquatting and dependency confusion target open source software, exploiting the pipeline's reliance on these components. Security defaults in CI/CD platforms are often lacking, making them susceptible to breaches. Developers must take proactive measures to secure pipelines and protect against unauthorized access and code compromise.
FROM THE MEDIA: Dependabot's growing popularity in automating software maintenance tasks has attracted malicious actors attempting to impersonate the tool to deceive developers. This incident sheds light on the broader security challenges within CI/CD pipelines, which serve as critical links between external development tools and internal processes. While CI/CD workflows offer efficiency, they also introduce potential vulnerabilities, such as the inclusion of malicious code and exposure of sensitive information. Security measures like access restriction, multi-factor authentication, and vigilant monitoring are essential to safeguard CI/CD pipelines and maintain software supply chain integrity. Developers must adopt a secure-by-design approach and implement best practices to address these vulnerabilities effectively.
READ THE STORY: THN
Software Supply Chain Risks Threaten Election Systems
Bottom Line Up Front (BLUF): As the United States approaches another Presidential Election year, concerns over cyber threats to election systems are growing. While the focus often centers on direct attacks on voting machines and infrastructure, a more significant and often overlooked threat lies within the software supply chains that support election technology vendors. This article examines the critical vulnerabilities in election systems' software supply chains, emphasizing the need for robust cybersecurity measures to protect democracy.
Analyst Comments: The security of election systems has become a politically charged issue, leading to polarized debates. However, it is crucial to address the risks associated with both hardware and software infrastructure supporting elections. The supply chain risks in software used by election technology vendors deserve particular attention. Election software comprises a mix of open source and third-party components, making it susceptible to compromise. This infrastructure is highly attractive to nation-state actors and cybercriminals due to its significance.
FROM THE MEDIA: As the U.S. gears up for another Presidential Election, the security of election systems remains a critical concern. While media attention often focuses on direct cyberattacks against voting infrastructure, the vulnerabilities within the software supply chains supporting election technology vendors are equally concerning. These supply chain risks encompass a mix of open source and third-party components, making them attractive targets for nation-state actors and cybercriminals.
READ THE STORY: SpiceWorks
Items of interest
HPE and Nvidia Collaborate on Modular Supercomputer for AI Training
Bottom Line Up Front (BLUF): Hewlett Packard Enterprise (HPE) and Nvidia have joined forces to offer a modular supercomputer designed for AI training. Based on HPE's Cray EX2500 architecture and Nvidia's Grace Hopper Superchip, the system features a quad GH200 Superchip node configuration, each containing four of Nvidia's high-end silicon. This collaboration aims to provide organizations with a preconfigured and pretested stack, simplifying the deployment of AI training solutions. While this high-performance hardware doesn't come cheap, HPE highlights its scalability, allowing customers to start small and expand as needed. Pricing details are yet to be disclosed.
Analyst Comments: The collaboration between HPE and Nvidia to create a turnkey supercomputer for AI training addresses the growing demand for powerful computing resources in the AI field. By offering a preconfigured and pretested system, the partnership aims to lower the barrier for organizations looking to delve into AI training, reducing the complexity of deployment. However, the cost factor remains a key consideration, as such high-performance hardware may be out of reach for some organizations. The emphasis on scalability is a positive aspect, allowing customers to adapt their infrastructure to evolving AI needs.
FROM THE MEDIA: HPE and Nvidia have unveiled a modular supercomputer for AI training based on HPE's Cray EX2500 architecture and Nvidia's Grace Hopper Superchip. The system features a quad GH200 Superchip node configuration, offering substantial processing power for AI workloads. By providing a preconfigured stack, the collaboration aims to simplify the deployment of AI training solutions, making it more accessible to organizations. While pricing details are forthcoming, the system's scalability allows customers to start small and expand as their AI requirements grow. The solution is expected to be available from December in more than 30 countries and is likely to find interest among AI innovation centers, research institutions, and large enterprises.
READ THE STORY: The Register
learning AI and ChatGPT isn’t that hard (Video)
FROM THE MEDIA: Anyone can learn machine learning. You don’t need a fancy college degree nor do you need to be a math genius. No matter where you are in your journey, you can start learning machine learning and Artificial Intelligence. In this video, NetworkChuck will show you how you can get started with Machine Learning, an insanely lucrative path. So, don’t wait, start learning the technologies behind things like ChatGPT and OpenAI.
Create a Large Language Model from Scratch with Python
FROM THE MEDIA: Learn how to build your own large language model, from scratch. This course goes into the data handling, math, and transformers behind large language models. You will use Python.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.