ATEN Launches Variants of High Quality Streaming Solutions to Perform Multiple Tasks Smoothly

October 23, 2020

BENGALURU, India – October 23, 2020 – ATEN, the leading provider of AV/IT connectivity and management solutions, recently unveiled the high-quality live streaming solutions UC9040 All-in-one Multi-channel AV Mixer and UC3021, a portable video capture device for mobile and game streaming. The UC9040 is designed to simplify streaming workflow – integrate 1080p video capture, video recorder, video switch, streaming encoder, video converter, video splitter, and audio mixer and CAMLIVE+. It is specially designed for streaming live indoors and outdoors and gives users the most convenient and easy way to stream professional quality videos. Crafted for vlogging, gaming, conferences, education, worship, and any real-time event.

Companies and schools are adopting teleworking, remote classes, and live streaming to prevent a large number of people from gathering at a specific location. ATEN’s products and solutions are used in a variety of ways and serve as a kind of quarantine tool during these pandemic. These high quality products are designed keeping in mind the requirements of professionals in this digital world. Carrying lots of heavy equipment for pro-level mobile livestreaming has always been a pain for video content creators. With its lightweight design and hot shoe adapter, CAMLIVE+ can be mounted on the top of your camera or on any mounting system.” said Shyam Tambatkar at ATEN

CAMLIVE Plus-HDMI to USB-C UVC Video Capture with PD3.0 Power Pass-Through (UC3021)

CAMLIVE Plus UVC video capture (UC3021) is designed for mobile streaming, which delivers unencrypted captured raw data to your USB-C/Thunderbolt 3 laptop or Android phone for post-editing or live-streaming. The 60W USB-C power delivery pass-through can also charge a laptop or Android phone, the power profile includes 5V/9V/15V/20V. HDMI loop-out port features latency-free, hassle-free video preview suitable for gaming streamers with real-time playing experience. Plug and Play allow users to work well on Windows and Mac systems without installing drivers. The resulting video can be further processed in any third-party software – Open Broadcaster Software (OBS), CameraFi, XSplit, Twitch, Youtube, Facebook, etc. Just set up your camera and direct your show anywhere. Additionally, with a camera mount adapter, CAMLIVE Plus can be easily installed on any mounting system. The compact and aesthetic design provides an intuitive, high-quality live streaming/video editing experience. The product comes with one CAMLIVE™+HDMI to USB-C UVC Video Capture with Power Pass-Through, USB-C to USB-A Cable, USB-C to USB-C Cable, Camera Mount Adapter, Warranty Card and a User Instructions. To know more click here

StreamLIVE PRO All-in-one Multi-channel AV Mixer (UC9040)

The StreamLIVE PRO is a portable, all-in-one, multi-channel audio/video mixer device that integrates a 1080p video capture, video recorder, video switch, stream broadcaster, video converter, video splitter, and audio mixer into one compact box. The StreamLIVE PRO provides an intuitive app, making it easy to monitor, edit image layouts, and DVE, PiP or PbP settings. There are eight stunning DVE transitions including circle drop, window slice, polka dot, circle open, fade, heart, cross hatch and random square. The StreamLIVE PRO is PC and software-free, and with its well-designed control panel, it makes livestreaming operations smooth and effortless. It allows users to preview video and monitor audio levels before going live with your web broadcast! To get started, simply connect video/audio sources, and an Ethernet with an ATEN app-installed iPad , and you are ready to roll. Whether one is capturing, editing or streaming, the StreamLIVE PRO with its ergonomic and practical design is flexible enough to fit all independent live streaming broadcasting environments. With a rich feature set, the StreamLIVE PRO addresses the challenges that independent live streaming broadcasters encounter and provides an easy-to-use solution. To know more click here

Price, Availability and Warranty

These products come with a warranty of 3 years and are readily available for purchase through ATEN’s channel of distribution and reseller partners across India.

# # #

About ATEN India

ATEN Advance Pvt. Ltd is the subsidiary of ATEN International Co., Ltd., the leading provider of AV/IT connectivity and management solutions. Offering integrated KVM, Professional Audiovisual, and Intelligent Power solutions, ATEN products connect, manage, and optimize electronics in corporate, government, industrial, educational, and retail environments. ATEN has 579+ issued international patents and a global R&D team that produces a constant stream of innovative solutions, resulting in a comprehensive portfolio of products available worldwide. ATEN recently won the “2019 HR Asia’s best employer Award” (best companies to Work for in Asia 2019) awards.

At the forefront of the seamless integration of A/V with IT, ATEN’s advanced ability to quickly develop customized solutions in KVM, Pro AV, PDU, USB, and data communication lines allows the company to build products that connect, manage, and optimize products based on customer need. ATEN’s comprehensive portfolio of innovative, reliable products is available worldwide, with local India support. For more information, visit www.ATEN.com and follow ATEN India on LinkedIn. Twitter and Facebook.


Tenable Advises Chrome Users to Patch Zero-day-Vulnerability

October 23, 2020

Chrome users could potentially be at risk of arbitrary code execution (ACE) due to an actively exploited zero-day vulnerability. Technical details of the available exploit have not been disclosed yet but ACE flaws could allow an attacker to execute system commands, read, write or even delete files on the victim’s computer, create a backdoor to the system, gain network access or download a malicious program such as ransomware. While ACEs really are an open goal, the damage can be limited from access controls and permissions usually in place. It’s imperative that everyone using Chrome updates to version 86.0.4240.111 to address these high-severity vulnerabilities.

Comment is attributable to Rody Quinlan, Security Response Manager at Tenable:

The zero-day is a memory corruption flaw [CVE-2020-15999] described as a “heap buffer overflow in FreeType.” Successful exploitation of heap buffer overflows could lead to memory leakage which could potentially be used to lead to arbitrary code execution. As the Chrome flaw is being actively exploited in the wild, users are urged to update their browsers as soon as possible to reduce the risk of compromise.

Chrome is not the first browser with an actively exploited zero-day this year. Just over a week into 2020, Mozilla released an advisory for a zero-day vulnerability in Mozilla Firefox, CVE-2019-17026, and later again in April for CVE-2020-6819 and CVE-2020-6820. Mozilla Firefox advised users to upgrade as soon as possible as they were aware of attacks targeting the flaw.

Microsoft also released an out-of-band (OOB) advisory (ADV200001) in January for CVE-2020-0674, a zero-day remote code execution (RCE) vulnerability in Internet Explorer. While an OOB advisory for an RCE vulnerability from Microsoft is enough reason to take note, the advisory also stated that Microsoft was aware of targeted attacks in the wild.

With three of the most commonly used browsers actively targeted this year with zero-days, it is imperative organisations patch their systems as soon as updates are available.”


Ransomware – To Pay or Not to Pay Just Got More Complicated and Public/Private Partnerships May be The Answer

October 22, 2020

By

Homayun Yakub

Senior Security Strategist

Forcepoint

NEW DELHI, India – October 22, 2020

Ransomware can cripple an organization. It often impacts a company’s ability to deliver core services, and can quickly jeopardize the trust customers have placed in them-ultimately impacting their bottom line. Public and private organizations alike are susceptible as attackers continue to evolve their tactics with increasing proficiency and accuracy. The global pandemic’s impact is also felt in this area, as the attack surface has broadened exponentially with organizations moving large portions of their workforce to remote-work status. The news cycle now frequently includes a rise in ransomware incidents suggesting the trend will only continue.

Organizations already dealing with the ramifications of the related economic downturn must now also contend with ransomware as another very real threat. The U.S. Government has also increased their attention on the issue with the Treasury Department releasing guidance on not paying ransoms to any attacker on their sanctions list. As such, doing so may incur civil penalties and fines, which adds yet another dynamic for organizations: whether to even report the incident for fear of government action.

All these increasing challenges have accelerated the need for organizations to formalize their responses, reinforce training/education of their workforces, and re-evaluate their security posture to consider adopting new processes and related technologies to minimize risk exposure. It also serves as an exigent opportunity to foster greater public/private collaboration on how best to stem the tide of ransomware attacks.

Cryptomalware variations

Ransomware has become a name synonymous with cryptomalware. The attacker encrypts data and demands a payment in order to release the data to the victim – they hold your data to ransom. Here the cybercriminal hopes to benefit at the expense of the targeted organization. However, in these scenarios, there will always be a loser. Either the victim loses (their data and their money) with the attacker winning a payday, or the attacker loses when they don’t get paid (note the victim may also lose as well in this situation when their data is encrypted). And meeting hackers’ demands don’t always yield expected results: we’ve seem examples of victims paying the ransom and not getting their data back due to either the decryption routine being faulty or the attacker not honoring the agreement to decrypt the data.

Leakware, also called double-extortion ransomware, is an adaptation of ransomware threatening to leak an organization’s data into the public domain unless a payment is made to the attacker. This creates a scenario between attacker and victim as the victim must still pay an often hefty fee to the attacker in order to prevent the disclosure of their data and all of the brand damage and potential regulatory attention that may entail. The attacker gets paid, but the victim doesn’t have their data lost or leaked. It results in the best of a bad situation for the affected organization – depending on the monetary value of the ransom demand, the ability to afford it, and/or the perceived value of the data. Attackers have recently pivoted attention to leakware knowing that organizations mitigate having to pay the traditional ransomware demand by having good backups in place.

Changing the rules – the risk of sanctions

Organizations consider many factors when deciding to pay a ransom demand. This may include the availability of good backups in order to restore the now locked data, the potential damage to the business’s brand reputation of paying or not paying, the likelihood of the attacker repeating an attack, any regulatory fines that may need to be paid to regulatory bodies, the ability to pay the attacker including the monetary value of the ransomware demand or having a known or reliable mechanism to pay the attacker. Further, an organization may have a SOP in place to handle a ransomware incident, or they may not.

It is clear to see that such a decision tree works in the favor of the attacker.

On October 1, 2020 the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued an Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments. In the explanatory advisory the Department of the Treasury explains that paying the attacker may “encourage future ransomware payment demands but also may risk violating OFAC regulations.” A list of ransomware families and authors is provided upon which the U.S. Department of the Treasury has applied sanctions. This list includes the authors of Cryptolocker, SamSam, WannaCry and Dridex. It is now necessary for organizations considering paying the ransoms to factor in the risk of sanction violations.

Even with the introduction of such sanctions, businesses will go through a calculation based on dollars or cents and weigh the cost of disruption to the business versus the cost of other mitigatory actions. This is when a playbook can be helpful to steer the affected business into well thought-out and anticipated actions. What else can be done to help before or during a ransomware incident?

How to protect yourself from ransomware/leakware

By not adopting a proactive stance, a targeted organization is forced into a zero sum or non-zero sum cryptomalware game by the attacker. If the attacker is successful in engaging, it becomes vital that the targeted organization to retain the upper hand. Here’s a high-level 5-point checklist to help in that regard:

1Create a ransomware incident playbook applicable to your organization, practice it often and refine as appropriate.

2Educate your users to understand how to avoid succumbing to the lures and tricks of cybercriminals.

Adopt solid and proven backup procedures in order to restore data in the event of a cryptomalware incident, including offline backups.

Adopt a data loss prevention program across your organisation so you gain visibility of where your data is and who is interacting with it. As part of your data protection strategy you should consider further steps such as segmentation of data across networks.

Remember that Behavior analytics can help identify anomalous actions within your environment which may be caused by attackers assuming the profile of a privileged user, interacting with files en masse or transferring data en masse.

What else must we do as a collective?

At the beginning of the pandemic, most CISOs focused on maintaining resiliency and minimizing business disruption as they transitioned to a majority remote workforce.. This movement to working from home further exacerbated the situation due to an expanded threat landscape and a reduction in controls normally present in a traditional office environment. The overlay of today’s reality against an economic, health and mental health backdrop has unfortunately created an opportunity for attackers to step up their activities and target remote workers who are attempting to balance work and life demands without otherwise being distracted and therefore susceptible to attacks. Against this backdrop, one thing is clear: in the cybersecurity industry, we’ll all benefit from increased public/private discussion and collaboration to find a better way forward. Now is a time for us work together to operationalize a ransomware approach that protects organizations in such a way that ensures attackers don’t win.


Tenable: NSA publishes list of top vulns targeted by foreign threat actors

October 21, 2020

The National Security Agency (NSA) published a list today of the top 25 vulnerabilities that are consistently being targeted by foreign threat actors. The plethora of publicly accessible systems running unpatched software means that threat actors do not need to finance the development or burn a zero day.

Please find below a comment from Satnam Narang, Staff Research Engineer at Tenable.

If you’re experiencing déjà vu from the National Security Agency (NSA) advisory listing the top 25 vulnerabilities being leveraged by foreign threat actors, your feeling is warranted. Many of the vulnerabilities in the advisory align with similar alerts that have been published by the Cybersecurity and Infrastructure Security Agency (CISA) over the last year.

It’s unmistakably clear that unpatched vulnerabilities remain a valuable tool for cybercriminals and state-sponsored threat actors. With many of the vulnerabilities listed in the advisory residing in remote access tools or external web services, it is extremely critical for organisations to prioritise patching these vulnerabilities.

As CISA noted in their Top 10 Routinely Exploited Vulnerabilities alert from earlier this year, threat actors do not need to finance the development of or acquire zero day vulnerabilities so long as there are a plethora of publicly accessible systems running unpatched software. This is further compounded by the availability of proof of concept code and exploit scripts that threat actors can easily co-opt as part of their own attacks, as we have seen in the case of the Copy Paste Compromises attacks reported by the Australian Cyber Security Centre.”


Tenable Selected as First Vulnerability Management Partner for Splunk Mission Control

October 21, 2020

NEW DELHI, India – October 21, 2020 – Tenable®, Inc., the Cyber Exposure company, today announced it has been selected as the first vulnerability management partner to integrate with Splunk’s new cloud-native, unified security operations platform, Mission Control. Security Operations Center (SOC) analysts will soon be able to gain real-time, data-driven visibility and insight from Tenable.io®, for vulnerability management in the cloud, across their entire digital infrastructure all within a unified SOC workflow.

Digital transformation has accelerated the rapid migration to the cloud. As organizations everywhere continue to embrace cloud-first technologies, new threats and security challenges have emerged for SOCs to overcome. Now more than ever, organizations require holistic visibility across their enterprise cloud environments to better measure, manage and reduce their cyber risk.

Splunk Mission Control enables customers to accelerate the value they receive from combining their Splunk security tools with those from best-of-breed partners, such as Tenable’s industry-leading vulnerability management solutions, on a common, cloud-native work surface. SOC analysts will be able to streamline the investigation and remediation of threats using the industry’s most accurate and comprehensive vulnerability data and coverage from Tenable. Security teams will also be able to take advantage of Tenable’s predictive technologies, such as Predictive Prioritization, to contextualize SOC alerts and triage threats based on business risk. Tenable’s predictive technologies are powered by Exposure.ai, which continuously analyzes 20 trillion aspects of threat, vulnerability and asset information with machine learning algorithms to predict critical exposure points before they can be leveraged in an attack.

When operating in such highly dynamic cloud environments, accuracy matters more than ever. You need confidence in the results of your vulnerability management program so you can determine which security threats warrant immediate action,” said Renaud Deraison, Chief Technology Officer and Co-Founder at Tenable. “Tenable’s latest integration with Splunk Mission Control empowers customers to confidently assess the state of their attack surface based on true business risk, all within a unified SOC workflow.”

Today’s announcement comes on the heels of Tenable’s launch of Frictionless Assessment – a game changer for cloud security that will allow customers to evaluate cloud assets without interruption, quickly detecting new vulnerabilities as their environments change without ever having to schedule a scan or deploy an agent. Frictionless Assessment for AWS will be available to Tenable.io customers later in the fourth quarter of 2020.

To learn more about Tenable and Splunk Mission Control, visit:

# # #

About Tenable

Tenable®, Inc. is the Cyber Exposure Company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com


%d bloggers like this: