Researchers map threat actors use of open source offensive security tools – The Daily Swig

Malware cartographers offer their insights

UPDATEDSecurity researchers have developed techniques to chart how malicious hackers make use of open source offensive security tools.

The research, presented by Paul Litvak of Israeli start-up Intezer at the VB2020 localhost conference last week, informs the long-running debate on whether the development and publication of offensive security tools is beneficial or harmful to security as a whole.

Critics argue that offensive security tools give miscreants an advantage over the security community. Those on the other side of the argument contend that offensive security tools help defenders to mitigate newly discovered techniques and probe their own defenses for flaws.

These tools are also said to have both instructional and educational value, particularly to new starters in the industry.

Up to now, little research has been presented to support either argument, and this has only served to inflame disputes on the topic that occasionally flare up on Twitter.

Litvak himself remains somewhat ambivalent about the ethics of developing open source offensive security tools.

"It's a hard question really, and I don't think we still have the full picture (hard data for the benefits of OST projects)," Litvak told The Daily Swig. "We can see that some classes of OSTs like C2 frameworks and RATs are more commonly used than other tools, and pack a bigger punch since these kinds of tools pack all the features you need for your next intrusion, so I have my doubts regarding how beneficial these kinds of tools are."

Adversaries with all types of sophistication levels use offensive security tools, from ransomware groups to top government agencies.

Intezer examined the effect of libraries that provide offensive security capabilities, or strips of code taken from larger framework-style tools (such as Mimikatz and Metasploit), that are incorporated into malware.

Overall, 80 projects were checked for code reuse against a database of thousands of labeled threat actor samples from multiple vendor reports from the last few years. A total of 29 additional script-based tools were added using existing vendor reports.

INTERVIEW Metasploit founder HD Moore on bug bounties and coronavirus

The researchers developed templates or fingerprints based on elements of these tools and scripts before searching for matching patterns across a database of millions of malware samples.

The work shed light of elements of threat actor tradecraft such as the favored use of code injection, privilege escalation, and lateral movement technique implementation projects by some groups.

Intezers work allowed it to develop an interactive map that displays threat actors proclivity for open source offensive toolkits.

The project is open source and can be updated by anyone (via GitHub), but "we're considering a more friendly format, so it'll be easier to edit and more inviting", according to Litvak.

Intezer found the most commonly adopted projects were memory injection libraries and remote access trojan (RAT) tools.

The most popular memory injection tool was the ReflectiveDllInjection library, followed by the MemoryModule library. For RATs, Empire, Powersploit, and Quasar were the leading projects.

Attackers varied widely in their level of sophistication, with Litvak categorizing them into three groups.

Lurking at the bottom were threat groups who simply copy and pasted code with little understanding of how it worked. Such lazy coders routinely forget to remove incriminating strings or artifacts.

More sophisticated miscreants, mainly made up from cybercriminals, plagiarized open source tools. Such groups have an understanding of tools and their protocols and are capable of applying customizations and of integrating open source components into their existing toolsets.

The third tier was made up of groups that integrated tools within their own toolsets or made subtle use of frameworks.

Litvak told The Daily Swig that the most sophisticated abuse of OSTs is associated with, but not restricted to, state-sponsored attackers.

"A government affiliated group can pour many more resources to their operation than a crimeware group," Litvak said. "This is actually a big motivator for crimeware groups to use OSTs since they have to use their resources more efficiently (outsource tools to public OSTs rather than build it themselves)."

For example, the so-called Turla group has made use of Metasploit as an initial infection vector for the last two years. Litvak explained:

The research points to how it might be possible to turn their use of open source tools against threat actors.

Litvak explained: "In my presentation, I presented a technique to create YARA signatures for OST code, which is hard to obfuscate unlike strings. This would mean we'll be using their usage of OSTs to detect their malware."

Intezer told The Daily Swig that the company has been able to identify a number of malware campaigns based on its mapping project.

For example, back in June it found many almost undetected samples of Lazarus tools by looking for MemoryModule memory injection library users.

This story has been updated throughout to add comment from researcher Paul Litvak

RECOMMENDED Open source security: Malicious NPM packages broadcast sensitive user data online

See more here:

Researchers map threat actors use of open source offensive security tools - The Daily Swig

Gitpod Raises $3M USD Seed Funding, Announces Native Integration with GitLab – GlobeNewswire

KIEL, Germany, Oct. 08, 2020 (GLOBE NEWSWIRE) -- Gitpod, the first open source developer platform to automate the provisioning of ready-to-code development environments, today announced $3M USD seed funding from Crane Venture Partners, Speedinvest, and Vertex Ventures US, as well as a partnership and native integration with GitLab, the DevOps platform delivered as a single application. Gitpod is an open source GitOps solution that leverages the version control system as the canonical source of truth to automate everything a developer needs to start coding. Gitpod frees engineering teams from the friction of manually setting-up local dev environments, saving dozens of hours and enabling a new level of collaboration to create applications much more quickly than ever before.

This is an exciting time in Gitpods history teaming up with experienced investors in the world of developer tools and open source software as well as working together with GitLab to provide developers with critical cloud-based dev environment automation, said Sven Efftinge, co-founder and CEO of Gitpod. Gitpods first mover advantage and vibrant open-source community enables developers today to treat development environments as automated, yet customizable, resources they can spin up whenever they need them and close down and forget about them when they are done with their task.

Setting up and maintaining dev environments is tedious and requires lots of time. With Gitpods integration into GitLab, code reviews, bug fixes, building new features and exploring new projects is frictionless while increasing development productivity, efficiency and velocity. Developers can easily launch fresh dev environments for each new task directly from the GitLab interface via a new dropdown option from any project or merge request.

Gitpod is a true open source solution powered by the community, spins up magically fast, can be self-hosted and is the only solution that works with almost any cloud provider and code-hosting platform including GitLab, GitHub Enterprise, and Bitbucket.

GitLab is excited to build a partnership with Gitpod, said Brandon Jung, vice president of alliances at GitLab. Gitpods expertise in automating cloud-based dev environments on GitLab combined with their focus on cloud native development workflows makes them a great fit for our customers helping enable them on their digital transformations.

Gitpods $3M USD seed round was led by Speedinvest with participation from Crane Venture Partners and Vertex Ventures US. Previously bootstrapped, this marks Gitpods first fund raise. The funding will be used to further refine the leading platform for development environment automation, as well as to expand Gitpods open source community and relevant ecosystem partnerships.

As a developer, I am more than excited to team up with Gitpod. Moving the last missing piece in the DevOps pipeline into the cloud is the logical next step to streamline software development, said Dominik Tobschall, principal at Speedinvest. The push towards remote work will only accelerate this.

Gitpods developer-centric obsession has enabled them to build the best-of-breed technology in the rapidly growing market around dev environment automation. We are proud to back this exceptional team building a category defining company, said Krishna Visvanathan, co-founder and partner at Crane Venture Partners.

Gitpods team has a track record of creating multiple open source developer tools used by millions of engineers. With software engineering moving to remote but collaborative work, we see Gitpod securely allowing multiplayer mode for developers while saving VPs of Engineering hundreds of hours of tool setup-time. This will be an integral part of any professional software delivery pipeline, said Sandeep Bhadra, partner at Vertex Ventures US.

Gitpod is available today as an open source solution free to any developer seamlessly integrating with different cloud-providers and git-hosting-platforms. Visit https://www.gitpod.io/docs/gitlab-integration/ for more information about Gitpods native integration on GitLab or email contact@gitpod.io.

About Gitpod The team at Gitpod.io is driven to enable all professional development teams to immediately start working and collaborating in a fully prebuilt, secure dev environments on any project, any branch and any device. Gitpod invented the notion of prebuilds allowing developers to describe dev environments as code and get an immediately productive development environment for any GitLab, GitHub and Bitbucket project. The company is founded by experienced developer tools experts that worked together for 10+ years creating programming languages and growing open source communities (Xtext, Theia). Gitpod operates a flight-proven product and leads the pack of fully-functional Cloud Dev Environments with more than 250k registered developers. http://www.gitpod.io

About CraneCrane is a London-based VC firm focused on early-stage investments in European start-ups that are solving real problems for the enterprise and enterprise workers. We back ambitious founders building category defining companies who are redefining the enterprise stack. Cranes portfolio includes 7Bridges, Axiom, Foundries, Harbr, Onfido, Shipamax, Tessian and Virtuoso. http://www.crane.vc

About SpeedinvestSpeedinvest is a European venture capital fund with 400M+ AUM and more than 40 investment professionals working from Berlin, London, Munich, Paris, Vienna and San Francisco. Employing a sector-focused investment structure, we fund innovative early-stage technology startups in the areas of Fintech, Digital Health, Consumer Tech, Network Effects, Deep Tech and Industrial Tech. Speedinvest actively deploys its global network and dedicated team of in-house operational experts to support our 150+ portfolio companies, including with US market expansion. Learn more: http://www.speedinvest.com

About Vertex Ventures US Vertex US is an early-stage venture capital firm that backs companies transforming industries through software and data. With investments including LaunchDarkly, PerimeterX, and Desktop Metal, Vertex US brings pioneering experience to pioneering enterprises. In Sik Rhee and Jonathan Heiliger co-founded Vertex US in 2015. For more information, visit vertexventures.com.

Third-party trademarks mentioned are the property of their respective owners.

Media Contact:Nichols Communications for GitpodRay Georgeray@nicholscomm.com +1 650-922-3825

Continue reading here:

Gitpod Raises $3M USD Seed Funding, Announces Native Integration with GitLab - GlobeNewswire

NVIDIA NeMo: An Open-Source Toolkit For Developing State-Of-The-Art Conversational AI Models In Three Lines Of Code – MarkTechPost

NVIDIAs open-source toolkit, NVIDIA NeMo( Neural Models), is a revolutionary step towards the advancement of Conversational AI. Based on PyTorch, it allows one to build quickly, train, and fine-tune conversational AI models.

As the world is getting more digital, Conversational AI is a way to enable communication between humans and computers. The set of technologies behind some fascinating technologies like automated messaging, speech recognition, voice chatbots, text to speech, etc. It broadly comprises three areas of AI research: automatic speech recognition (ASR), natural language processing (NLP), and speech synthesis (or text-to-speech, TTS).

Conversational AI has shaped the path of human-computer interaction, making it more accessible and exciting. The latest advancements in Conversational AI like NVIDIA NeMo help bridge the gap between machines and humans.

NVIDIA NeMo consists of two subparts: NeMo Core and NeMo Collections. NeMo Core deals with all models generally, whereas NeMo Collections deals with models specific domains. In Nemos Speech collection (nemo_asr), youll find models and various building blocks for speech recognition, command recognition, speaker identification, speaker verification, and voice activity detection. NeMos NLP collection (nemo_nlp) contains models for tasks such as question answering, punctuation, named entity recognition, and many others. Finally, in NeMos Speech Synthesis (nemo_tts), youll find several spectrogram generators and vocoders, which will let you generate synthetic speech.

There are three main concepts in NeMo: model, neural module, and neural type.

Even though NeMo is based on PyTorch, it can also be effectively used with other projects likePyTorch LightningandHydra. Integration with Lightning makes it easier to train models with mixed precision using Tensor Cores and can scale training to multiple GPUs and compute nodes. It also has some features like logging, checkpointing, overfit checking, etc. Hydra also allows the parametrization of scripts to keep it well organized. It makes it easier to streamline everyday tasks for users.

Github: https://github.com/NVIDIA/NeMo#tutorials

Web: https://developer.nvidia.com/nvidia-nemo

Pytorch Blog: https://medium.com/@samfarahzad/nvidia-nemo-neural-modules-and-models-for-conversational-ai-ea041e4cd4

Related

Read this article:

NVIDIA NeMo: An Open-Source Toolkit For Developing State-Of-The-Art Conversational AI Models In Three Lines Of Code - MarkTechPost

Sophisticated new Android malware marks the latest evolution of mobile ransomware – Microsoft

Attackers are persistent and motivated to continuously evolve and no platform is immune. That is why Microsoft has been working to extend its industry-leading endpoint protection capabilities beyond Windows. The addition of mobile threat defense into these capabilities means that Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection) now delivers protection on all major platforms.

Microsofts mobile threat defense capabilities further enrich the visibility that organizations have on threats in their networks, as well as provide more tools to detect and respond to threats across domains and across platforms. Like all of Microsofts security solutions, these new capabilities are likewise backed by a global network of threat researchers and security experts whose deep understanding of the threat landscape guide the continuous innovation of security features and ensure that customers are protected from ever-evolving threats.

For example, we found a piece of a particularly sophisticated Android ransomware with novel techniques and behavior, exemplifying the rapid evolution of mobile threats that we have also observed on other platforms. The mobile ransomware, detected by Microsoft Defender for Endpoint as AndroidOS/MalLocker.B, is the latest variant of a ransomware family thats been in the wild for a while but has been evolving non-stop. This ransomware family is known for being hosted on arbitrary websites and circulated on online forums using various social engineering lures, including masquerading as popular apps, cracked games, or video players. The new variant caught our attention because its an advanced malware with unmistakable malicious characteristic and behavior and yet manages to evade many available protections, registering a low detection rate against security solutions.

As with most Android ransomware, this new threat doesnt actually block access to files by encrypting them. Instead, it blocks access to devices by displaying a screen that appears over every other window, such that the user cant do anything else. The said screen is the ransom note, which contains threats and instructions to pay the ransom.

Figure 1. Sample ransom note used by older ransomware variants

Whats innovative about this ransomware is how it displays its ransom note. In this blog, well detail the innovative ways in which this ransomware surfaces its ransom note using Android features we havent seen leveraged by malware before, as well as incorporating an open-source machine learning module designed for context-aware cropping of its ransom note.

In the past, Android ransomware used a special permission called SYSTEM_ALERT_WINDOW to display their ransom note. Apps that have this permission can draw a window that belongs to the system group and cant be dismissed. No matter what button is pressed, the window stays on top of all other windows. The notification was intended to be used for system alerts or errors, but Android threats misused it to force the attacker-controlled UI to fully occupy the screen, blocking access to the device. Attackers create this scenario to persuade users to pay the ransom so they can gain back access to the device.

To catch these threats, security solutions used heuristics that focused on detecting this behavior. Google later implemented platform-level changes that practically eliminated this attack surface. These changes include:

To adapt, Android malware evolved to misusing other features, but these arent as effective. For example, some strains of ransomware abuse accessibility features, a method that could easily alarm users because accessibility is a special permission that requires users to go through several screens and accept a warning that the app will be able to monitor activity via accessibility services. Other ransomware families use infinite loops of drawing non-system windows, but in between drawing and redrawing, its possible for users to go to settings and uninstall the offending app.

The new Android ransomware variant overcomes these barriers by evolving further than any Android malware weve seen before. To surface its ransom note, it uses a series of techniques that take advantage of the following components on Android:

The malware connects the dots and uses these two components to create a special type of notification that triggers the ransom screen via the callback.

Figure 2. The notification with full intent and set as call category

As the code snippet shows, the malware creates a notification builder and then does the following:

Figure 3. The malware overriding onUserLeaveHint

As the code snippet shows, the malware overrides the onUserLeaveHint() callback function of Activity class. The function onUserLeaveHint() is called whenever the malware screen is pushed to background, causing the in-call Activity to be automatically brought to the foreground. Recall that the malware hooked the RansomActivity intent with the notification that was created as a call type notification. This creates a chain of events that triggers the automatic pop-up of the ransomware screen without doing infinite redraw or posing as system window.

As mentioned, this ransomware is the latest variant of a malware family that has undergone several stages of evolution. The knowledge graph below shows the various techniques this ransomware family has been seen using, including abusing the system alert window, abusing accessibility features, and, more recently, abusing notification services.

Figure 4. Knowledge graph of techniques used by ransomware family

This ransomware familys long history tells us that its evolution is far from over. We expect it to churn out new variants with even more sophisticated techniques. In fact, recent variants contain code forked from an open-source machine learning module used by developers to automatically resize and crop images based on screen size, a valuable function given the variety of Android devices.

The frozen TinyML model is useful for making sure images fit the screen without distortion. In the case of this ransomware, using the model would ensure that its ransom notetypically fake police notice or explicit images supposedly found on the devicewould appear less contrived and more believable, increasing the chances of the user paying for the ransom.

The library that uses tinyML is not yet wired to the malwares functionalities, but its presence in the malware code indicates the intention to do so in future variants. We will continue to monitor this ransomware family to ensure customers are protected and to share our findings and insights to the community for broad protection against these evolving mobile threats.

Mobile threats continue to rapidly evolve, with attackers continuously attempting to sidestep technological barriers and creatively find ways to accomplish their goal, whether financial gain or finding an entry point to broader network compromise.

This new mobile ransomware variant is an important discovery because the malware exhibits behaviors that have not been seen before and could open doors for other malware to follow. It reinforces the need for comprehensive defense powered by broad visibility into attack surfaces as well as domain experts who track the threat landscape and uncover notable threats that might be hiding amidst massive threat data and signals.

Microsoft Defender for Endpoint on Android, now generally available, extends Microsofts industry-leading endpoint protection to Android. It detects this ransomware (AndroidOS/MalLocker.B), as well as other malicious apps and files using cloud-based protection powered by deep learning and heuristics, in addition to content-based detection. It also protects users and organizations from other mobile threats, such as mobile phishing, unsafe network connections, and unauthorized access to sensitive data. Learn more about our mobile threat defense capabilities in Microsoft Defender for Endpoint on Android.

Malware, phishing, and other threats detected by Microsoft Defender for Endpoint are reported to the Microsoft Defender Security Center, allowing SecOps to investigate mobile threats along with endpoint signals from Windows and other platforms using Microsoft Defender for Endpoints rich set of tools for detection, investigation, and response.

Threat data from endpoints are combined with signals from email and data, identities, and apps in Microsoft 365 Defender (previously Microsoft Threat Protection), which orchestrates detection, prevention, investigation, and response across domains, providing coordinated defense. Microsoft Defender for Endpoint on Android further enriches organizations visibility into malicious activity, empowering them to comprehensively prevent, detect, and respond to against attack sprawl and cross-domain incidents.

On top of recreating ransomware behavior in ways we havent seen before, the Android malware variant uses a new obfuscation technique unique to the Android platform. One of the tell-tale signs of an obfuscated malware is the absence of code that defines the classes declared in the manifest file.

Figure 5. Manifest file

The classes.dex has implementation for only two classes:

This means that theres no code corresponding to the services declared in the manifest file: Main Activity, Broadcast Receivers, and Background. How does the malware work without code for these key components? As is characteristic for obfuscated threats, the malware has encrypted binary code stored in the Assets folder:

Figure 6. Encrypted executable code in Assets folder

When the malware runs for the first time, the static block of the main class is run. The code is heavily obfuscated and made unreadable through name mangling and use of meaningless variable names:

Figure 7. Static block

The malware uses an interesting decryption routine: the string values passed to the decryption function do not correspond to the decrypted value, they correspond to junk code to simply hinder analysis.

On Android, an Intent is a software mechanism that allows users to coordinate the functions of different Activities to achieve a task. Its a messaging object that can be used to request an action from another app component.

The Intent object carries a string value as action parameter. The malware creates an Intent inside the decryption function using the string value passed as the name for the Intent. It then decrypts a hardcoded encrypted value and sets the action parameter of the Intent using the setAction API. Once this Intent object is generated with the action value pointing to the decrypted content, the decryption function returns the Intent object to the callee. The callee then invokes the getAction method to get the decrypted content.

Figure 8. Decryption function using the Intent object to pass the decrypted value

Once the static block execution is complete, the Android Lifecycle callback transfers the control to the OnCreate method of the main class.

Figure 9. onCreate method of the main class decrypting the payload

Next, the malware-defined function decryptAssetToDex (a meaningful name we assigned during analysis) receives the string CuffGmrQRT as the first argument, which is the name of the encrypted file stored in the Assets folder.

Figure 10. Decrypting the assets

After being decrypted, the asset turns into the .dex file. This is a notable behavior that is characteristic of this ransomware family.

Figure 11. Asset file before and after decryption

Once the encrypted executable is decrypted and dropped in the storage, the malware has the definitions for all the components it declared in the manifest file. It then starts the final detonator function to load the dropped .dex file into memory and triggers the main payload.

Figure 12. Loading the decrypted .dex file into memory and triggering the main payload

When the main payload is loaded into memory, the initial detonator hands over the control to the main payload by invoking the method XoqF (which we renamed to triggerInfection during analysis) from the gvmthHtyN class (renamed to PayloadEntry).

Figure 13. Handover from initial module to the main payload

As mentioned, the initial handover component called triggerInfection with an instance of appObj and a method that returns the value for the variable config.

Figure 14. Definition of populateConfigMap, which loads the map with values

Correlating the last two steps, one can observe that the malware payload receives the configuration for the following properties:

The malware saves this configuration to the shared preferences of the app data and then it sets up all the Broadcast Receivers. This action registers code components to get notified when certain system events happen. This is done in the function initComponents.

Figure 15. Initializing the BroadcastReceiver against system events

From this point on, the malware execution is driven by callback functions that are triggered on system events like connectivity change, unlocking the phone, elapsed time interval, and others.

Dinesh Venkatesan

Microsoft Defender Research

Read the rest here:

Sophisticated new Android malware marks the latest evolution of mobile ransomware - Microsoft

Every Federal Agency Should Think About Securing the Supply Chain – GovernmentCIO Media

Cybersecurity basics and risk management are key elements of IT supply chain security.

The lines delineating IT supply chain security from cybersecurity and infrastructure protection are blurrier than ever, so federal agencies must consider all three together as part of a whole.

It's almost impossible to look at them as separate disciplines at this point, said Daniel Kroese, associatedirector of the National Risk Management Center at CISA duringGovernmentCIO Media andResearch's virtual event this week. We're really just talking about the existing principles ofcybersecurity and infrastructure security with a third-party trust and assurance lens on it. It's a layer on top of what we have already done.

In a panel on IT supply chain security, Kroese and Dell Federal Cybersecurity Practice Manager Dan Carroll discussed the ways in which the software and hardware supply chains impact a federal agencys cybersecurity and risk management.

Since federal agencies increasingly rely on commercial, off-the-shelf software applications and many of those applications rely on open-source code it opens up a broader attack surface for government agencies.

Software represents a potentially concentrated source of risk if you don't have the vulnerability management and acquisition strategies around it, Kroese said. We're working to deploy a series of tools across government agencies, but also private sector partners in the critical infrastructure community to do this supply chain analysis so that if there are vulnerabilities ... we can track it, understand where it isand patch that swiftly.

Carroll said accountability and collaboration are key for federal agencies and private-sector suppliers looking to secure the software supply chain.

The realization that I have an organization, I have a number of people focused on protecting my software, is dwarfed by the number of people who want to exploit my software, he said at theevent. The big part of a secure supply chain is secure development;a secure development lifecycle that is well defined.

One of the ways federal agencies can vet their software is by adopting a zero trust approach.

As we're continuing to mature, you're looking at these emerging security models like zero trust where you're not just validating software when it's developed, but when it boots up every time and as it transfers layers through the service model, Carroll said.

Zero trust is an innovative cybersecurity approach uniquely positioned to address supply chain risk because it requires federal agencies to constantly validate access points on its network (like software applications). Under a zero trust mindset, even an open source-based software application can be validated under the proper protocols and conditions.

If you're starting from the standard of zero trust, it means recognizing how just one bad click or one malicious line of code can set off a cascading set of events that can have enormous damage to not just your enterprise but other organizations, national security, public health and safety, Kroese said. You need to bake in security on the front end so it's easy to localize.

Federal agencies also need to recognize how tightly intertwined the software and hardware supply chains are. The 5G network, for example, will be defined by how the software influences the hardware, Kroese said.

Before you would have physical switches and lines in the ground, and now a whole host of functionality is now controlled by software when before it was the physical arrangement, he said. You have the software that enables the firmware capabilities. What if those monthly software updates introduce more vulnerability to the system? It's really hard to differentiate the line between where the software ends and the hardware starts.

In a rapidly digitizing federal environment, some federal agencies may face numerous challenges to securing their IT supply chains because there are so many moving parts they cannot control, like shippers, third-party logistics providers (3PLs), and Tier 2 and 3 suppliers.

When international shipper Maersk faced massive cyberattacks a few years ago, Kroese said, some of the biggest victims were downline members of the supply chain, like pharmaceutical manufacturer Merck and FedEx, a 3PL.

"Federal agencies need to model out some of this connectivity so we can see how something over there impacts something over here, he said.

When people think about technology they tend to think about the tech in front of them, not understanding there are layers and layers of software under that like Windows 10, Carroll added, and they come from lots of different sources. The system is not made by one company. Being able to come together and create trust and protect against things like insertion, unintentional or malicious, is key.

Federal suppliers may need to start thinking of themselves as IT companies in order to maintain the right mindset about cybersecurity, supply chain risk managementand infrastructure protection.

Everybody in some capacity in this day and age whether they like it or not is an IT company, he said. You may be a bank and don't want to be an IT company, but you still need to protect all that data. You may ship boxes but you're right, you have tons of customer data and credit card data and you need to protect all that data.

For federal agencies looking to ramp up their security strategies for IT systems and supply chains, Kroese said the first place to start is with the cybersecurity basics: patching, continuous monitoring, validating access andscanning for threats.

Basics still very much matter, he said. Innovation is great, but don't let it be a crutch to not do what you need to do today and now.

Here is the original post:

Every Federal Agency Should Think About Securing the Supply Chain - GovernmentCIO Media

This decentralized VPN provider wants to turn the industry on its head – TechRadar

As VPNs have become increasingly popular among consumers and business users, competing in the VPN market has become incredibly challenging especially when a handful of companies control the entire industry.

To help make it easier for businesses to compete in the highly competitive market, the decentralized Virtual Private Network (dVPN) solutions provider Exidio creates open source applications built on a peer-to-peer bandwidth network and Sentinel dVPN protocol, which it is a core contributor to.

The company's custom, white label applications connect to the Sentinel node network and it is even able to prove a users' web traffic and metadata are end-to-end encrypted to ensure both privacy and security. Exidio itself cannot access the traffic nor is a node host able to view a user's web traffic or metadata.

The Sentinel Ecosystem consists of the Sentinel node network, the dVPN user base, communities of open source code contributors and companies integrating the Sentinel node network into their software and services. Since its inception in 2018, the network has grown from 17 active nodes to 270 in September of this year.

Entrepreneurs and businesses that want to provide secure, private networking access to their employees and customers now have a turnkey solution to do so with Exidio. By leveraging the company's open source code, organizations can now bring dVPN to their customers and employees without the challenges of node management.

At the same time, Exidio can natively integrate dVPN into existing applications through its APIs. This means that businesses can focus on providing products and services for their customers while Exidio will provide the architecture and integration of secure, decentralized virtual private networking.

Exidio's CEO Dan Edlebeck provided further insight on the continued growth of the Sentinel Ecosystem in a press release, saying:

"As the adoption across Sentinel Ecosystem continues to grow, we are being approached by more and more companies who are looking to integrate solutions leveraging the Sentinel node network. I'm thrilled about the future as we change the landscape for secure, open source networking."

See the original post here:

This decentralized VPN provider wants to turn the industry on its head - TechRadar

How ZeroNorth is driving the DevSecOps revolution for the good of software, with new capabilities – Security Boulevard

Where software was once on the sidelines of organizational success today, it is front and centerwith businesses under more pressure than ever before to deliver more software, at greater speed, with better quality. But as the DevOps movement has accelerated to address these challenges head on, and the processes for developing software have become more distributed, responsibility for securing these applications has splintered. As a result, application security has fallen through the cracks and stagnated and the vulnerabilities left in the wake may have and in some cases already have had lethal consequences for businesses and for people when those applications are breached once they are in production.

A recent study by the Ponemon Institute underscores the disconnect between security and DevOps teams, finding that 39% of developers believe the security team is ultimately responsible for application security, whereas 67% of AppSec say their teams are responsible. Moreover, 71% of AppSec respondents say security is undermined by developers who do not care about the need to secure applications early in the SDLC, and 53% of AppSec respondents say developers view security as a hindrance to releasing new applications.

This perspective was also shared in the IDC Vendor Profile, ZeroNorth, Bringing End-to-End Clarity to Application Security, where they state: Security teams struggle to keep pace with development, and historically, DevOps teams have neglected security to their peril. With disparate tools clouding the landscape, organizations have left themselves open to attack because of the lack of integration and scant visibility across hybrid environments.

So, whats the solution? ZeroNorth is working to facilitate a true DevSecOps revolution with its application security automation and orchestration platform, whose raison detre is to unite security, DevOps and the business for the good of software. Underscoring this goal are three fundamental principles: software needs structure; software thrives on speed, and software requires focus. The ZeroNorth platform is supporting these principals by: helping to maintain security standards across the enterprise; while helping to accelerate pipeline velocity; and working to unburden developers.

Accelerate software delivery, without disrupting DevOpsToday we announced new capabilities that are specifically designed to empower the security team to own the enforcement of standards and reporting, while liberating the development team to deliver secure software faster and more easily.

First, the new Application Portfolio Report highlights security policies applied to each application, together with scan results and progress of remediation work, and it enables drill down. It gives CISOs a holistic view of risk, and it gives product security and engineering teams the visibility needed to assess and implement security based on their specific LOB needs.

Second, ZeroNorth is working to make application security programs transparent and friction free for developers so they can meet corporate standards without changing their workflows or be flooded with non-priority tickets. To this end, the ZeroNorth platform has added support for two more application security scanning tools (with more to come) to provide coverage for the different types of applications people use to manage their lives and run their businesses. New tools supported include Scout Suite, an open source multi-cloud security-auditing tool which enables security posture assessment of cloud environments and Aqua Trivy, a comprehensive open source vulnerability scanner for container images.

ZeroNorth has also expanded its DevOps toolchain integrations and now integrates with, and can scan the contents of, BitBucket Server and GitLab source code repositories including branches within both GitLab and GitHub repositories.

Third, weve added new features that provide greater flexibility to help security and product teams accelerate application delivery. These include customization of vulnerability data compression parameters, such as name and type of vulnerabilities, libraries included, etc., and customization of alerts to meet the needs of the DevOps process and support data-driven business decisions in real time.

As the IDC Vendor Profile says, The future is bright for companies that truly provide visibility into security vulnerabilities and reduce workflow challenges for DevOps teams required to remediate security risks. And with ZeroNorth, Security thus becomes an enabling part of application development rather than the obstacle.

You can read more details of the release here, and check out the IDC Vendor Profile of ZeroNorth. If youd like to go a bit deeper, contact us for a conversation.

Go here to read the rest:

How ZeroNorth is driving the DevSecOps revolution for the good of software, with new capabilities - Security Boulevard

SD Times Open-Source Project of the Week: Swift System – SDTimes.com

The Swift programming language team has announced its library for idiomatic interfaces is now open source. Swift System was first introduced in June for Apple platforms. It provides idiomatic interfaces to system calls and low-level types. As part of the announcement, it now includes Linux support.

Most operating systems today support some flavor of system interfaces written in C that have existed for decades. While it is possible to use these APIs directly from Swift, these weakly-typed system interfaces imported from C can be error-prone and unwieldy, Michael Ilseman, a engineer on the Swift Standard library team at Apple, wrote in a blog post.

The weakly-typed functions fail to utilize the expressivity and type safety of Swift because the semantic rules arent captured in the APIs signature, preventing the programming language from guiding the user towards correct usage of the API, according to Ilseman.

Meanwhile, the System module utilizes these various language features to bear expressivity and eliminate many opportunities for error.

For example, System defines the open system call as a static function with default arguments in the FileDescriptor namespace.

Mainly, System pervasively uses raw representable structs and option sets and the strong types help catch mistakes at compile time. Also, errors are thrown using the standard language mechanism and cannot be missed.

Last but not least, FilePath is a managed, null-terminated bag-of-bytes that conforms to ExpressibleByStringLiteral far safer to work with than a UnsafePointer.

Swifts immediate goal is to simplify building cross-platform libraries and applications such as SwiftNIO and the Swift Package Manager. This will include enhancements to FilePath and adding support for the recently announced Swift on Windows.

Read the rest here:
SD Times Open-Source Project of the Week: Swift System - SDTimes.com

Recession Spurring Increased Adoption of Open Source Software According to Latest Yearly Survey by Tidelift – PRNewswire

BOSTON, Oct. 7, 2020 /PRNewswire/ --Use of open source software is expected to increaseduring the pandemic as businesses look to save time and money, while increasing efficiency, according to the third annual Managed Open Source Survey released today by Tidelift, the largest provider of commercial support and maintenance for the community-led open source behind modern applications.

More than 600 technologists shared how they use open source software today, what holds them back, and what tools and strategies would help them use it even more effectively.

"As the long-term move towards open source continues, our data shows that the recent economic downturn may be an accelerant," said Tidelift CEO Donald Fischer. "This finding continues a trend that began after the recession of the early 2000s and continued after the financial crisis of 2008. Organizations turn to open source in tough economic times because it helps them reduce costs and improves their ability to innovate."

Key Findings

Organizations are turning to open source during the COVID-19 recession to do more with less.

Yet using open source presents new challenges, which differ depending on company size.

Organizations take different approaches to contributing to open source.

The study also found the top three programming languages organizations rely on most are JavaScript, Python, and Java. JavaScript is used by over three-fourths of organizations (78%) while Python is used by just over half (52%). Java is used in applications far more often at larger organizations (66% vs. only 32% for the full sample).

As organizations continue to accelerate their use of open source and grapple with how to best choose, upgrade, and maintain this influx of new open source components, Tidelift simplifies the process. The Tidelift Subscription makes it easier for organizations to create and manage catalogs of known-good properly maintained open source components, while paying the maintainers who created them to keep them enterprise ready.

To receive a copy of the survey, go here. This marks the third year Tidelift has conducted a survey to answer the most pressing questions for technologists using open source to develop applications. This year's survey was conducted from May 28 through July 4, 2020. Participants were contacted via Tidelift and Changelog email lists and social media. Tidelift screened respondents to make sure they use open source to build applications at work, and the full survey sample was 638 respondents.

About TideliftTidelift is the largest provider of commercial support and maintenance for the community-led open source behind modern applications. The company partners with independent project maintainers to make it safer, easier, and more cost-effective for application development teams to build with open source, so they can create even more incredible software, even faster. The Tidelift managed open source solution delivers customizable catalogs of components that are actively maintained, secure, and accurately licensed, enabling development teams to build and deploy with confidence. Tidelift makes open source work betterfor everyone. https://tidelift.com/

SOURCE Tidelift

http://www.tidelift.com

Read more:
Recession Spurring Increased Adoption of Open Source Software According to Latest Yearly Survey by Tidelift - PRNewswire

Postman: The role of open source in APIs – Part 1 of 2 – ComputerWeekly.com

This is part one of a two-part contributed piece for Computer Weekly Open Source Insider with part two linked here.

This analysis of the role of open source in APIs is written by Postman CEO Abhinav Asthana with offices in Bangalore, Austin and San Francisco, Postman aims to simplify API development with its industry-standard API Development Environment.

Postman has more than four million users growing from a simple REST client in 2012, Postman now helps developers do everything from design, testing, mocking to monitoring and publishing in a real-time collaborative environment.

Asthana writes as follows

The open source software (OSS) movement has forever shifted how the world develops applications. The movements central idea is that source code is made freely available, which means you can modify it at will. This enables you to build upon the hard work of others as you create your own app. This, in turn, opens up the possibility of contributing back to an original codebase that expands the value of software to the entire community. Through open source, developers now easily access the building blocks they need to deliver modern applications and that has led to someastounding success for OSS.

The Application Programming Interface (API) world can learn a lot from the OSS movements successful commitment to collaboration because historically, the world of APIs has not been open enough and that has hindered innovation and progress. Heres why the time to address that is now.

The growth of APIs is skyrocketing; every piece of software built today either uses an API or is an API. Amidst all of this API growth, top cloud providers like AWS, Microsoft Azure and Google have acted as massive centralising hubs of technology that primarily consist of APIs. This has laid the foundation for consecutive waves of countless software-as-a-service (SaaS)offerings and other companies who all deliver and consume APIs as part of their regular operations and integrations.

This means that APIs are going to stick around for quite some time, so we need to develop a basic set of rules to help guide, open and stabilise the wider API software ecosystem. We all need to ensure that our shared digital ecosystem has the right foundation. If we work together to develop common and open API principles, then APIs can realise their full potential and help us all deliver on the future we envision for our industries. Well be able to do our best as independent businesses, while also sharing specifications, code and other common blueprints that benefit the whole.

All of this shows why now is a pivotal time to study and apply open source learnings to what the world is doing with APIs. By combining the core philosophies and patterns of OSS with what weve learned from the last 20 years of software development, we can build a future that benefits everyone through APIs.

APIs allow applications to connect to each other. They allow data to go from one place to another. That is all made possible using fundamental code that should be available for use by all developers and companies to build on.

Asthana: a: API are gateways, lets stay open.

Any restrictions that limit the access and reimplementation of the API pipes we all depend on will hinder developer productivity across industries.

APIs should always allow easy access to data and people consuming the API should be able to take data out in the shape and form they want and be able to reimplement as they see fit, as long as it is in accordance with the open source licensing.

This type of reciprocity is extremely valuable. Just look at how APIs are making data sets available for the COVID-19 fight. The use of established guidelines and open data formats is ensuring data interoperability amongst scientists and healthcare providers as they address the pandemic. The open source philosophy works for the greater good by powering businesses of all shapes and sizes rather than a single proprietary format that is dictated by a few.

Another aspect of open source that developers and companies should examine involves striking a balance between data accessibility and privacy guidelines in APIs. For example, lets say Im accessing my data from an API. While I should have complete control and visibility over it, somebody else accessing my data through the same API should have limited capabilities. This protects the end users data rights and personal privacy.

Open source software is all about lowering barriers and making it easier for developers to meet their goals. While there should be common agreed-upon business rules in place, if developers want to send a million records over the wire for an API call, they should be able to easily redesign their API using open source components that allow for batched access to API data without onerous controls.

This makes for a better API while still respecting the personal rights and privacy of end users.

More and more, were seeing OSS-based themes at the highest levels of business. Industry groups are emerging to look at how data should flow between different entities. All of this increases the value for API providers to be more consistent with well-known APIs, while also making the lives of those consuming APIs much easier.

Original post:
Postman: The role of open source in APIs - Part 1 of 2 - ComputerWeekly.com