Cryptocurrency Avalanche Decreases More Than 3% Within 24 hours – Benzinga – Benzinga

Avalanche's AVAX/USD price has decreased 3.84% over the past 24 hours to $19.01. This is contrary to the coins performance over the past week where it has experienced an up-trend of 8.0%, moving from $17.68 to its current price.

The chart below compares the price movement and volatility for Avalanche over the past 24 hours (left) to its price movement over the past week (right). The gray bands are Bollinger Bands, measuring the volatility for both the daily and weekly price movements. The wider the bands are, or the larger the gray area is at any given moment, the larger the volatility.

The trading volume for the coin has fallen 8.0% over the past week which is opposite, directionally, with the overall circulating supply of the coin, which has increased 0.08%. This brings the circulating supply to 282.11 million, which makes up an estimated 39.18% of its max supply of 720.00 million. According to our data, the current market cap ranking for AVAX is #17 at $5.37 billion.

Powered by CoinGecko API

This article was generated by Benzinga's automated content engine and reviewed by an editor.

See the article here:
Cryptocurrency Avalanche Decreases More Than 3% Within 24 hours - Benzinga - Benzinga

Impact of Blockchain and Cryptocurrency on Gambling Industry – Gamesreviews

Gambling has been known for a long time, because it dates back to the craps game. Years of development and technology have taken it to a new level and now you can test your luck at online casinos. Many choose this way of earning as an easy approach to get money.

Others consider online games a way to relax, have fun and if lucky to pull off a nice score. As mentioned above, modern problems need modern solutions, so casinos working with cryptocurrency are becoming popular. Best tron casinos open opportunities to make money, when all you need is the desire and the right calculations. Popularity of this entertainment is also due to the blockchain technology, because it is essentially the most obvious way to end the gambling industrys non-transparency. But is it true? Lets look at how blockchain and cryptocurrency affect gaming.

The main thing about blockchain is that you can create on its basis not only something about cryptocurrencies, but any service based on this technology. Blockchain is a continuous consecutive chain of blocks containing data, set up according to certain rules. Most often, copies of the blockchain are stored on many different computers independently of each other.

The term first appeared as a name for a fully replicated distributed database implemented in the bitcoin system. Because of this, blockchains are often referred to transactions in various cryptocurrencies. However, blockchain technology can be extended to any interconnected blocks of information.

Companies of all sizes and industries are experiencing blockchain technology. But organizations need to understand the value of blockchain and the differences between its different types (integrated, private, public, etc.) They also need to understand if the technology makes sense in each case and how best to integrate it into their business.

Most projects use blockchain technology within the corporate space. It could be an exchange of digital assets between two or more parties, a way to track the movement of goods from one location to another, or a way to verify trust between two parties when evaluating information.

Passion is an integral part of any persons life. Proponents of gambling consider it an innocent hobby that can enrich a player in a matter of seconds. While the opponents talk about the risk of losing everything.

All this has led to the prohibition or serious restriction of gambling in many countries. Other states, on the contrary, dont take any significant measures to regulate this market. Both approaches have their pros and cons. In case of strong regulation, a great part of the market goes underground and allows criminal activity to flourish. It causes a number of problems which newly established businesses are trying to avoid.

Nevertheless, the non-transparency is an integral part of the gambling industry, regardless of the state policy in relation to it. So this is where blockchain technology and cryptocurrency gaming come into play.

It has become the best way to ensure the transparency of the gaming industry. Blockchains unchangeable and verifiable nature makes it the perfect solution to ensure the complete integrity of any online game.

Many projects that have emerged in recent years use this technology in varying ways. It guarantees anonymity, transparency and honesty, which are becoming major advantages for gaming online. You can also benefit from resources like BestSlotsWorld, which reveals details about different casinos and collects a selection of verified resources. In that way you narrow down the search of gambling websites.

The advantages of blockchain have already expanded beyond fintech. The key blockchain properties are attractive to gambling companies as well, because they provide:

Gambling is evolving, and new technologies are creating new workflows and simplifying all processes. Cryptocurrency also has a great impact on businesses giving many advantages. Blockchain makes the platform work fast and as secure as possible from possible fraud. The technology is able to solve the gambling problems, such as lack of transparency, speed of payments and high entry barrier for new players. So dont be afraid to gamble with cryptocurrency and score big.

More here:
Impact of Blockchain and Cryptocurrency on Gambling Industry - Gamesreviews

Virginia men busted in Irvington robbery plot targeting cryptocurrency – The Journal News

Two Virginia men are accused of taking part in a home invasion plan in Irvington two years ago that targeted tens of millions of dollars in cryptocurrency, the U.S. Attorney's Office said Friday.

Dominic Pinedaand Shon Morgan, both 21, were arrested in Virginia on an indictment in the Southern District of New Yorkcharging them with conspiracy to commit Hobbs Act robbery.

Federal authorities would not confirm whether the target was an Irvington High School senior, Ellis Pinsky, who three weeks earlier made headlines when hewas sued by a cryptocurrency investor claiming Pinsky had stolen more than $23 million in Bitcoin from him in 2018.

But Irvington police Lt. Kevin Johnson said Fridaythat there was a break-in on May 23, 2020, at a home on Hamilton Road. He would not specify the house but Pinsky's mother owns a home on that street.

Police responded to an alarm at the home as well as a 911 call from a resident shortly before 4:30 a.m. When they arrived, one person was found in the basement and another outside the house, Johnson said.

A pair of brass knuckles was found in the house.

Abortion:Hudson Valley reacts to overturning of Roe v. Wade

Crime:Ex-Peekskill police officer sentenced for sexually abusing woman

Scarsdale:Pair reprimanded for keeping school board in dark about IRS fines

Johnson would not identify the two but said neither were Morgan or Pineda. No state charges were filed and a decision was made that the case would be handled by federal authorities.

According to U.S. Attorney Damian Williams, Pineda and Morgan conspired with others to break into the house and"force its residents to provide the code to what the defendants believed was tens of millions of dollars in Bitcoin currency."

Hobbs Act robbery is one that affects interstate commerce. The defendants were expected to be presented Friday afternoon in U.S. District Court in Virginia. It was not immediately clear who their lawyers were.

The case was investigated by the FBI Westchester County Safe Streets Task Force with assistance from Irvington police and the Greenburgh Drug and Alcohol Task Force.

Pinsky was sued in federal court weeks before the break-in by Michael Terpin, a cryptocurrency investor from California, who claimed he had $23.8 million in Bitcoin taken from him "through a hack perpetrated by Pinsky and his gang of digital bandits."

According to the lawsuit, Pinsky was 15 at the time Terpin lost his money in 2018 through a so-called SIM swap, a sophisticated hack in which a victim's cellphone is accessed to obtain personal information that can help access cryptocurrency accounts.

The lawsuit, which is ongoing, alleges that Pinsky and his associates amassed more than $100 million through crypto hacks. Pinsky began representing himself last year because he could no longer afford his lawyers. He has since gotten other lawyers.

Pinsky and his new lawyers could not be reached.

Another person involved in taking Terpin's money was Nichola Truglia, who pleaded guilty to conspiracy to commit wire fraud last year in federal court in Manhattan.

Terpin has successfully suedTruglia in California for more than $70 million.

Twitter: @jonbandler

Go here to see the original:
Virginia men busted in Irvington robbery plot targeting cryptocurrency - The Journal News

Cryptocurrency Solana Decreases More Than 5% Within 24 hours – Benzinga – Benzinga

Solana's SOL/USD price has decreased 5.14% over the past 24 hours to $36.51, continuing its downward trend over the past week of -1.0%, moving from $37.37 to its current price.

The chart below compares the price movement and volatility for Solana over the past 24 hours (left) to its price movement over the past week (right). The gray bands are Bollinger Bands, measuring the volatility for both the daily and weekly price movements. The wider the bands are, or the larger the gray area is at any given moment, the larger the volatility.

The trading volume for the coin has fallen 32.0% over the past week, moving in tandem, directionally, with the overall circulating supply of the coin, which has decreased 0.03%. This brings the circulating supply to 342.77 million. According to our data, the current market cap ranking for SOL is #9 at $12.54 billion.

Powered by CoinGecko API

This article was generated by Benzinga's automated content engine and reviewed by an editor.

See more here:
Cryptocurrency Solana Decreases More Than 5% Within 24 hours - Benzinga - Benzinga

Can Cryptocurrency And DAOs Help Fundraise For Abortion Rights Groups? CowgirlDAO Leads The Way – Benzing – Benzinga

The decision by the U.S. Supreme Court to overturn Roe v. Wade could have a huge impact on access to abortions. The cryptocurrency and NFT sectors have been taking note for months of a potential ruling and are raising money to support one another. Heres the latest.

What Happened: After a draft opinion of Roe v. Wade leaked in May, Molly Dickson began drafting a non-fungible token (NFT)collection to raise funds to support abortion rights groups, the Washington Post previously reported. Dickson formed CowgirlDAO, a decentralized autonomous organizationto raise funds, withthe DAO launchinga collection of 10,000NFTs, which is now minting.

The collection called F*** Youhas three different images and editions. The titles of the works are My mom said youre not supreme, Alito, Never heard of you, Coney Barrett and Kick Rocks, Kavanaugh all named after Supreme Court justices who voted to overturn Roe V. Wade.

CowgirlDAOhosted aTwitter Inc TWTRSpaces to help spread awareness. Dickson previously designed a collection called Computer Cowgirls, which raised more than$30,000 for Fund Texas Choice, a Texas nonprofit that helps with transportation costs for travel out of state for abortions.

CowgirlDAO modeled its work and initiatives after the Ukraine DAO, which raised more than $6 million for Ukraine after the invasion by Russia. Ukraine DAO sold NFTs of the Ukrainian flag to raise funds.

A Twitter account for Choice DAO was foundedto raise funds for abortion rights. The group is not accepting donations yet but has a future goal of raising $1 million in 26 days. The number of days refers to the number of states expected to ban abortion.

Were leveraging community and capital to combat one of the greatest threats to personal liberty in our lifetimes, the DAOs website reads.

The DAO will vote on four different donations of $250,000 using a community voting system to award the funds. A donation to the DAO grants access to the community and a vote in decisions.

Related Link: 3 Women's Health Stocks Are Soaring Following Roe V. Wade Ruling

Why Its Important: Cryptocurrency and NFTs being used to raise funds for abortion rights groups could rise in popularity after the recent U.S. Supreme Court ruling.

Similar to the invasion of Ukraine by Russia, people around the world can now find ways to donate funds to those directly impacted by the ruling.

Those wishing to donate should be aware that some scams could arise to take advantage of these funds set up for this political issue.

Photo: Cowgirl DAO

See the original post here:
Can Cryptocurrency And DAOs Help Fundraise For Abortion Rights Groups? CowgirlDAO Leads The Way - Benzing - Benzinga

Dori: Was Twitter shadow-banning you or me? – MyNorthwest.com

Something weird went down for me on Twitter this week and Im not sure if its because of Dori Monson Show listeners or me.

While I was on a short vacation a few days ago, I tried unplugging as much as possible. That meant only occasional checks on my email. Cursory reads on news sites. A text or two to my daughters. Face-to-face talking to my wife.

Elon Musk to buy Twitter for $44B and take it private

Imagine my surprise when I looked at Twitter Monday night and found my account popping faster than Rice Krispies in milk.

Even though I have seriously cut back from tweeting and post only occasionally now, I was fortunate to have about 19,800 followers as of last Sunday one day before Elon Musks reported $44 billion takeover of Twitter took news sites by storm.

By mid-day Friday, I had 21,231 followers. Admittedly, Im no techno-wizard but I have to admit: this was crazy.

It took 12 years to get 19,000 Twitter followers. It took just three days to get 1,500 more.

My numbers were small in comparison. Florida Gov. Ron DeSantis gained 205,695 followers between Monday and Wednesday. Podcaster Joe Rogan tallied an almost 135,000 bump.

Was it as Twitter had been denying for at least two years because of shadow-banning an algorithm practice that social media giants denied was occurring?

Whether you call it shadow-banning, stealth banning or ghost banning, was this an example of a behemoth social media company restricting the reach of a users account? Or was it limiting potential followers their opportunity to follow conservative Twitter users that the far left didnt like?

And if so, was it Twitter banning me? Or banning my listeners from having you as followers?

Some in the media are digging into the possibility that Twitter employees were liberal gatekeepers who on their way out the door before Musk took over removed barriers to conservative users. Why? To deny that barriers existed in the first place.

Me? Im just happy to have freedom of speech on the radio with open-minded people who agree and disagree.

Maybe now that will return to Twitter.

Listen to Dori Monson weekday afternoons from noon 3 p.m. on KIRO Newsradio, 97.3 FM. Subscribe to thepodcast here.

Read the original post:

Dori: Was Twitter shadow-banning you or me? - MyNorthwest.com

Are You Ready to Be Surveilled Like a Sex Worker? – WIRED

Additionally, many traditional methods for maintaining relative anonymity on the internet are likely to begin to evaporate. Consider that institutions subject to the Childrens Internet Protection Act (CIPA), which requires libraries and schools to block access to content that may be harmful to minors, will have to decide whether to allow public access to abortion information.

Mass surveillance is so normalized that the basic ways we function in the world ultimately help these technologies become more sophisticated. If you are seeking, providing, or facilitating an abortion, you can take practical measures to secure your digital footprint: perform risk assessments, communicate via Signal and enable disappearing messages, use a VPN on your smartphone and computer, use DuckDuckGo instead of Google, acquaint yourself with existing surveillance technologies like traffic cams, facial recognition, and data scrapping, enable two-factor authorization, log out of all your accounts (yes, even when using an incognito browser), only connect to Wi-Fi in public places that dont require you to authenticate yourself, move money out of third-party apps immediately (and eat the transfer fee), use cash or prepaid cards when you can. Do as much organizing offline as possible.

If you organize publicly, post nothing that could be used to dox you. Some precautions Ive taken for my own safety as a sex worker include withholding my birthday, age, ethnic background, hometown, current city, former cities, commute, alma maters, graduation years, time zone, weather, current employers, past employers, even my favorite color. When I post photos, I photoshop out my face and tattoos, and I never reveal my natural hair. If I post a screenshot, I crop out any time stamps.

I know this sounds paranoid. These precautions seem excessive; the algorithms seem dystopian. But the oppression these technologies reproduce is insidious and ubiquitous, and those seeking to surveil us have been refining the tools to do so for a very long time. This is exactly why sex workers are preyed upon first: because those in power know nobody will listen to us until youve already googled two weeks late for period.

When I begin to wonder why people behave the way they do, I answer the query with a question: Whats seven minus yellow? Unanswerable and, more importantly, irrelevant. I cant deduce others motives, and even if I could, their motives do not matter when it comes to the effects of their actions. To ruminate on this is, at best, a waste of time, and in the wake of Roe, hemming and hawing over the justices intents is the equivalent of bringing a feather to a knife fight.

That said, we can dissect these decisions and try to divine how this legislation will impact us. The first step is to abandon any lingering trust you may have in the integrity of the state.

Neither the intent nor effect of FOSTA or Dobbs is to eradicate sex work or abortions, which have existed for millennia and will continue to exist regardless of legality. Remember: these measures arent about the law; theyre about power. Such laws slowly and systemically exclude certain demographics from participation in society by codifying what cultural biases already enforce. Consequently, while some people will face arrest, and many more will live the nightmare of carrying an unwanted or unviable pregnancy to term, the widest-reaching effects of this legislation will be the chilling of free speech and the systemic deplatforming of abortion activists from social media and financial institutions, which will protect themselves from liability at our expense.

The bad-faith arguments that structure these laws become much more apparent when read for what they are: propaganda. FOSTA, for instance, focuses primarily on fighting the sexual exploitation of children. Sex work and human trafficking, rather than existing together under the umbrella of the sex trade, are diametrically opposed. The dangerous rhetoric conflating thema linkage that makes about as much sense as comparing a Hershey Park employee to an enslaved cocoa farmermeans that violence against us gets perceived and excused as protecting children from traffickers.

Likewise, the pro-life rhetoric that enabled the Dobbs decision focuses on protecting, in this case, hypothetical children from death. Echoing FOSTA, Alito claims that Dobbs is intended to protect the potential life of embryos and fetuses, even at the expense of the mothers existing life. Intent aside, the result is that many more fetusesas well as the people carrying themwill die.

Sex workers can offer valuable insights into this fight and those likely to follow, but our voices have been suppressed. Hopefully tech workers will practice what they preach and start listening to sex workers, but if not: Well, thats by design. In the words of Bardot Smith: Whores told you.

Excerpt from:

Are You Ready to Be Surveilled Like a Sex Worker? - WIRED

Know Your Enemy and Yourself: A Deep Dive on CISA KEV – Security Boulevard

Why your real-world firmware risk is way bigger than you think

In November 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) began publishing their Known Exploited Vulnerabilities Catalog (KEV). Designed to help government agencies and private sector organizations prioritize the vulnerabilities known to be actively exploited by malicious actors, as of June 22, 2022, the list contains 778 actively exploited CVEs, encompassing 20 years of computing (2002-2022). In fact, CISA recommends these KEVs be addressed even prior to other High or Critical vulnerabilities that are not yet known to be exploited, citing the fact that less than 4% of vulnerabilities are ever exploited in the wild. With more than 20,000 CVEs discovered in 2021 alone, the KEV gives organizations a highly distilled list of vulnerabilities that are most likely to have a real-world impact based on observed actions in the wild.

So important are the KEVs, that a new Binding Operational Directive 20-01 Develop And Publish A Vulnerability Disclosure Policy requires Federal Civilian Executive Branch agencies (aka FCEBs) such as the DOJ, DOT, DHS, DOE, GSA, SEC etc., to implement entire vulnerability management programs built around it, along with auditable documentation that is publicly visible to all. An example of the changes enforced by this order would be the DOJs VDP page here, which outlines the DOJs Vulnerability Disclosure Program.

Note that while the BOD does not directly require private/commercial entities that sell into these FCEBs to create a VDP and prioritize KEVs, it is suggested that they might do so.

Although not bound by BOD 22-01, every organization, including those in state, local, tribal, and territorial (SLTT) governments and private industry can significantly strengthen their security and resilience posture by prioritizing the remediation of the vulnerabilities listed in the KEV catalog as well.

Security trust and parity across organizations and the vendors that sell their software and devices into them is paramount to national security. Private organizations would be wise to leverage the significant DFIR telemetry, FBI and Fusion Center telemetry, researcher and trust-community initiatives in place, and the overall publicly funded effort it takes to curate the KEVs; as a defensible, actionable, and structured approach to vulnerability risk management.

CISA itself does not yet categorize the vulnerabilities, so we augmented their list by assigning categories to each vulnerability to get a better understanding of the types of assets and code that threat actors are targeting the most.

By categorizing each vulnerability, we are able to identify exploitation trends over the last 20 years which gives some perspective into the evolution of attacker targets.

Trended over time, it is no surprise to see the number of actively exploited vulnerabilities increasing year over year, and its important to note that CISA adds vulnerabilities as exploitation is detected. As a result, the number of exploited CVEs in a previous year could climb based on the data CISA has available.

In terms of categories, firmware led the way overall, followed by server software, operating systems, and web browsers. Lets analyze each category in more detail.

While the prevalence of firmware-based CVEs may be a surprise to some, it is a reflection of the large-scale shift of adversaries targeting firmware within enterprise and network infrastructure. Its also important to note that the numbers arent skewed simply due to an anomalous spike in the data. Firmware has been one of the leading categories of vulnerabilities over the past 5 years and continues to be thus far for 2022. Firmware is the leading category over virtually any time horizon we choose.

This is a troubling trend for many organizations given that traditional vulnerability management programs often dont reach down to the firmware level. Firmware makes up the foundation of modern computing, running on every device before the operating system even loads.very computer contains multiple components like CPU, memory, network adapter, video cards, and hard drives and each of these components contains firmware, difficult to monitor due to running at a level below the operating system. The compromise of firmware can provide an attacker with persistent access, even if the operating system is fully reinstalled or even if the hard drives are replaced.

While it is one thing to acknowledge these firmware vulnerabilities are known to be exploited, it is quite another to realize that the actors behind these active attacks are some of the most prolific and notorious there are, and responsible for some of the longest-running campaigns against both government and critical infrastructure. While the table of KEVs does not specifically identify (aka attribute) a given actor with a given vulnerability thats been exploited, it is easy enough to infer by simply reviewing the long list of recent CISA advisories, or even their high-level Shields Up! initiative. There, the reader can gain a much deeper insight into the campaigns and TTPs (Tools, Tactics, Procedures), leveraging vulnerabilities to meet their objectives. Well known Russian and Chinese nation-state sponsored attacks, as well as cyber criminal and ransomware actor groups, as well as attacks against our software supply chain, managed service providers, telecom infrastructure, hospitals and more. The initial vector into the attacked organizations is more often than not, the firmware of externally-facing devices such as routers, firewalls, VPN devices, and soho devices. Equally apparent, is that these same actors are also leveraging vulnerable firmware on devices internal to the network in order to persist, gather credentials, tunnel C2 (command and control) and exfiltrate data.

Network devices also run firmware, and while they also run an operating system, unlike desktops and servers they lack the advanced security tooling deployed across many enterprises. Due to their mission criticality, they are extremely high-value targets as they can be leveraged to further breach a network, monitor or redirect traffic, or even shut down large parts of the Internet.

Servers are naturally high-value targets for attackers as they frequently store large amounts of sensitive data such as email, databases, code repositories, and customer data. In 2017, the MS17-010 vulnerability in SMB Server facilitated both the WannaCry and NotPetya cyber attacks, causing billions of dollars in damage, shutting down shipping ports, and impacting businesses worldwide. Likewise, threat actors have notably exploited vulnerabilities in Microsoft Exchange Server in order to steal confidential information and deploy ransomware. Most recently, the industry experienced widespread attacks against Atlassian Confluence Server by attackers using a previously unknown vulnerability (CVE-2022-26134) affecting all versions of Confluence Server.

Operating systems serve the end-user(s) and applications on a given device, and any compromises to the OS can give attackers access to data and privileges, and open additional vectors of attack. Threat actors can use this access to maintain persistence, move laterally to other hosts, steal data, and deploy ransomware.

Securing and monitoring operating systems for compromise has become a multi-billion dollar industry, evolving from basic antivirus software in the 1990s to current cloud-based solutions which monitor every action on the system in an attempt to catch patterns of events known to be malicious.

Operating system vendors have improved over the years in terms of providing automated updates to ensure that any vulnerabilities are mitigated quickly in order to reduce their exposure to threat actors. Yet in spite of these efforts, OS vulnerabilities continue to be popular with threat actors including 42 vulnerabilities from 2021 alone. These vulnerabilities were mostly spread across versions of Windows operating systems and Apples iOS.

As the majority of applications have shifted to the browser, so too has cybersecurity risk. Virtually all of a users experiences are delivered through a browser, and users can easily use dozens or even hundreds of web-based sites and applications in a given day. This creates a target-rich environment for attackers, who can lure users into risky clicks or use automated exploit kits to deliver malware to vulnerable browsers.

Browser CVEs have proven to be popular in the wild with attackers. In particular, vulnerabilities in Google Chrome were found to be popular such as CVE-2021-21224, which was targeted by the Magnitude Exploit Kit.

End-user applications such as the Microsoft Office suite and Adobe Acrobat have long been targeted by attackers. Vulnerabilities in these applications can allow an adversary to gain code execution by luring users into opening a malicious file and have been a mainstaying of phishing campaigns for many years. Notably, the KEV catalog includes the Microsoft vulnerability CVE-2022-30190, which can be exploited by an attacker even if the user does not open the malicious file.

In order to maximize their targets, attackers have naturally focused on applications that are virtually ubiquitous. This has made Adobe Acrobat and Acrobat Reader particularly popular targets. For example, the recent Adobe vulnerability, CVE-2021-28550, was first observed in the wild as a 0-day vulnerability, allowing attackers to gain arbitrary code execution on a victim device.

While much of modern computing runs in a web browser, users and organizations still rely on a variety of traditional desktop applications. Popular chat applications like WhatsApp have been targeted by companies like NSO Group, who famously used a zero-day exploit to compromise and subsequently spy on Amazon CEO, Jeff Bezos. The KEV catalog includes multiple WhatsApp vulnerabilities including CVE-2019-3568 and CVE-2019-18426, as well as vulnerabilities in common applications such as Team Viewer Desktop.

Open source software has become an essential part of modern application development, allowing developers to quickly integrate capabilities into their applications and projects. However, this widespread reuse of code means that vulnerabilities in open source projects can likewise be incorporated into countless applications. For example, the notorious Heartbleed vulnerability in the OpenSSL library affected hundreds of thousands of devices globally. More recently, in December 2021, a remote code execution vulnerability in the popular Log4j library came under widespread exploitation. A Neustar International Security Council (NISC) survey indicated an estimated 60% of organizations had been targeted through this vulnerability. CISA also released an alert on June 23rd 2022 warning organizations that malicious actors have been using the Log4j exploit to breach VMWare servers before moving laterally inside the network.

Additionally, attackers have begun employing a new tactic: inserting malicious code into popular libraries. While it is hard to quantify the number of successful attacks resulting from this tactic, GitHub has updated its advisory database to include malware found in open source projects.

Virtualization is a relatively new attack vector in computing, and due to the rapid rise of cloud computing and containerization is one that will likely increase. However, much like attackers have targeted the execution environment of operating systems, they can similarly target the virtual environments and containers that support modern workloads. Vulnerabilities in these areas are potentially significant as they can allow an attacker to escape the virtualized environment and gain control over the physical host. The recent exploitation of the VMware vulnerability, CVE-2022-22960, provides a case in point.

Ultimately an organizations cybersecurity strategy must be informed by the risks and threats observed in the real world. CISAs KEV catalog is a powerful tool, arming security teams with insight into the vulnerabilities that matter most.

When it comes to firmware, there is an opportunity for organizations to see an area where they are likely under-appreciating their risk. The KEV data indicates that firmware has become a top target for real-world adversaries. This could be due to the powerful and strategic nature of firmware itself, or the fact that firmware often does not get updated and patched with the same rigor as other forms of code, or a combination of the two. However, regardless of the motivation, the data shows that firmware has consistently been an area of focus in real-world attacks, and it is up to security teams to build the processes to ensure the posture and integrity of their critical firmware.

For any questions, regarding the data in this post or to learn more about firmware security, please contact the Eclypsium team at [emailprotected].

View original post here:
Know Your Enemy and Yourself: A Deep Dive on CISA KEV - Security Boulevard

The man behind the leaks: Series paints picture of Julian Assange

In the second episode of new ABC seriesIthaka: A Fight to Free Julian Assange, the man behind some of the largest classified-document leaks in history sings Twinkle, Twinkle, Little Star over the phone to his young son as he gets ready for bed.

Minutes before the sweet bedtime scene, Assanges wife and legal adviser Stella Moris watches a video of a gospel choir singing in support of Assange outside of Belmarsh prison, where he has been held since he was dragged out of Londons Ecuadorean embassy in 2019.

This is the side of Wikileaks founder Julian Assange that his family wants you to see in the two-part documentary series available to stream from tonight on ABC iview.

Julians brother, Gabriel Shipton, one of the series producers, said he decided to document Assanges fight for freedom after seeing how much his condition had deteriorated during a visit to see him in Belmarsh prison in late 2019.

Facing the possibility of never seeing his brother again, Gabriel, who hadnt previously been involved in advocating for Assange, decided to bridge the disconnect between the real Julian and the publics perception of him after years of media scrutiny.

Everybody who knows Julian knows him as a funny, sensitive, goofy, gentle genius, Gabriel said.

But I was almost afraid to tell people that I was Julian Assanges brother because of all these smears and things that were in the media.

Gabriel began filming his and Julians father, John Shipton, as he advocated for Assanges release, and brought on director Ben Lawrence to write and direct the project six months later.

Ithaka documents two years of the fight against Assanges extradition to the US on espionage charges.

But Assange only appears via phone and FaceTime calls, and via CCTV footage of his time in Londons Ecuadorean embassy.

His presence is always felt but rarely seen by the audience a deliberate tactic Ben says was used to mimic the real-life experience of Assanges family.

Instead, John takes centre stage.

Ben said with Assange imprisoned and focusing on his legal fight, it was natural that John was at the forefront of the documentary.

As John says in episode one, Assange can no longer speak for himself, so his family and friends must speak for him.

The documentary gives viewers unprecedented insight into the private lives of Assanges family, which is particularly momentous for Stella, who only revealed herself as Assanges partner and mother of his children in 2020.

Ithaka shows footage of Stella visiting Assange with their first baby son during his stint in the Ecuadorean embassy, and follows her to Barcelona to visit her parents, who help look after the children as she deals with Assanges legal issues.

Stella had good reason for keeping her identity hidden in the past, having feared for her life at the hands of the CIA, but has since decided that Assanges needs are greater.

Im here to remind you that Julian isnt a name, hes not a symbol, she says in a speech.

Hes a man, hes a human being, and hes suffering.

Throughout the documentary, the audience sees John transform from someone happy to smile and speak to as many journalists as possible, while slightly umm-ing and ah-ing, to a more self-assured, media-savvy man equally more reluctant to face microphones and cameras.

Were here because we have a problem, we have a child in the sh and want to get him out, John tells the audience.

But he admits in the second episode, when he appears tired and disillusioned, that he doesnt see Assanges predicament getting any better only worse.

Ben says this is simply a moment of despair for a man who has seen his son lose a decade through imprisonment in one form or another, before he continues trying to free him.

As John points out in Ithaka, life does not follow the convenient Hollywood structure of a beginning, middle and conclusion: Assange is still fighting extradition to the US.

Since the documentary completed filming, a UK court has formally approved the extradition of Assange to the US, which set alarm bells ringing for those concerned over protections of journalists and whistleblowers.

It is now up to the UK Home Secretary to determine whether the WikiLeaks founder will be extradited.

The two-part series Ithaka: A fight to free Julian Assange will air on ABC TV at Tuesday, June 7 at 8.30pm AEST, or on ABC iview

Read more from the original source:
The man behind the leaks: Series paints picture of Julian Assange

First Amendment to the Constitution | Community | hometownsource.com – ECM Publishers

Country

United States of AmericaUS Virgin IslandsUnited States Minor Outlying IslandsCanadaMexico, United Mexican StatesBahamas, Commonwealth of theCuba, Republic ofDominican RepublicHaiti, Republic ofJamaicaAfghanistanAlbania, People's Socialist Republic ofAlgeria, People's Democratic Republic ofAmerican SamoaAndorra, Principality ofAngola, Republic ofAnguillaAntarctica (the territory South of 60 deg S)Antigua and BarbudaArgentina, Argentine RepublicArmeniaArubaAustralia, Commonwealth ofAustria, Republic ofAzerbaijan, Republic ofBahrain, Kingdom ofBangladesh, People's Republic ofBarbadosBelarusBelgium, Kingdom ofBelizeBenin, People's Republic ofBermudaBhutan, Kingdom ofBolivia, Republic ofBosnia and HerzegovinaBotswana, Republic ofBouvet Island (Bouvetoya)Brazil, Federative Republic ofBritish Indian Ocean Territory (Chagos Archipelago)British Virgin IslandsBrunei DarussalamBulgaria, People's Republic ofBurkina FasoBurundi, Republic ofCambodia, Kingdom ofCameroon, United Republic ofCape Verde, Republic ofCayman IslandsCentral African RepublicChad, Republic ofChile, Republic ofChina, People's Republic ofChristmas IslandCocos (Keeling) IslandsColombia, Republic ofComoros, Union of theCongo, Democratic Republic ofCongo, People's Republic ofCook IslandsCosta Rica, Republic ofCote D'Ivoire, Ivory Coast, Republic of theCyprus, Republic ofCzech RepublicDenmark, Kingdom ofDjibouti, Republic ofDominica, Commonwealth ofEcuador, Republic ofEgypt, Arab Republic ofEl Salvador, Republic ofEquatorial Guinea, Republic ofEritreaEstoniaEthiopiaFaeroe IslandsFalkland Islands (Malvinas)Fiji, Republic of the Fiji IslandsFinland, Republic ofFrance, French RepublicFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabon, Gabonese RepublicGambia, Republic of theGeorgiaGermanyGhana, Republic ofGibraltarGreece, Hellenic RepublicGreenlandGrenadaGuadaloupeGuamGuatemala, Republic ofGuinea, RevolutionaryPeople's Rep'c ofGuinea-Bissau, Republic ofGuyana, Republic ofHeard and McDonald IslandsHoly See (Vatican City State)Honduras, Republic ofHong Kong, Special Administrative Region of ChinaHrvatska (Croatia)Hungary, Hungarian People's RepublicIceland, Republic ofIndia, Republic ofIndonesia, Republic ofIran, Islamic Republic ofIraq, Republic ofIrelandIsrael, State ofItaly, Italian RepublicJapanJordan, Hashemite Kingdom ofKazakhstan, Republic ofKenya, Republic ofKiribati, Republic ofKorea, Democratic People's Republic ofKorea, Republic ofKuwait, State ofKyrgyz RepublicLao People's Democratic RepublicLatviaLebanon, Lebanese RepublicLesotho, Kingdom ofLiberia, Republic ofLibyan Arab JamahiriyaLiechtenstein, Principality ofLithuaniaLuxembourg, Grand Duchy ofMacao, Special Administrative Region of ChinaMacedonia, the former Yugoslav Republic ofMadagascar, Republic ofMalawi, Republic ofMalaysiaMaldives, Republic ofMali, Republic ofMalta, Republic ofMarshall IslandsMartiniqueMauritania, Islamic Republic ofMauritiusMayotteMicronesia, Federated States ofMoldova, Republic ofMonaco, Principality ofMongolia, Mongolian People's RepublicMontserratMorocco, Kingdom ofMozambique, People's Republic ofMyanmarNamibiaNauru, Republic ofNepal, Kingdom ofNetherlands AntillesNetherlands, Kingdom of theNew CaledoniaNew ZealandNicaragua, Republic ofNiger, Republic of theNigeria, Federal Republic ofNiue, Republic ofNorfolk IslandNorthern Mariana IslandsNorway, Kingdom ofOman, Sultanate ofPakistan, Islamic Republic ofPalauPalestinian Territory, OccupiedPanama, Republic ofPapua New GuineaParaguay, Republic ofPeru, Republic ofPhilippines, Republic of thePitcairn IslandPoland, Polish People's RepublicPortugal, Portuguese RepublicPuerto RicoQatar, State ofReunionRomania, Socialist Republic ofRussian FederationRwanda, Rwandese RepublicSamoa, Independent State ofSan Marino, Republic ofSao Tome and Principe, Democratic Republic ofSaudi Arabia, Kingdom ofSenegal, Republic ofSerbia and MontenegroSeychelles, Republic ofSierra Leone, Republic ofSingapore, Republic ofSlovakia (Slovak Republic)SloveniaSolomon IslandsSomalia, Somali RepublicSouth Africa, Republic ofSouth Georgia and the South Sandwich IslandsSpain, Spanish StateSri Lanka, Democratic Socialist Republic ofSt. HelenaSt. Kitts and NevisSt. LuciaSt. Pierre and MiquelonSt. Vincent and the GrenadinesSudan, Democratic Republic of theSuriname, Republic ofSvalbard & Jan Mayen IslandsSwaziland, Kingdom ofSweden, Kingdom ofSwitzerland, Swiss ConfederationSyrian Arab RepublicTaiwan, Province of ChinaTajikistanTanzania, United Republic ofThailand, Kingdom ofTimor-Leste, Democratic Republic ofTogo, Togolese RepublicTokelau (Tokelau Islands)Tonga, Kingdom ofTrinidad and Tobago, Republic ofTunisia, Republic ofTurkey, Republic ofTurkmenistanTurks and Caicos IslandsTuvaluUganda, Republic ofUkraineUnited Arab EmiratesUnited Kingdom of Great Britain & N. IrelandUruguay, Eastern Republic ofUzbekistanVanuatuVenezuela, Bolivarian Republic ofViet Nam, Socialist Republic ofWallis and Futuna IslandsWestern SaharaYemenZambia, Republic ofZimbabwe

See original here:

First Amendment to the Constitution | Community | hometownsource.com - ECM Publishers