Tel Aviv, Israel– July 12, 2023 – Oxeye, the provider of an award-winning cloud-native application security platform, has uncovered two critical security vulnerabilities and recommending immediate action be taken to mitigate risk.

The vulnerabilities were discovered in Owncast (CVE-2023-3188) and EaseProbe (CVE-2023-33967), two open-source platforms written in Go.

Owncast vulnerability

The first vulnerability was discovered in Owncast, an open-source, self-hosted, decentralized, single-user live video streaming and chat server written in Go. The vulnerability, labeled as an Unauthenticated Blind Server-Side Request Forgery (SSRF), could potentially allow unauthenticated attackers to exploit the Owncast server by forcing the Owncast server to send HTTP requests to arbitrary locations using the GET HTTP method. This vulnerability also allows the attacker to send the requests while specifying arbitrary URL paths and query parameters. The Owncast vulnerability has a high CNA CVSS severity rating of 8.3/10 and was identified during an extensive analysis conducted by Oxeye Security’s in-house custom SAST (Static Application Security Testing) solution for compiled Golang applications.

Upon examination, the security researchers at Oxeye Security determined that the Owncast server is susceptible to an unauthenticated SSRF attack, enabling malicious actors to force the server to send HTTP requests to arbitrary locations using the GET HTTP method. Additionally, attackers can manipulate the requests by specifying arbitrary URL paths and query parameters.

The vulnerable code resides within the GetWebfingerLinks function of Owncast, specifically in the following location:

https://github.com/owncast/owncast/commit/f40135dbf28093864482f9662c23e478ea192b16

As per the code analysis, user-controlled input passed through the “account” parameter is parsed as a URL, and subsequently, an HTTP request is issued to the specified host on line 32.

To address this critical SSRF vulnerability, Oxeye Security recommends the following remediation steps:

•Prohibit the HTTP client utilized by Owncast from following HTTP redirections to mitigate the potential exploitation of SSRF attacks.

•Implement restrictions to allow only authenticated users to trigger the vulnerable endpoint, thereby minimizing the risk of unauthorized access.

Oxeye Security has been proactive in reaching out to the Owncast development team and providing them with detailed information regarding the vulnerability and recommended remediation steps. Together with Owncast, Oxeye Security aims to ensure the prompt resolution of this security issue to safeguard the Owncast community and its users.

EaseProbe vulnerability

Oxeye has also recently discovered multiple SQL-injection vulnerabilities in EaseProbe, a lightweight and standalone health/status checking tool written in Go. The vulnerabilities, categorized as Config-Based SQL-Injection, expose potential security risks for users of EaseProbe with a Critical NIST CVSS Security Score of 9.8/10. The vulnerable code is located in the MySQL / Postgres database client code:

•https://github.com/megaease/easeprobe/blob/main/probe/client/mysql/mysql.go#L174

•https://github.com/megaease/easeprobe/blob/main/probe/client/postgres/postgres.go#L203

During an extensive evaluation utilizing Oxeye Security’s in-house custom SAST (Static Application Security Testing) solution for compiled Golang applications, the security researchers identified significant vulnerabilities in EaseProbe. These vulnerabilities can be exploited by attackers who have control over the EaseProbe configuration, enabling them to read, delete, or modify all information stored in the databases configured for health checking. In certain circumstances, depending on the user privileges and the database engine, the attacker may also execute arbitrary system commands on the server hosting the database. The vulnerable code is located within the MySQL and Postgres database client code of EaseProbe.

By analyzing the EaseProbe configuration file, Oxeye Security demonstrated a practical exploitation scenario on a Postgres database. The attacker injects a malicious command “ls” to execute arbitrary system commands. The vulnerable database query is unsafely formatted with user-provided data, leading to the successful execution of the injected command.

To mitigate the risks associated with SQL-injection attacks, Oxeye Security recommends the following remediation measures:

•Properly sanitize all user input to prevent SQL-injection vulnerabilities. This can be achieved by implementing techniques such as prepared statements and parameterized queries, which treat user-provided input as values instead of executable code. If injection occurs in a query part that cannot be parameterized, strictly validate user input, considering the use of regular expressions or other appropriate methods.

•Ensure the application is regularly updated and patched to address any known vulnerabilities, as this can effectively mitigate the risk of exploitation.

Oxeye Security has taken immediate action by notifying the developers of EaseProbe about the discovered vulnerabilities. By collaborating with the EaseProbe team, Oxeye Security aims to expedite the resolution of these security issues to protect EaseProbe users from potential threats. Note: This problem has been fixed in EaseProbe v2.1.0

To learn more about how Oxeye can assist with cloud-native application security challenges, please click here to contact us.

# # #

Uncategorized

Montreal, Canada, July 11, 2023 — AcuityTec, a leading provider of Global KYC, KYT, compliance, and multi-layered fraud prevention solutions, is thrilled to announce a significant addition to their leadership team.

With its relentless pursuit of excellence and commitment to secure global online businesses, AcuityTec proudly welcomes Alfredo Solis as their new Senior Director and Business Strategist.

With a 20-year career dedicated to bolstering online risk management, Alfredo Solis, brings passion and a wealth of expertise set to elevate AcuityTec’s offering to Fintechs, crypto companies, iGaming platforms, and other online businesses worldwide to support our ever-growing online ecosystem.

Solis extends this passion to fortifying client engagement with AcuityTec’s platform, understanding the importance of customizable data, transactional verifications, and ongoing monitoring in forging secure online environments.

His hands-on approach to honing advanced risk algorithms, employing data simulation, and developing comprehensive business intelligence reports surpasses standard risk mitigation measures. Solis is devoted to delivering exceptional, bespoke solutions that meet and exceed client expectations, contributing to their growth while maintaining a secure digital environment. This dedication consolidates AcuityTec’s mission to provide unrivalled data and fraud defence solutions.

Grounder

“We are incredibly excited to have Alfredo join the AcuityTec family,” said Director of Business Developments Eric Gounder. “His expertise and unwavering commitment to premium fraud defence encapsulates our mission and brings to our team an enriching perspective that will undoubtedly propel our strategic initiatives. We anticipate his contributions to our future developments with great enthusiasm.”

Alfredo expressed his enthusiasm about the new role, saying, “Joining the AcuityTec team is an exhilarating next step for me. I have always admired their commitment to offering cutting-edge KYC, risk management and fraud prevention solutions. I am eager to contribute my knowledge and experience to this innovative team and look forward to fostering stronger, safer online business landscapes globally.”

Prior Acuitytec, Alfredo held distinguished roles including Customer Success Manager at Jumio Corporation, Director of Account Management at FourStop GmbH, Senior Risk Lead at Vogogo, Senior Client Services Manager at Convergys, all contributing to his expertise. For more on Alfredo’s impressive trajectory, visit his LinkedIn profile.

AcuityTec continues to set the pace in the industry by investing in talents like Alfredo Solis, who possess the skill and determination to make a difference in the digital world. This move underscores the company’s dedication to enhancing its services and strengthening its position as a global provider of digital identity verifications, transactional protection and fraud prevention leader.

About AcuityTec: AcuityTec is a leading provider specializing in global KYC, KYB, compliance and advanced fraud defence with real-time monitoring all through a single API. From onboarding customer to verifying and monitoring transactions, their customizable end-to-end and risk mitigation solutions ensure businesses obtain unparalleled fraud protection to secure their customers, business and revenues.

For more information, discover our products or contact sales@acuitytec.com.

For media inquiries, contact marketing@acuitytec.com.

# # #

Uncategorized

When it comes to alternative asset trading, protecting investor data is of critical importance.

Related: Preserving the privacy of the elderly

As more traders and investors engage in these investment avenues, it is crucial to adopt robust security measures to safeguard sensitive and regulated information. Here are seven tips to protect investor data in alternative asset trading.

•Conduct regular penetration testing. Regular and thorough penetration testing is crucial for identifying vulnerabilities within trading systems. By engaging third-party experts to simulate real-world hacks, companies can proactively uncover potential weaknesses and address them promptly.

Nazdan

Penetration testing provides valuable insights into a system’s security posture, allowing companies to fortify their defenses and protect investor data from malicious actors.

•Foster collaborative partnerships. Having access to a partner focused in cybersecurity brings fresh perspectives and allows for an unbiased evaluation of the systems in use. These partnerships strengthen a security posture by leveraging the expertise of professionals who specialize in identifying vulnerabilities and allows them to suggest remediation strategies. By working together, a robust cybersecurity framework can be established to protect investor data.

•Employ real-time antivirus scanning. Implement a multi-layered approach to protect against potential threats. By using real-time antivirus scanning to detect and neutralize security risks as they enter the trading system, threats can be quickly identified and eliminated.

This includes scanning all materials, such as investor onboarding documents and communication. Real-time antivirus scanning enhances the security of investor data by providing immediate protection against known and emerging threats.

•Implement strong data encryption. Data encryption is fundamental for protecting sensitive information in alternative asset trading. Industry-standard algorithms for encryption can ensure all data, in transit and at rest, is safe.

Encryption renders data unreadable to unauthorized individuals, significantly reducing the risk of data breaches. Implementing strong data encryption protocols and adhering to best practices fortifies the confidentiality and integrity of investor data.

•Prioritize continuous threat detection. Maintaining continuous observability of the trading system is essential for early threat detection. It’s important to implement robust monitoring systems that analyze activities and network traffic, which identify unauthorized access or suspicious behavior.

Prompt detection and response to potential security incidents mitigate the impact of breaches, ensuring ongoing protection of investor data. Continuous threat detection is a proactive approach to maintaining trading environment security.

•Stay informed about security best practices. Staying current on the latest trends, emerging threats and industry best practices is crucial to security. Some great ways to keep a team informed on evolving security challenges and effective countermeasures include participating in industry forums, attending conferences and engaging with security professionals.

Active awareness of security developments allows for adaptable strategies in addressing emerging risks and effectively protecting investor data.

•Conduct employee training and awareness programs. Investing in comprehensive employee training and awareness programs is essential for a security-conscious environment. It’s important to educate staff on the significance of data protection, potential security threats and proper handling of sensitive information.

Enforce a culture of strong passwords, two-factor authentication and responsible data access practices to foster a security-conscious culture.

Protecting investor data is vital for maintaining trust and confidence in alternative asset trading. By adopting a comprehensive approach to security, fintechs and issuers can establish robust security measures. Safeguarding sensitive information not only mitigates risks but also allows investors to focus on maximizing their investment opportunities with peace of mind.

About the essayist: Brian Nadzan, is CTO/CISO of Templum, a provider of technology and infrastructure solutions for the private markets. He has over 25 years of global leadership experience within the financial services industry, having spearheaded development across Electronic Trading, OMS, Risk, Compliance and Data.

Aachen, Germany, July 10, 2023 – Utimaco, a leading global provider of IT security solutions that is celebrating its 40th year pioneering trusted cybersecurity and compliance solutions and services to customers across the globe, has released a new whitepaper, ‘Circles of Trust 2023: Exploring Consumer Trust in the Digital Society’, that takes a deep look at how consumers view trust in an increasingly digital world.

Just decades ago, the internet was something that could only be accessed from large, immobile personal computers. Today it is everywhere. Digital connections aren’t just in the mobile devices owned by 66% of the world’s population – they’re in streets, vehicles, traffic systems and in dozens of places throughout our homes. Consumers don’t just need to trust that their bank is keeping their money and data safe – they need to trust that there are not privacy vulnerabilities in their lightbulbs.

In light of this Utimaco released its first edition in the Circles of Trust survey series in 2022 focused on a sample of the United Kingdom (UK), Spain and Germany, covering key sectors of automotive cybersecurity to the public and the health sector to uncover consumer perceptions about the digital services that they use every day. The research found a central contradiction of digital life: consumers were very enthusiastic about digital offerings, from connected vehicles to digital health services, but they were equally wary of security risks around these digital services.

This year’s research found these central contradictions remain, but by expanding the geographic scope to the United States of America (US), Mexico and Singapore, Utimaco has deepened its understanding of trust in digital life. The new consumer research studied and focused on banking, the Internet of Things (IoT) and smart cities and found the following key takeaways from across the world:

•Only 19% of respondents don’t worry about the security of their data.

•36% of respondents have been the victim of data loss, identity theft or digital fraud.

•41% of respondents believe that a connected world would make their everyday lives easier.

Auerbach

In the US, respondents reported the highest levels of digital fraud from all sources, including banking and payments, Internet of Things (IoT) and Smart Cities. And although few could define the term “Internet of Things” (29%), when asked if they used “smart devices” 40% responded Yes, showing that how we define digital technology matters.

When asked if they have ever been a victim of data loss, identity theft or hacks related to a smart home device, 41% of US respondents said Yes. This data shows that additional work must be done to build awareness around the meaning of IoT and how consumers can secure their IoT devices.

Further, in the case of the US, this might be down to the type of devices used combined with a generally higher level of cybersecurity risk. Americans are more likely than respondents from other countries to use digital entry systems and security systems like the Ring Doorbell, and these are likely to yield more value to criminals than the data in smart televisions and virtual assistants.

In the area of trust in banking and financial institutions, US respondents showed more encouraging signs. When asked “do you trust your main financial institutions (banks, credit card providers) to keep your money and data secure from digital theft? 70% have some trust or full trust in them.

“We pride ourselves on driving the conversation around digital trust forward. At Utimaco, we see our role as being not just about creating hardware and software that provides the ‘root of trust in a digital world’, but also communicating to our customers about the social context of that technology. In short, all the security systems in the world will be more effective if end users know and trust that they are effective,” says Stefan Auerbach, CEO, Utimaco. “We see the ‘Circles of Trust’ series of research as a vital tool to temperature test digital trust around the world, and an invaluable resource for any company working internationally.”

The 2023 edition of the ‘Circles of Trust’ is released in the same year that Utimaco is celebrating its 40th year pioneering trusted cybersecurity and compliance solutions and services to its enterprise and government customers across the globe.

To download your copy of ‘Circles of Trust 2023: Exploring Consumer Trust in the Digital Society’, please visit: https://utimaco.com/survey-how-trust-works-digital-world

For more information, visit: https://utimaco.com/

About UTIMACO: UTIMACO is a global platform provider of trusted Cybersecurity and Compliance solutions and services with headquarters in Aachen (Germany) and Campbell, CA (USA). UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions for regulated critical infrastructures and Public Warning Systems. UTIMACO is one of the world’s leading manufacturers in its key market segments.

500+ employees around the globe create innovative solutions and services to protect data, identities and communication networks with responsibility for global customers and citizens. Customers and partners in many different industries value the reliability and long-term investment security of UTIMACO’s high-security products and solutions. Find out more on www.utimaco.com.

Media contact: Utimaco, Alma Fisher,alma.fisher@utimaco.com

# # #

Uncategorized

To tap the full potential of massively interconnected, fully interoperable digital systems we must solve privacy and cybersecurity, to be sure.

Related: Using ‘Big Data’ to improve health and well-being

But there’s yet another towering technology mountain to climb: we must also overcome the limitations of Moore’s Law.

After 30 years, we’ve reached the end of Moore’s Law, which states that the number of transistors on a silicon-based semiconductor chip doubles approximately every 18 months. In short, the mighty integrated circuit is maxed out.

Last spring, I attended NTT Research’s Upgrade 2023 conference in San Francisco and heard presentations by scientists and innovators working on what’s coming next.

I learned how a who’s who list of big tech companies, academic institutions and government agencies are hustling to, in essence, revive Moore’s Law and this time around direct it at optical technology.

I had a wide-ranging conversation with NTT Research President & CEO Kazu Gomi about an ambitious initiative called Innovative Optical and Wireless Network (IOWN) that aims to develop next-generation networks and computations. IOWN is all about supporting increased bandwidth, capacity and energy efficiency.

What really struck me was that IOWN also seeks to foster an “affluent and diverse” global society. For a full drill down on our discussion, please watch the accompanying videocast. Here are my takeaways.

What’s next: Internet of Everything

The world of the near future holds the promise of climate-restoring cities, autonomous transportation systems, incredible breakthroughs in healthcare and many more amazing services that could greatly benefit everyone on the planet.

However, the laws of physics dictate that silicon semiconductor chips simply won’t be able to support the massive data ingestion – and the colossal data crunching – that the Internet of Everything demands.

Fortunately, optical circuits are well suited to the task at hand. The Internet of Everything requires distributing billions more data capture sensors far and wide to form sprawling, interoperable digital shrouds overlapping one another. Each sensor in each shroud must be uniquely smart and use next to zero energy.

Working in concert, these sensor shrouds will very precisely and very securely move vast amounts of useful data very quickly to and from —  in traffic grids, utilities, communication systems, buildings and our homes.

“Optical technology can enable us to control energy consumption so we can support increasing capacity and increasing bandwidth,” Gomi summarizes.

At NTT Research in Sunnyvale, Calif., scientists are working on basic research to develop optical technology that can overcome current challenges. Their work focuses on creating smaller laser oscillators, which produce the light necessary for optical circuits. Smaller oscillators create shorter pulses that can increase bandwidth exponentially.

The business case for optical

One of the key benefits of optical circuits, Gomi emphasized, is their lower energy consumption compared to traditional circuits. This is particularly important for AI engines, which currently require large GPU clusters that use integrated circuit chips and consume vast amounts of energy.

Optical circuits have the potential to replace these GPUs, offering faster computation and drastically reduced energy consumption, he says.

Energy-efficient AI technology would make it possible to move computation to sensors at the network edge where intelligent analytics can be done in much quicker response times, consuming much less energy.

NTT executives and scientists speak often about how advanced optical technology can benefit society as a whole. It’s notable that the IOWN

mission statement actually calls for fostering a rich global society, one that’s tolerant of diversity and respectful of individual privacy.

I asked Gomi about the business case for this. He argues that if drastic changes are not made to shift to optical technology, carbon footprint issues will become a significant concern. By embracing optical technology, industries can grow, and society can benefit from the development of smarter infrastructure.

Deploying AI ethically

Gomi also acknowledged the need to strike a balance between humans and AI and to consider the ethics of AI. The conversation around AI’s potential impact on society, culture, and economics is just beginning, he says, but it’s essential to ensure that AI is implemented responsibly to avoid unintended consequences.

“AI right now can be undisciplined and has the potential to behave badly,” Gomi told me. “Bad behavior is something that must be corrected and we need to do something to discipline AI, as needed, when needed.”

You just don’t hear that kind of perspective very much from Amazon, Microsoft or Google, and certainly not from Facebook or Twitter.

In preparing to attend Upgrade 2023, I ran across a transcript of a lecture introducing IOWN delivered in 2019 by Jun Sawada, former CEO of NTT, the parent company of NTT Research.

Sawada begins by pointing out Japan’s history as a supplier of silver pearls, sapphires and cinnabar. He draws a comparison between Europe and Japan during the Industrial Revolution (1750-1850) noting the opposing perspectives of centralization vs. decentralization.

Sawada

He suggests that Japan’s Edo city, with its population of one million, represented a recycling-oriented eco-metropolis, while European cities focused on centralization and energy-driven growth. Moving on to an assessment of modern society, Sawada posits that the divisions between nations we see today results from conflicts between socialism and capitalism.

Today, he observes, the flood of information, coupled with AI-driven filtering, has led to divisiveness based on biased preferences. He advocates reconciling the economic expansion of modern European societies with Edo’s recycling mindset — and developing a global society that recognizes diverse values.

Sawada’s larger point is that IOWN holds the potential to reset our communication systems with the intention of driving towards a much greater global good. IOWN quietly continues to gain traction. How far can it take us?

I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

Boston, July 7, 2023 — CybSafe, the human risk management platform, has today announced CEO Oz Alashe MBE has been named as a SecurityInfoWatch.com, Security Business and Security Technology Executive magazines’ 2023 Security Industry Innovator Award winner. CybSafe’s human-centric, behavioral approach to cyber security and risk mitigation has positioned Alashe and his team as security leaders to watch through 2023 and into 2024.

Oz Alashe MBE, CEO of CybSafe, said: “At CybSafe, we are on a mission to provide organizations with the knowledge, skills and data to make informed decisions about their human cyber risk. This recognition as a Security Industry Innovator is a testament to the hard work and dedication of the CybSafe team, which is dedicated to empowering individuals to improve their security behaviors and become an effective line of defense against cyber threats.

“As we expand our services across North America and beyond, we will continue to harness the power of data, behavioral science, and human psychology to develop innovative solutions to empower organizations in navigating the ever-evolving cyber threat landscape. This award serves as recognition of the importance of the human element in cybersecurity. While technological solutions have a crucial role in combating cyber risk, people are an essential part of the puzzle and want to be part of the solution. We are developing intelligent software to help them.”

Alashe MBE

Security Group Editorial Director, Steve Lasky said: “Our Endeavor Business security media team is thrilled to recognize the accomplishments of security innovators and leaders in our industry. The Security Industry Innovator Awards 2023 places an emphasis on applauding innovation and seek to reward those who have proven themselves to be leaders in implementing security and risk solutions in their organizations,

“We are honoring visionary individuals across the spectrum including security executives, and systems integrators who have pushed the envelope to effectively engage prospective customers and meet their buyer needs in a complex world of technology advancement and diverse threats, security software and hardware solutions providers who remain committed to demonstrating an outstanding level of excellence within this vital and constantly evolving industry and consultants that ensure their clients are well-advised and consistently ahead of the industry curve.”

For more than 40 years, SecurityInfoWatch.com, Security Business and Security Technology Executive magazines have been pioneers in providing comprehensive technology and business operations content to the security industry in print, digital and live-event platforms. The launch of this annual Security Industry Innovator Awards encompasses a spectrum of markets, from software and hardware development and deployment to security and risk services and systems integration as the security industry continues to meet the challenges of a changing world.

About CybSafe: CybSafe is cloud-based software that reduces organizational risk by improving people’s security decisions and behaviors. It educates, nudges and provides real-time, tailored cyber assistance for users so that they can be secure in their daily digital lives. It’s the only human-risk software solution that helps security professionals target specific security behaviors. It also provides security behavior, culture and risk reporting metrics that allow you to pre-empt security problems. CybSafe is underpinned by a data-led model of human behavior and leverages SebDB, the world’s most comprehensive security behavior database. It’s designed for a modern workforce and a hybrid working environment.

Media contact: cybsafe@resonancecrowd.com +44 208 819 3170

 

Uncategorized

Budapest, Hungary, July 07, 2023 — Silent Signal, a leading technology provider of state-of-the-art ethical hacking services and solutions, discovered and reported a vulnerability to IBM, that has been confirmed and identified under CVE-2023-30990.

The Remote Code Execution vulnerability permits unauthorized attackers to access the server, enabling perpetrators to infiltrate sensitive corporate assets and block ongoing business-critical services including the central server, database server, file server, and network drive server.

The time has come to proactively securing IBM i Systems. “It is time to prioritize proactively securing IBM i (formerly known as AS/400) infrastructures. This necessitates a shift in paradigm for both security professionals and vendors, as IBM i Systems have been renowned for their inherent security. The recently discovered exploit in the DDM architecture, which enables attackers to execute a CL command as QUSER within a mere 5 seconds using a single IP address, highlights the need for further investigation into potential security concerns in IBM i Systems.

Panczel

The vulnerability identified by our team allows unauthorized entry for attackers using workstation user credentials, potentially granting access to sensitive information. This compromises critical business processes and leaves the network vulnerable to potential privilege escalation” – Zoltán Pánczél, co-founder and Head of Silent Signal Security Lab at Silent Signal, explained.

Discovery and exploitation of the legendary IBM i System. Read the detailed technical description in Silent Signal’s ethical hacking blog and learn how they discovered and exploited the unauthenticated RCE in IBM i DDM Service.

Affected product(s) and version(s) are IBM i 7.2, IBM i 7.3, IBM i 7.4 and IBM i 7.5 users.

Recommended actions for affected users are provided in IBM’s latest Security Bulletin CVE-2023-30990.

IBM i users are strongly advised to prioritize regular scanning, vulnerability remediation, and patching to ensure the security of their systems. Read more about how to secure your IBM i Servers to meet compliance requirements.

About Silent Signal: Silent Signal is an independent information security company providing state-of-the-art ethical hacking services and solutions. It helps its customers recognize the threats endangering their business, identify vulnerabilities affecting their systems and plan their defense strategy to protect their most valuable assets. Silent Signal is headquartered in Budapest Hungary, having clients from the financial, telco, government, and industry sectors from 30 countries. For more information, visit https://silentsignal.eu/

Media Contact: Andrea Ipolyi, Silent Signal, andrea.ipolyi@silentsignal.eu

# # #

Uncategorized

Hsinchu, Taiwan – July 6, 2023 – Nuvoton Technology, one of the world’s leading suppliers of microcontrollers, has proudly launched its MUG51 8-bit MCU series of low power microcontrollers designed for battery-free devices.

Nuvoton is committed to sustainable 8-bit MCU production and product longevity to ensure a reliable supply, giving customers the confidence to commit to long-term products, platforms, and projects.

New MUG51 Series 8-bit Low Power MCU for Battery-free Devices

The low power MUG51 series incorporates an 1T 8051 core microcontroller operating at 7.37 MHz, plus 16 KB Flash APROM and 1 KB SRAM memory within the chip. The MUG51 series supports special design power-on and resume, requiring a start-up current of just 200 ?A after power-on and before Flash memory initialization, while a normal operating mode uses less than 1.3 mA. In sleep-mode, it uses less than 1 ?A.

To meet flexible application design demands that minimize platform size and cost, the MUG51 series provides a rich set of peripherals including GPIO with an internal inverter, 16-bit timers, 12-bit ADC, 16-bit PWM, UART, I2C, SPI, two rail-to-rail comparators (ACMP) for stylus pen pressure measurement, and an ISO 7816-3 Smart Card interface can also configure as UART transmission.

For applications that experience extreme conditions it supports a wide operating voltage range of 1.8-5.5V, and wide operating temperature of – 40°C to 105°C, plus high resistance to electrostatic shock with EFT ±4.4 kV and ESD HBM ±7 kV.

For more information about Nuvoton MUG51 8-bit MCU series, please visit this page.

Extensive 8-bit MCU Options for Diverse Applications

Nuvoton offers one of the industry’s broadest 8-bit MCU product portfolios and it continues to invest in developing new technologies and silicon products in response to ever changing market and customer needs, and application trends.

Learn more about Nuvoton 8-bit MCU product range here.

About Nuvoton Technology: Nuvoton Technology Corporation (Nuvoton) was founded to bring innovative semiconductor solutions to the market. Nuvoton was spun-off as a Winbond Electronics affiliate in July 2008 and went public in September 2010 on the Taiwan Stock Exchange (TWSE). Nuvoton focuses on the developments of microcontroller, microprocessor, smart home, cloud security, battery monitoring, component, visual sensing and IoT with security ICs and has strong market share in Industrial, Automotive, Communication, Consumer and Computer markets.

Nuvoton owns 6-inch wafer fabs equipped with diversified processing technologies to provide professional wafer foundry services. Nuvoton provides products with a high performance/cost ratio for its customers by leveraging flexible technology, advanced design capability, and integration of digital and analog technologies.

Nuvoton values long term relationships with its partners and customers and is dedicated to continuous innovation of its products, processes, and services. Nuvoton has established subsidiaries in the USA, China, Israel, India, Singapore, Korea and Japan to strengthen regional customer support and global management. For more information, please visit this page.

Media contact: Kayla Lee, Email: kayla@GlobalPR.agency, Skype: live:mgg-kayla or Jean-Pierre Skalamera, Email: jp@GlobalPR.agency, Skype: GPR-JP.

Uncategorized

SMS toll fraud is spiking. I learned all about the nuances of deploying – and defending – these insidious attacks in a recent visit with Arkose Labs CEO, Kevin Gosschalk, who explained how the perpetrators victimize businesses that use text messages to validate phone users signing up for a new account.

Related: Countering Putin’s weaponizing of ransomware

The fraudsters set themselves up as “affiliates” of phone companies in Indonesia, Thailand and Vietnam and then use bots to apply for online accounts, en masse, at a targeted business. The con: each text message the business then sends in return —  to validate the applicant — generates a fee for the phone company which it shares with the affiliate.

This fraudulent activity usually remains undetected until the business receives a bill for an unusually high number of text messages sent to seemingly legitimate users.

As a solution, Arkose Labs aims to increase the cost of attacks, making them less profitable for the fraudsters.

Guest expert: Kevin Gosschalk, CEO, Arkose Labs

Their technology detects malicious actions and offers differing levels of challenges, based on a risk threshold. They also provide their customers with threat intelligence that can be used to prevent attackers from profiting. For a full drill down on our discussion, please give the accompanying podcast a listen.

This is one more example of cybercriminals cleverly exploiting the flaws in a convenient business process. It surely won’t be the last. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

San Francisco, Calif., June 29, 2023 — NetWitness, a globally trusted provider of threat detection, investigation, and response technology and incident response services, today announced it is now integrated with AWS AppFabric, a new service from Amazon Web Services (AWS) that quickly connects software as a service (SaaS) applications for better productivity and security.

Integrating security solutions with SaaS apps can be a time-consuming and error-prone task. Each integration requires custom development, deployment, security measures, and ongoing maintenance.

However, AWS AppFabric offers a streamlined solution by providing a standardized “backplane”, with a unified data model for connecting SaaS applications to security solutions. This is designed to simplify the integration process, allows for fast deployment, and provides comprehensive security.

NetWitness recognizes the need to consistently incorporate support for emerging technologies and solutions. NetWitness’ integration with AWS AppFabric can eliminate potential blind spots and facilitate the adoption of valuable business-oriented applications. With AWS AppFabric, customers gain access to a crucial new technology to improve their security observability, and NetWitness is fully prepared to assist them from the very beginning.

Integration with AWS AppFabric offers substantial upside to NetWitness customers. It provides customers with new options for securing their applications on AWS and, with this support, NetWitness empowers security analysts to effectively incorporate SaaS data into their threat detection and response activities and workflows.

Moreover, the simplified and standardized services offered by AWS AppFabric reduce complexity and cost, making it seamless for customers to manage their security solutions. Customers can also utilize their AWS committed spend on NetWitness, maximizing their investments. Lastly, NetWitness’ integration AWS AppFabric serves as a proof point for its crucial role within the cloud security ecosystem, reinforcing its importance and reliability to customers.

Naumann

“Throughout our journey, NetWitness has been at the forefront of expanding visibility into emerging technologies and innovative solutions,” said Ken Naumann, CEO of NetWitness. “As a security tool integrated with AWS AppFabric, we allow our customers to leverage this simplified and standardized approach to secure both new and existing AWS services.”

For more information, visit www.NetWitness.com.

About NetWitness: NetWitness provides comprehensive and highly scalable threat detection and response capabilities for organizations around the world. The NetWitness Platform delivers complete visibility combined with applied threat intelligence and user behavior analytics to detect, prioritize, investigate threats, and automate response. This empowers security analysts to be more efficient and stay ahead of business-impacting threats. For more information, visit netwitness.com.

Uncategorized