can you make money in forex and cryptocurrency – Asia Insurance Review

attendant ascended before him and they spent nearly an hour asking and

possible for him to take a bird's eye view of the city from the crow's

shone dazzling under the morning sun. The air was clear of smoke and

came back to him, at first with a quality of insincerity like a story

that be his indeed, that little life in his memory two hundred years

rest of the world hung in suspense.

seen from above showed few signs of the swift revolution that had, to

And so after strange delays and through an avenue of doubt and battle,

hoped to discover his experiences a dream; he became anxious now to

and America, were also black with the victors. Across a narrow way of

possible for him to take a bird's eye view of the city from the crow's

time a representative gathering of officials and their wives would be

white and steadfast and still. His eye went again to the little group

hell with the Council!" Graham looked at their multitudes, receding

of White Councillors. And then he looked up at the familiar quiet stars

learnt something of the state of affairs. Already the revolution was an

hoped to discover his experiences a dream; he became anxious now to

with delight. Nowhere was the Council popular, and the thousand cities

Earth. This new great age was in the completest sense his. He no longer

While he was breaking his fast, the sound of a telephone bell jetted

to reply. Very shortly Lincoln arrived, and Graham at once expressed

time a representative gathering of officials and their wives would be

It was a day full of the promise and quality of spring. The touch of the

white and steadfast and still. His eye went again to the little group

haze, sweet as the air of a mountain glen.

his imagination, in one night and one day, changed the destinies of the

a clear thousand feet above the roofs, a little disc-shaped speck on a

time a representative gathering of officials and their wives would be

world. A multitude of people still swarmed over these ruins, and the

See original here:
can you make money in forex and cryptocurrency - Asia Insurance Review

Virginia men busted in Irvington robbery plot targeting cryptocurrency – The Journal News

Two Virginia men are accused of taking part in a home invasion plan in Irvington two years ago that targeted tens of millions of dollars in cryptocurrency, the U.S. Attorney's Office said Friday.

Dominic Pinedaand Shon Morgan, both 21, were arrested in Virginia on an indictment in the Southern District of New Yorkcharging them with conspiracy to commit Hobbs Act robbery.

Federal authorities would not confirm whether the target was an Irvington High School senior, Ellis Pinsky, who three weeks earlier made headlines when hewas sued by a cryptocurrency investor claiming Pinsky had stolen more than $23 million in Bitcoin from him in 2018.

But Irvington police Lt. Kevin Johnson said Fridaythat there was a break-in on May 23, 2020, at a home on Hamilton Road. He would not specify the house but Pinsky's mother owns a home on that street.

Police responded to an alarm at the home as well as a 911 call from a resident shortly before 4:30 a.m. When they arrived, one person was found in the basement and another outside the house, Johnson said.

A pair of brass knuckles was found in the house.

Abortion:Hudson Valley reacts to overturning of Roe v. Wade

Crime:Ex-Peekskill police officer sentenced for sexually abusing woman

Scarsdale:Pair reprimanded for keeping school board in dark about IRS fines

Johnson would not identify the two but said neither were Morgan or Pineda. No state charges were filed and a decision was made that the case would be handled by federal authorities.

According to U.S. Attorney Damian Williams, Pineda and Morgan conspired with others to break into the house and"force its residents to provide the code to what the defendants believed was tens of millions of dollars in Bitcoin currency."

Hobbs Act robbery is one that affects interstate commerce. The defendants were expected to be presented Friday afternoon in U.S. District Court in Virginia. It was not immediately clear who their lawyers were.

The case was investigated by the FBI Westchester County Safe Streets Task Force with assistance from Irvington police and the Greenburgh Drug and Alcohol Task Force.

Pinsky was sued in federal court weeks before the break-in by Michael Terpin, a cryptocurrency investor from California, who claimed he had $23.8 million in Bitcoin taken from him "through a hack perpetrated by Pinsky and his gang of digital bandits."

According to the lawsuit, Pinsky was 15 at the time Terpin lost his money in 2018 through a so-called SIM swap, a sophisticated hack in which a victim's cellphone is accessed to obtain personal information that can help access cryptocurrency accounts.

The lawsuit, which is ongoing, alleges that Pinsky and his associates amassed more than $100 million through crypto hacks. Pinsky began representing himself last year because he could no longer afford his lawyers. He has since gotten other lawyers.

Pinsky and his new lawyers could not be reached.

Another person involved in taking Terpin's money was Nichola Truglia, who pleaded guilty to conspiracy to commit wire fraud last year in federal court in Manhattan.

Terpin has successfully suedTruglia in California for more than $70 million.

Twitter: @jonbandler

Go here to see the original:
Virginia men busted in Irvington robbery plot targeting cryptocurrency - The Journal News

Impact of Blockchain and Cryptocurrency on Gambling Industry – Gamesreviews

Gambling has been known for a long time, because it dates back to the craps game. Years of development and technology have taken it to a new level and now you can test your luck at online casinos. Many choose this way of earning as an easy approach to get money.

Others consider online games a way to relax, have fun and if lucky to pull off a nice score. As mentioned above, modern problems need modern solutions, so casinos working with cryptocurrency are becoming popular. Best tron casinos open opportunities to make money, when all you need is the desire and the right calculations. Popularity of this entertainment is also due to the blockchain technology, because it is essentially the most obvious way to end the gambling industrys non-transparency. But is it true? Lets look at how blockchain and cryptocurrency affect gaming.

The main thing about blockchain is that you can create on its basis not only something about cryptocurrencies, but any service based on this technology. Blockchain is a continuous consecutive chain of blocks containing data, set up according to certain rules. Most often, copies of the blockchain are stored on many different computers independently of each other.

The term first appeared as a name for a fully replicated distributed database implemented in the bitcoin system. Because of this, blockchains are often referred to transactions in various cryptocurrencies. However, blockchain technology can be extended to any interconnected blocks of information.

Companies of all sizes and industries are experiencing blockchain technology. But organizations need to understand the value of blockchain and the differences between its different types (integrated, private, public, etc.) They also need to understand if the technology makes sense in each case and how best to integrate it into their business.

Most projects use blockchain technology within the corporate space. It could be an exchange of digital assets between two or more parties, a way to track the movement of goods from one location to another, or a way to verify trust between two parties when evaluating information.

Passion is an integral part of any persons life. Proponents of gambling consider it an innocent hobby that can enrich a player in a matter of seconds. While the opponents talk about the risk of losing everything.

All this has led to the prohibition or serious restriction of gambling in many countries. Other states, on the contrary, dont take any significant measures to regulate this market. Both approaches have their pros and cons. In case of strong regulation, a great part of the market goes underground and allows criminal activity to flourish. It causes a number of problems which newly established businesses are trying to avoid.

Nevertheless, the non-transparency is an integral part of the gambling industry, regardless of the state policy in relation to it. So this is where blockchain technology and cryptocurrency gaming come into play.

It has become the best way to ensure the transparency of the gaming industry. Blockchains unchangeable and verifiable nature makes it the perfect solution to ensure the complete integrity of any online game.

Many projects that have emerged in recent years use this technology in varying ways. It guarantees anonymity, transparency and honesty, which are becoming major advantages for gaming online. You can also benefit from resources like BestSlotsWorld, which reveals details about different casinos and collects a selection of verified resources. In that way you narrow down the search of gambling websites.

The advantages of blockchain have already expanded beyond fintech. The key blockchain properties are attractive to gambling companies as well, because they provide:

Gambling is evolving, and new technologies are creating new workflows and simplifying all processes. Cryptocurrency also has a great impact on businesses giving many advantages. Blockchain makes the platform work fast and as secure as possible from possible fraud. The technology is able to solve the gambling problems, such as lack of transparency, speed of payments and high entry barrier for new players. So dont be afraid to gamble with cryptocurrency and score big.

More here:
Impact of Blockchain and Cryptocurrency on Gambling Industry - Gamesreviews

Cryptocurrency Solana Decreases More Than 5% Within 24 hours – Benzinga – Benzinga

Solana's SOL/USD price has decreased 5.14% over the past 24 hours to $36.51, continuing its downward trend over the past week of -1.0%, moving from $37.37 to its current price.

The chart below compares the price movement and volatility for Solana over the past 24 hours (left) to its price movement over the past week (right). The gray bands are Bollinger Bands, measuring the volatility for both the daily and weekly price movements. The wider the bands are, or the larger the gray area is at any given moment, the larger the volatility.

The trading volume for the coin has fallen 32.0% over the past week, moving in tandem, directionally, with the overall circulating supply of the coin, which has decreased 0.03%. This brings the circulating supply to 342.77 million. According to our data, the current market cap ranking for SOL is #9 at $12.54 billion.

Powered by CoinGecko API

This article was generated by Benzinga's automated content engine and reviewed by an editor.

See more here:
Cryptocurrency Solana Decreases More Than 5% Within 24 hours - Benzinga - Benzinga

Can Cryptocurrency And DAOs Help Fundraise For Abortion Rights Groups? CowgirlDAO Leads The Way – Benzing – Benzinga

The decision by the U.S. Supreme Court to overturn Roe v. Wade could have a huge impact on access to abortions. The cryptocurrency and NFT sectors have been taking note for months of a potential ruling and are raising money to support one another. Heres the latest.

What Happened: After a draft opinion of Roe v. Wade leaked in May, Molly Dickson began drafting a non-fungible token (NFT)collection to raise funds to support abortion rights groups, the Washington Post previously reported. Dickson formed CowgirlDAO, a decentralized autonomous organizationto raise funds, withthe DAO launchinga collection of 10,000NFTs, which is now minting.

The collection called F*** Youhas three different images and editions. The titles of the works are My mom said youre not supreme, Alito, Never heard of you, Coney Barrett and Kick Rocks, Kavanaugh all named after Supreme Court justices who voted to overturn Roe V. Wade.

CowgirlDAOhosted aTwitter Inc TWTRSpaces to help spread awareness. Dickson previously designed a collection called Computer Cowgirls, which raised more than$30,000 for Fund Texas Choice, a Texas nonprofit that helps with transportation costs for travel out of state for abortions.

CowgirlDAO modeled its work and initiatives after the Ukraine DAO, which raised more than $6 million for Ukraine after the invasion by Russia. Ukraine DAO sold NFTs of the Ukrainian flag to raise funds.

A Twitter account for Choice DAO was foundedto raise funds for abortion rights. The group is not accepting donations yet but has a future goal of raising $1 million in 26 days. The number of days refers to the number of states expected to ban abortion.

Were leveraging community and capital to combat one of the greatest threats to personal liberty in our lifetimes, the DAOs website reads.

The DAO will vote on four different donations of $250,000 using a community voting system to award the funds. A donation to the DAO grants access to the community and a vote in decisions.

Related Link: 3 Women's Health Stocks Are Soaring Following Roe V. Wade Ruling

Why Its Important: Cryptocurrency and NFTs being used to raise funds for abortion rights groups could rise in popularity after the recent U.S. Supreme Court ruling.

Similar to the invasion of Ukraine by Russia, people around the world can now find ways to donate funds to those directly impacted by the ruling.

Those wishing to donate should be aware that some scams could arise to take advantage of these funds set up for this political issue.

Photo: Cowgirl DAO

See the original post here:
Can Cryptocurrency And DAOs Help Fundraise For Abortion Rights Groups? CowgirlDAO Leads The Way - Benzing - Benzinga

Dori: Was Twitter shadow-banning you or me? – MyNorthwest.com

Something weird went down for me on Twitter this week and Im not sure if its because of Dori Monson Show listeners or me.

While I was on a short vacation a few days ago, I tried unplugging as much as possible. That meant only occasional checks on my email. Cursory reads on news sites. A text or two to my daughters. Face-to-face talking to my wife.

Elon Musk to buy Twitter for $44B and take it private

Imagine my surprise when I looked at Twitter Monday night and found my account popping faster than Rice Krispies in milk.

Even though I have seriously cut back from tweeting and post only occasionally now, I was fortunate to have about 19,800 followers as of last Sunday one day before Elon Musks reported $44 billion takeover of Twitter took news sites by storm.

By mid-day Friday, I had 21,231 followers. Admittedly, Im no techno-wizard but I have to admit: this was crazy.

It took 12 years to get 19,000 Twitter followers. It took just three days to get 1,500 more.

My numbers were small in comparison. Florida Gov. Ron DeSantis gained 205,695 followers between Monday and Wednesday. Podcaster Joe Rogan tallied an almost 135,000 bump.

Was it as Twitter had been denying for at least two years because of shadow-banning an algorithm practice that social media giants denied was occurring?

Whether you call it shadow-banning, stealth banning or ghost banning, was this an example of a behemoth social media company restricting the reach of a users account? Or was it limiting potential followers their opportunity to follow conservative Twitter users that the far left didnt like?

And if so, was it Twitter banning me? Or banning my listeners from having you as followers?

Some in the media are digging into the possibility that Twitter employees were liberal gatekeepers who on their way out the door before Musk took over removed barriers to conservative users. Why? To deny that barriers existed in the first place.

Me? Im just happy to have freedom of speech on the radio with open-minded people who agree and disagree.

Maybe now that will return to Twitter.

Listen to Dori Monson weekday afternoons from noon 3 p.m. on KIRO Newsradio, 97.3 FM. Subscribe to thepodcast here.

Read the original post:

Dori: Was Twitter shadow-banning you or me? - MyNorthwest.com

Are You Ready to Be Surveilled Like a Sex Worker? – WIRED

Additionally, many traditional methods for maintaining relative anonymity on the internet are likely to begin to evaporate. Consider that institutions subject to the Childrens Internet Protection Act (CIPA), which requires libraries and schools to block access to content that may be harmful to minors, will have to decide whether to allow public access to abortion information.

Mass surveillance is so normalized that the basic ways we function in the world ultimately help these technologies become more sophisticated. If you are seeking, providing, or facilitating an abortion, you can take practical measures to secure your digital footprint: perform risk assessments, communicate via Signal and enable disappearing messages, use a VPN on your smartphone and computer, use DuckDuckGo instead of Google, acquaint yourself with existing surveillance technologies like traffic cams, facial recognition, and data scrapping, enable two-factor authorization, log out of all your accounts (yes, even when using an incognito browser), only connect to Wi-Fi in public places that dont require you to authenticate yourself, move money out of third-party apps immediately (and eat the transfer fee), use cash or prepaid cards when you can. Do as much organizing offline as possible.

If you organize publicly, post nothing that could be used to dox you. Some precautions Ive taken for my own safety as a sex worker include withholding my birthday, age, ethnic background, hometown, current city, former cities, commute, alma maters, graduation years, time zone, weather, current employers, past employers, even my favorite color. When I post photos, I photoshop out my face and tattoos, and I never reveal my natural hair. If I post a screenshot, I crop out any time stamps.

I know this sounds paranoid. These precautions seem excessive; the algorithms seem dystopian. But the oppression these technologies reproduce is insidious and ubiquitous, and those seeking to surveil us have been refining the tools to do so for a very long time. This is exactly why sex workers are preyed upon first: because those in power know nobody will listen to us until youve already googled two weeks late for period.

When I begin to wonder why people behave the way they do, I answer the query with a question: Whats seven minus yellow? Unanswerable and, more importantly, irrelevant. I cant deduce others motives, and even if I could, their motives do not matter when it comes to the effects of their actions. To ruminate on this is, at best, a waste of time, and in the wake of Roe, hemming and hawing over the justices intents is the equivalent of bringing a feather to a knife fight.

That said, we can dissect these decisions and try to divine how this legislation will impact us. The first step is to abandon any lingering trust you may have in the integrity of the state.

Neither the intent nor effect of FOSTA or Dobbs is to eradicate sex work or abortions, which have existed for millennia and will continue to exist regardless of legality. Remember: these measures arent about the law; theyre about power. Such laws slowly and systemically exclude certain demographics from participation in society by codifying what cultural biases already enforce. Consequently, while some people will face arrest, and many more will live the nightmare of carrying an unwanted or unviable pregnancy to term, the widest-reaching effects of this legislation will be the chilling of free speech and the systemic deplatforming of abortion activists from social media and financial institutions, which will protect themselves from liability at our expense.

The bad-faith arguments that structure these laws become much more apparent when read for what they are: propaganda. FOSTA, for instance, focuses primarily on fighting the sexual exploitation of children. Sex work and human trafficking, rather than existing together under the umbrella of the sex trade, are diametrically opposed. The dangerous rhetoric conflating thema linkage that makes about as much sense as comparing a Hershey Park employee to an enslaved cocoa farmermeans that violence against us gets perceived and excused as protecting children from traffickers.

Likewise, the pro-life rhetoric that enabled the Dobbs decision focuses on protecting, in this case, hypothetical children from death. Echoing FOSTA, Alito claims that Dobbs is intended to protect the potential life of embryos and fetuses, even at the expense of the mothers existing life. Intent aside, the result is that many more fetusesas well as the people carrying themwill die.

Sex workers can offer valuable insights into this fight and those likely to follow, but our voices have been suppressed. Hopefully tech workers will practice what they preach and start listening to sex workers, but if not: Well, thats by design. In the words of Bardot Smith: Whores told you.

Excerpt from:

Are You Ready to Be Surveilled Like a Sex Worker? - WIRED

Know Your Enemy and Yourself: A Deep Dive on CISA KEV – Security Boulevard

Why your real-world firmware risk is way bigger than you think

In November 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) began publishing their Known Exploited Vulnerabilities Catalog (KEV). Designed to help government agencies and private sector organizations prioritize the vulnerabilities known to be actively exploited by malicious actors, as of June 22, 2022, the list contains 778 actively exploited CVEs, encompassing 20 years of computing (2002-2022). In fact, CISA recommends these KEVs be addressed even prior to other High or Critical vulnerabilities that are not yet known to be exploited, citing the fact that less than 4% of vulnerabilities are ever exploited in the wild. With more than 20,000 CVEs discovered in 2021 alone, the KEV gives organizations a highly distilled list of vulnerabilities that are most likely to have a real-world impact based on observed actions in the wild.

So important are the KEVs, that a new Binding Operational Directive 20-01 Develop And Publish A Vulnerability Disclosure Policy requires Federal Civilian Executive Branch agencies (aka FCEBs) such as the DOJ, DOT, DHS, DOE, GSA, SEC etc., to implement entire vulnerability management programs built around it, along with auditable documentation that is publicly visible to all. An example of the changes enforced by this order would be the DOJs VDP page here, which outlines the DOJs Vulnerability Disclosure Program.

Note that while the BOD does not directly require private/commercial entities that sell into these FCEBs to create a VDP and prioritize KEVs, it is suggested that they might do so.

Although not bound by BOD 22-01, every organization, including those in state, local, tribal, and territorial (SLTT) governments and private industry can significantly strengthen their security and resilience posture by prioritizing the remediation of the vulnerabilities listed in the KEV catalog as well.

Security trust and parity across organizations and the vendors that sell their software and devices into them is paramount to national security. Private organizations would be wise to leverage the significant DFIR telemetry, FBI and Fusion Center telemetry, researcher and trust-community initiatives in place, and the overall publicly funded effort it takes to curate the KEVs; as a defensible, actionable, and structured approach to vulnerability risk management.

CISA itself does not yet categorize the vulnerabilities, so we augmented their list by assigning categories to each vulnerability to get a better understanding of the types of assets and code that threat actors are targeting the most.

By categorizing each vulnerability, we are able to identify exploitation trends over the last 20 years which gives some perspective into the evolution of attacker targets.

Trended over time, it is no surprise to see the number of actively exploited vulnerabilities increasing year over year, and its important to note that CISA adds vulnerabilities as exploitation is detected. As a result, the number of exploited CVEs in a previous year could climb based on the data CISA has available.

In terms of categories, firmware led the way overall, followed by server software, operating systems, and web browsers. Lets analyze each category in more detail.

While the prevalence of firmware-based CVEs may be a surprise to some, it is a reflection of the large-scale shift of adversaries targeting firmware within enterprise and network infrastructure. Its also important to note that the numbers arent skewed simply due to an anomalous spike in the data. Firmware has been one of the leading categories of vulnerabilities over the past 5 years and continues to be thus far for 2022. Firmware is the leading category over virtually any time horizon we choose.

This is a troubling trend for many organizations given that traditional vulnerability management programs often dont reach down to the firmware level. Firmware makes up the foundation of modern computing, running on every device before the operating system even loads.very computer contains multiple components like CPU, memory, network adapter, video cards, and hard drives and each of these components contains firmware, difficult to monitor due to running at a level below the operating system. The compromise of firmware can provide an attacker with persistent access, even if the operating system is fully reinstalled or even if the hard drives are replaced.

While it is one thing to acknowledge these firmware vulnerabilities are known to be exploited, it is quite another to realize that the actors behind these active attacks are some of the most prolific and notorious there are, and responsible for some of the longest-running campaigns against both government and critical infrastructure. While the table of KEVs does not specifically identify (aka attribute) a given actor with a given vulnerability thats been exploited, it is easy enough to infer by simply reviewing the long list of recent CISA advisories, or even their high-level Shields Up! initiative. There, the reader can gain a much deeper insight into the campaigns and TTPs (Tools, Tactics, Procedures), leveraging vulnerabilities to meet their objectives. Well known Russian and Chinese nation-state sponsored attacks, as well as cyber criminal and ransomware actor groups, as well as attacks against our software supply chain, managed service providers, telecom infrastructure, hospitals and more. The initial vector into the attacked organizations is more often than not, the firmware of externally-facing devices such as routers, firewalls, VPN devices, and soho devices. Equally apparent, is that these same actors are also leveraging vulnerable firmware on devices internal to the network in order to persist, gather credentials, tunnel C2 (command and control) and exfiltrate data.

Network devices also run firmware, and while they also run an operating system, unlike desktops and servers they lack the advanced security tooling deployed across many enterprises. Due to their mission criticality, they are extremely high-value targets as they can be leveraged to further breach a network, monitor or redirect traffic, or even shut down large parts of the Internet.

Servers are naturally high-value targets for attackers as they frequently store large amounts of sensitive data such as email, databases, code repositories, and customer data. In 2017, the MS17-010 vulnerability in SMB Server facilitated both the WannaCry and NotPetya cyber attacks, causing billions of dollars in damage, shutting down shipping ports, and impacting businesses worldwide. Likewise, threat actors have notably exploited vulnerabilities in Microsoft Exchange Server in order to steal confidential information and deploy ransomware. Most recently, the industry experienced widespread attacks against Atlassian Confluence Server by attackers using a previously unknown vulnerability (CVE-2022-26134) affecting all versions of Confluence Server.

Operating systems serve the end-user(s) and applications on a given device, and any compromises to the OS can give attackers access to data and privileges, and open additional vectors of attack. Threat actors can use this access to maintain persistence, move laterally to other hosts, steal data, and deploy ransomware.

Securing and monitoring operating systems for compromise has become a multi-billion dollar industry, evolving from basic antivirus software in the 1990s to current cloud-based solutions which monitor every action on the system in an attempt to catch patterns of events known to be malicious.

Operating system vendors have improved over the years in terms of providing automated updates to ensure that any vulnerabilities are mitigated quickly in order to reduce their exposure to threat actors. Yet in spite of these efforts, OS vulnerabilities continue to be popular with threat actors including 42 vulnerabilities from 2021 alone. These vulnerabilities were mostly spread across versions of Windows operating systems and Apples iOS.

As the majority of applications have shifted to the browser, so too has cybersecurity risk. Virtually all of a users experiences are delivered through a browser, and users can easily use dozens or even hundreds of web-based sites and applications in a given day. This creates a target-rich environment for attackers, who can lure users into risky clicks or use automated exploit kits to deliver malware to vulnerable browsers.

Browser CVEs have proven to be popular in the wild with attackers. In particular, vulnerabilities in Google Chrome were found to be popular such as CVE-2021-21224, which was targeted by the Magnitude Exploit Kit.

End-user applications such as the Microsoft Office suite and Adobe Acrobat have long been targeted by attackers. Vulnerabilities in these applications can allow an adversary to gain code execution by luring users into opening a malicious file and have been a mainstaying of phishing campaigns for many years. Notably, the KEV catalog includes the Microsoft vulnerability CVE-2022-30190, which can be exploited by an attacker even if the user does not open the malicious file.

In order to maximize their targets, attackers have naturally focused on applications that are virtually ubiquitous. This has made Adobe Acrobat and Acrobat Reader particularly popular targets. For example, the recent Adobe vulnerability, CVE-2021-28550, was first observed in the wild as a 0-day vulnerability, allowing attackers to gain arbitrary code execution on a victim device.

While much of modern computing runs in a web browser, users and organizations still rely on a variety of traditional desktop applications. Popular chat applications like WhatsApp have been targeted by companies like NSO Group, who famously used a zero-day exploit to compromise and subsequently spy on Amazon CEO, Jeff Bezos. The KEV catalog includes multiple WhatsApp vulnerabilities including CVE-2019-3568 and CVE-2019-18426, as well as vulnerabilities in common applications such as Team Viewer Desktop.

Open source software has become an essential part of modern application development, allowing developers to quickly integrate capabilities into their applications and projects. However, this widespread reuse of code means that vulnerabilities in open source projects can likewise be incorporated into countless applications. For example, the notorious Heartbleed vulnerability in the OpenSSL library affected hundreds of thousands of devices globally. More recently, in December 2021, a remote code execution vulnerability in the popular Log4j library came under widespread exploitation. A Neustar International Security Council (NISC) survey indicated an estimated 60% of organizations had been targeted through this vulnerability. CISA also released an alert on June 23rd 2022 warning organizations that malicious actors have been using the Log4j exploit to breach VMWare servers before moving laterally inside the network.

Additionally, attackers have begun employing a new tactic: inserting malicious code into popular libraries. While it is hard to quantify the number of successful attacks resulting from this tactic, GitHub has updated its advisory database to include malware found in open source projects.

Virtualization is a relatively new attack vector in computing, and due to the rapid rise of cloud computing and containerization is one that will likely increase. However, much like attackers have targeted the execution environment of operating systems, they can similarly target the virtual environments and containers that support modern workloads. Vulnerabilities in these areas are potentially significant as they can allow an attacker to escape the virtualized environment and gain control over the physical host. The recent exploitation of the VMware vulnerability, CVE-2022-22960, provides a case in point.

Ultimately an organizations cybersecurity strategy must be informed by the risks and threats observed in the real world. CISAs KEV catalog is a powerful tool, arming security teams with insight into the vulnerabilities that matter most.

When it comes to firmware, there is an opportunity for organizations to see an area where they are likely under-appreciating their risk. The KEV data indicates that firmware has become a top target for real-world adversaries. This could be due to the powerful and strategic nature of firmware itself, or the fact that firmware often does not get updated and patched with the same rigor as other forms of code, or a combination of the two. However, regardless of the motivation, the data shows that firmware has consistently been an area of focus in real-world attacks, and it is up to security teams to build the processes to ensure the posture and integrity of their critical firmware.

For any questions, regarding the data in this post or to learn more about firmware security, please contact the Eclypsium team at [emailprotected].

View original post here:
Know Your Enemy and Yourself: A Deep Dive on CISA KEV - Security Boulevard

The man behind the leaks: Series paints picture of Julian Assange

In the second episode of new ABC seriesIthaka: A Fight to Free Julian Assange, the man behind some of the largest classified-document leaks in history sings Twinkle, Twinkle, Little Star over the phone to his young son as he gets ready for bed.

Minutes before the sweet bedtime scene, Assanges wife and legal adviser Stella Moris watches a video of a gospel choir singing in support of Assange outside of Belmarsh prison, where he has been held since he was dragged out of Londons Ecuadorean embassy in 2019.

This is the side of Wikileaks founder Julian Assange that his family wants you to see in the two-part documentary series available to stream from tonight on ABC iview.

Julians brother, Gabriel Shipton, one of the series producers, said he decided to document Assanges fight for freedom after seeing how much his condition had deteriorated during a visit to see him in Belmarsh prison in late 2019.

Facing the possibility of never seeing his brother again, Gabriel, who hadnt previously been involved in advocating for Assange, decided to bridge the disconnect between the real Julian and the publics perception of him after years of media scrutiny.

Everybody who knows Julian knows him as a funny, sensitive, goofy, gentle genius, Gabriel said.

But I was almost afraid to tell people that I was Julian Assanges brother because of all these smears and things that were in the media.

Gabriel began filming his and Julians father, John Shipton, as he advocated for Assanges release, and brought on director Ben Lawrence to write and direct the project six months later.

Ithaka documents two years of the fight against Assanges extradition to the US on espionage charges.

But Assange only appears via phone and FaceTime calls, and via CCTV footage of his time in Londons Ecuadorean embassy.

His presence is always felt but rarely seen by the audience a deliberate tactic Ben says was used to mimic the real-life experience of Assanges family.

Instead, John takes centre stage.

Ben said with Assange imprisoned and focusing on his legal fight, it was natural that John was at the forefront of the documentary.

As John says in episode one, Assange can no longer speak for himself, so his family and friends must speak for him.

The documentary gives viewers unprecedented insight into the private lives of Assanges family, which is particularly momentous for Stella, who only revealed herself as Assanges partner and mother of his children in 2020.

Ithaka shows footage of Stella visiting Assange with their first baby son during his stint in the Ecuadorean embassy, and follows her to Barcelona to visit her parents, who help look after the children as she deals with Assanges legal issues.

Stella had good reason for keeping her identity hidden in the past, having feared for her life at the hands of the CIA, but has since decided that Assanges needs are greater.

Im here to remind you that Julian isnt a name, hes not a symbol, she says in a speech.

Hes a man, hes a human being, and hes suffering.

Throughout the documentary, the audience sees John transform from someone happy to smile and speak to as many journalists as possible, while slightly umm-ing and ah-ing, to a more self-assured, media-savvy man equally more reluctant to face microphones and cameras.

Were here because we have a problem, we have a child in the sh and want to get him out, John tells the audience.

But he admits in the second episode, when he appears tired and disillusioned, that he doesnt see Assanges predicament getting any better only worse.

Ben says this is simply a moment of despair for a man who has seen his son lose a decade through imprisonment in one form or another, before he continues trying to free him.

As John points out in Ithaka, life does not follow the convenient Hollywood structure of a beginning, middle and conclusion: Assange is still fighting extradition to the US.

Since the documentary completed filming, a UK court has formally approved the extradition of Assange to the US, which set alarm bells ringing for those concerned over protections of journalists and whistleblowers.

It is now up to the UK Home Secretary to determine whether the WikiLeaks founder will be extradited.

The two-part series Ithaka: A fight to free Julian Assange will air on ABC TV at Tuesday, June 7 at 8.30pm AEST, or on ABC iview

Read more from the original source:
The man behind the leaks: Series paints picture of Julian Assange

Donating to help women get abortions is a First Amendment right protected by Supreme Court precedents – The Conversation

Several Texas abortion funds which are charities that help people who cant afford to get an abortion pay for their travel, lodging and medical bills paused disbursements on June 24, 2022, after the Supreme Court ruled that Americans have no constitutional right to the procedure.

The Lilith, Equal Access, Frontera and other funds said they were taking this step to assess the legal consequences of the courts ruling in Texas, which already had some of the nations strictest abortion laws. Abortion funds in some other states, including Oklahoma, were also reportedly halting their work.

Some funds active in Texas made this decision based on concerns that their financial assistance to women seeking abortions may now be illegal in that state, as well as fears that their donors could also be sued for violating Texas law.

But as an expert on reproductive rights and First Amendment law who has argued before the Supreme Court, I believe that donating to abortion funds even in places where helping people get abortions is illegal is protected by the U.S. Constitution.

The Supreme Court has ruled on several occasions that fundraising, whether its by charitable organizations or political candidates, is a form of speech protected by the First Amendment.

The court handed down the first relevant ruling in 1980, with its Schaumburg v. Citizens for a Better Environment decision. The court struck down an Illinois city ordinance that had prohibited charitable organizations from soliciting contributions unless 75% or more of their revenue was used directly for charitable purposes, rather than for salaries, administration and overhead costs.

The city of Schaumburg had defended that ordinance by contending it regulated conduct involving commercial transactions and was necessary to prevent fundraising for fraudulent causes. The Supreme Court rejected this characterization, asserting that fundraising is a form of protected speech because it is intertwined with informative and perhaps persuasive speech seeking support for particular causes or for particular views on economic, political, or social issues.

The court further noted that without the right to seek and receive donations, the flow of information and advocacy would likely cease.

Several campaign finance rulings have reinforced the Schaumberg ruling.

The best-known among them is Citizens United v. Federal Election Commission. Two other key rulings are Buckley v. Valeo, which preceded the Schaumberg case, and McCutcheon v. Federal Election Commission. All three established that contributions to political candidates, and spending by those candidates, is a form of speech protected by the First Amendment.

In the eyes of the law, seeking donations and making contributions are two sides of the same coin. The Supreme Court has said that both are important ways to show support for political preferences, advance ideas and advocate for policy changes.

The First Amendment right to solicit or give funds is not limited to charitable organizations or candidates. Simply panhandling on the street, the most basic form of soliciting funds, is entitled to First Amendment protection, according to several lower federal courts.

The Supreme Court has also held that the freedom of association principle embodied in the First Amendment protects the right to support a cause by making donations or paying dues.

Based on the freedom of association, which includes the right to join together with others for social or political purposes, the court has been very protective of the right of donors to remain anonymous. That has especially been the case for donors who support controversial causes and when revealing their identity might subject them to harassment, threats, public hostility or other forms of reprisal.

In 1958, the Supreme Court ruled in NAACP v. Alabama that the First Amendment barred Alabama from forcing the NAACP to disclose the names of its members or donors who resided in the state. The court pragmatically recognized that compelling disclosure of supporters of a civil rights group in Alabama in the 1950s could endanger the donors.

This First Amendment principle of protecting the speech and the rights of donors to fund charitable causes guards both sides of the political spectrum.

In July 2021, for example, the Supreme Court decided a case brought by two organizations considered to be conservative: the Americans for Prosperity Foundation and the Thomas More Law Center. The two organizations challenged a California law that required them to disclose the names of their donors who gave more than $5,000.

California tried to justify this law as necessary to prevent fraud by registered charities the same preventing fraud rationale that Schaumburg had unsuccessfully asserted as the reason it needed to restrict charitable solicitation.

Relying on the NAACP case among others, the Court held in Americans for Prosperity Foundation v. Bonta that the compelled disclosure requirement violated the donors right to freedom of association.

Based on this body of law, the First Amendment protects the right of abortion funds to seek contributions and to make contributions to individuals in Texas and other states where abortion is illegal to support their activities. The First Amendment also protects the right of people to make donations to abortion funds.

A 2021 Texas law known as Senate Bill 8 prohibits aiding and abetting an abortion after six weeks into pregnancy. The measure specifically mentions providing financial assistance as a form of aiding and abetting.

The law authorizes any person in the world to bring a civil damages lawsuit against anyone who aids and abets an abortion, and to recover attorneys fees in addition to at least $10,000.

One reason why abortion funds might be leery right now is that Texas law permits someone to seek a court order to force others to hand over information that might provide a basis for suing them.

Two individuals have already sought such an order to require the Lilith Fund to disclose information about its funding and donors in order to determine if they violated the 2021 restriction on aiding and abetting an abortion by giving money.

The Thomas More Law Society the same organization that successfully asked the Supreme Court to protect it from having to disclose its donors is representing the people seeking donor information from the Lilith Fund, and tweeted that Lilith Fund donors could face legal action for violating the Texas abortion laws aiding and abetting prohibition.

A Texas trial court judge has found that the provisions authorizing anyone to sue someone who provides or aids and abets an abortion likely violate the Texas Constitution, and has temporarily enjoined the law, meaning that it is on hold pending appeal.

The case is likely to go to the Texas Supreme Court. How that court rules will have a great impact on the liability risk faced by the Lilith Fund for providing financial assistance to women to help them get an abortion. While the legal process is playing out, the Lilith Fund is trying to minimize its legal risk by suspending the distribution of money to women.

If the Texas appellate courts eventually uphold S.B.8, the ban on providing financial assistance to Texas women could be enforced. In that event, the Lilith Fund would be able to make a strong case that they dont need to reveal any information because of First Amendment protections.

If states try to punish abortion funds or individuals for providing a woman with financial assistance to get an abortion in another state where it remains legal, including the money required to travel there, that would likely violate the Constitution.

Giving money to people who want to obtain a legal abortion would not be aiding and abetting a crime. Moreover, the Constitution protects the right to interstate travel. The freedom to cross state lines is a right deeply embedded in U.S. history dating to the Articles of Confederation, prior to the Bill of Rights.

Assisting someone with obtaining a legal abortion by giving them money also could be protected as a form of free speech because it can be one aspect of advocating for and supporting the right to legal abortion. Disbursing these funds could also be protected under the Constitution as an aspect of the freedom to associate with women who seek legal abortions by giving them financial support.

Read more:

Donating to help women get abortions is a First Amendment right protected by Supreme Court precedents - The Conversation