Page 2,320«..1020..2,3192,3202,3212,322..2,3302,340..»

Vaultree’s Executive Team and Advisors Drive Innovation in the Cybersecurity Industry – Yahoo Finance

Encryption Startup Assembles Expert Security Advocates to Guide Company Growth

CORK, Ireland, Nov. 18, 2021 /PRNewswire/ -- Vaultree, provider of Encryption-as-a-Service, announced today that it has assembled a highly qualified roster of executives and advisors comprising some of the cybersecurity industry's most experienced luminaries. This team brings together engineering know-how and business-savvy entrepreneurship to steer Vaultree's direction and growth.

(PRNewsfoto/Vaultree)

The executive team is made up of five co-founders who bring a wealth of varied experience:

Dr. Kevin Curran is a professor of cybersecurity, executive co-director of the Legal Innovation Centre and group leader of the Cyber Security and Web Technologies Research Group at Ulster University. He sits on the Advisory Group of the UK Cyber Security Council and the Northern Ireland Civil Service Cyber Leadership Board (FBBA).

Maxim Dressler is a project and sales leader with international experience in the software and fintech industry in leading commercial and strategic roles. His drive to make his clients' lives easier has contributed to his track record of establishing new brands, opening markets and implementing processes.

Ryan Lasmaili is a commercial and strategic leader with international experience in leading complex projects across different verticals. With 12 years of startup experience, he is an expert in technical product development, market growth strategy and business operations. In the last five years, Ryan's core focus has been on complex cybersecurity and encryption development.

Shaun McBrearty is a software security engineer with over 10 years of experience in designing, implementing, testing and deploying cryptographic solutions. His expertise is developing solutions that overcome the shortcomings of traditional cryptographic algorithms.

Tilo Weigandt is a program manager, strategic tech marketer and business developer with a "nothing is impossible" attitude and more than a decade of experience in starting things from scratch, developing highly scalable tech products, business segments and brands in global markets. Data protection lies at the heart of everything he has been implementing.

These experts comprise Vaultree's Board of Advisors:

Story continues

John N. Stewart Former Cisco chief security & trust officer and "Startup Whisperer," using his 30 years of cybersecurity experience to provide guidance to startups.

Sarah Armstrong-Smith Microsoft's chief security advisor and a keynote speaker on cybersecurity and information protection.

Stav Pischits Co-founder at Cynance and Cyber Club London, and a director of ISACA.

Rik Ferguson Vice president of security research at Trend Micro, special advisor to Europol's Cybercrime Centre, and co-founder of Respect in Security.

David Currie Nubank's chief information security officer with a history of IT leadership roles, including cryptography.

Leticia Gammil Cisco Security channels leader and the founder and president at WOMCY, a non-profit focused on the development of cybersecurity.

Andreas Bittner Managing director at Vanguard and a co-founder and COO of Solaris Bank.

Rik Ferguson, Vaultree advisor and vice president of security research at Trend Micro, said: "The world of cybercrime and the lack of accessible and affordable data encryption continues to be a threat to businesses around the globe. During my 27 years of experience in information security, I have yet to see a solution that offers a fully encrypted, searchable and scalable solution like Vaultree's, which is why I am working with this team of experts."

Shaun McBrearty, co-founder, Vaultree, said: "Cybercrime rates are climbing every year, proving a need for a new generation of data protection. This is why we made it our mission to create an encryption-as-a-service software that provides a scalable, easy-to-use solution to protect business data and make data protection attainable for enterprises of any size. We are grateful to be working with a seasoned team of experts as we chart our growth course."

About VaultreeVaultree's Encryption-as-a-Service solution enables businesses of all sizes to process fully end-to-end encrypted data. Easy to use and integrate, Vaultree delivers peak performance without compromising security, neutralizing the weak spots of traditional encryption. Follow Vaultree on Twitter @Vaultree or LinkedIn. Visit http://www.vaultree.com and join our waitlist to stay up to date on product development and company news.

Media Contact Madison DailyNadel Phelan, Inc. madison.daily@nadelphelan.com

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/vaultrees-executive-team-and-advisors-drive-innovation-in-the-cybersecurity-industry-301427750.html

SOURCE Vaultree

Read more:
Vaultree's Executive Team and Advisors Drive Innovation in the Cybersecurity Industry - Yahoo Finance

Read More..

Google Cloud partially fixes load balancer SNAFU that hit Discord, Spotify, others today – The Register

Updated Google Cloud suffered a brief outage, seemingly bringing down or disrupting a whole bunch of websites relying on its systems.

If you've had trouble accessing Snapchat, Discord, Spotify, Etsy, retailers like Home Depot, and others today, this is likely why: a fault developed in Google Cloud's networking infrastructure, resulting in websites throwing up 404 errors. Netizens found themselves unable to log into or use certain services properly.

The good news is that, by now, the IT breakdown has been resolved in that sites using Google's cloud-based load balancers should work again.

The bad news is that Google's customers can't update their load balancing configurations until the web giant gives the word, and when that will be isn't known.

The outage was acknowledged by Google at 1010 PST (1810 UTC), about 35 minutes minutes after websites apparently started going wrong, and a fix was deployed within a few minutes to stop the "page not found" errors. Since that update, though, changes by customers to their external proxy load balancers are being ignored.

According to the tech titan's status page:

The load-balancing blunder had a knock-on effect of temporarily disrupting Google Cloud's App Engine, Cloud Functions, Apigee, and Cloud Run services.

We'll let you know when Google considers this situation fully restored.

"The issue with Cloud Networking has been resolved for all affected projects as of Tuesday, 2021-11-16 11:28 US/Pacific," Google said on its status page, noting the issue has been fully fixed.

"Customer impact from 10:10 to 11:28 US/Pacific was configuration changes to External Proxy Load Balancers not taking effect. As of 11:28 US/Pacific configuration pushes resumed."

Read more:
Google Cloud partially fixes load balancer SNAFU that hit Discord, Spotify, others today - The Register

Read More..

TI will splash out up to $30B on wafer fabs – The Register

Everything's bigger and better in Texas, as the saying goes. Texas Instruments (TI) has announced it's fixin' to build two silicon wafer fabrication plants there and maybe another pair after that.

The venerable company will soon break ground on a pair of new 300mm semiconductor wafer fabs in Sherman, in the northeast of the Lone Star State. The site is apparently large enough to host four such facilities. If TI builds 'em all, it expects to spend $30 billion on the project.

Work will commence in 2022, and production is predicted to commence in 2025 if all goes well.

The company's not discussed the particulars of the products it proposes to produce in the facilities, but did state it sees "industrial and automotive markets" as hot markets.

TI has another 300mm wafer fab already under construction in Richardson, Texas, and expects it will start producing product in the second half of 2022. Another facility in Utah will get to work in early 2023. They'll join two existing 300mm facilities that TI already operates. `

It is unclear if TI plans to sell the new facilities' output as bare wafers, or combine its die services, or both.

Whatever the firm chooses, the new fabs will be welcomed by a great many companies further up the semiconductor value chain. Even if current supply problems have eased by the time the factories come online, increasing numbers of products rely on electronic innards.

TI's forthcoming fabs seem set to be joined by facilities owned by Samsung, according to Korean media reports that point out the Chaebol has active regulatory paperwork pending only in the city of Taylor, deep in the heart of Texas. Intel has also committed to building new facilities in Arizona.

Read the original:
TI will splash out up to $30B on wafer fabs - The Register

Read More..

Ubuntu desktop team teases ‘proof of concept’ systemd on Windows Subsystem for Linux – The Register

Canonical may be working on introducing systemd to Ubuntu on Windows Subsystem for Linux (WSL), according to a post by Ubuntu Desktop Team Technical Leader Didier Roche.

Roche's remarks were posted on the Ubuntu Desktop Team Updates two days ago. "PoC of systemd on WSL at startup of an instance," he said, raising hopes (or fears) that the component will be introduced in a future WSL 2 update. The remark was first spotted by Phoronix.

Systemd manages services and other system software on Linux, and is widely used by the most popular distributions, such as Debian, Ubuntu, SUSE, and the Red Hat family. The original WSL did not support systemd for technical reasons, starting with the fact it had its own init process.

When WSL 2 was introduced, with a new container-based model for running Linux on Windows, supporting systemd seemed feasible (Linux distros running on Micrsoft's Hyper-V hypervisor have no problem with it) but Microsoft continued with its own init presumably for reasons related to the integration between WSL and the rest of Windows.

WSL 2 users though have frequently requested systemd support. The reasons are many and varied, but the lack of systemd does introduce friction for users familiar with other distros that include it. Canonical's Snap packaging system depends on systemd, and since Canonical regards Snap as the future of application deployment one can understand why the company is keen to have it supported in WSL, particularly now that GUI Linux applications are supported in Windows 11.

Another problem is that users do not always realise that commands they use like systemctl for managing services are actually part of systemd. As far as some are concerned, this is a bug in WSL 2, in this case because an attempt to start the SSH daemon gave the error, "System has not been booted with systemd as init system (PID 1). Can't operate. Failed to connect to bus: Host is down."

There are a number of workarounds to enable systemd on WSL 2 but an official solution would still be welcome.

It is important that systemd does not only run, but runs as PID 1, the first process in the operating system. A developer has come up with a project called genie to ensure this happens.

Then there's Distrod, which is described as "a systemd-based meta-distro for WSL2 that allows you to install Ubuntu, Arch Linux, Gentoo and many other distros with systemd in a minute, or make your current distro run systemd." We note such solutions are unofficial.

Here's Distrod, one of several unofficial solutions for systemd on Windows Subsystem for Linux 2

Both projects work by introducing another container. Distrod, for example, "is a binary that creates a simple container that runs systemd as an init process, and starts your WSL sessions within that container." According to its author, even WSLg, for GUI desktop application support, works with Distrod. Genie, so called because it creates a systemd "bottle," also works with WSLg but the docs state that "Linux GUI apps started from the Windows Start Menu items created by WSLg will run outside the bottle."

Canonical is not Microsoft, of course, but has worked closely with the WSL team. There is little doubt that systemd in WSL 2 is a desirable feature for various users, at least as an option, so we will be watching progress with interest.

Read the rest here:
Ubuntu desktop team teases 'proof of concept' systemd on Windows Subsystem for Linux - The Register

Read More..

Intel audio drivers give Windows 11 the blues and Microsoft Installer borked following security update – The Register

Windows 11 has continued to notch up known issues as Microsoft admitted to problems in the Intel Smart Sound department and Microsoft Installer following a security update.

The former turned up earlier this week, when Microsoft realised that "certain versions" of drivers for Intel Smart Sound Technology (SST) could tip Windows 11 into a blue screen (of death). The driver involved is IntcAudioBus.sys and file versions 10.29.0.5152 and earlier or 10.30.0.5152 and earlier are affected.

The workaround is, unsurprisingly, to get an updated driver from one's OEM. 10.30.00.5714 and later or 10.29.00.5714 and later should do it, according to Microsoft. Slightly confusingly, "for addressing this issue, 10.30.x versions are not newer than 10.29.x versions." The key bit is the last of the version number.

While a compatibility block was flung up to prevent any more users with sound drivers not to Windows 11's taste updating the OS, others optimistically applying the company's security patches may not have been so lucky.

KB5007215 was dispensed to the faithful on 9 November and, as well as noting problems with connecting to print servers in the patch's known issues, yesterday Microsoft had to add one of its side effects to the Windows release health dashboard. In this case the Microsoft Installer has been left unwell following the update (or its later siblings) and could "have issues repairing or updating apps."

One of the affected apps is part of Kaspersky's Endpoint Security 11 for Windows. Kaspersky noted that while its app would remain functioning correctly, problems might happen when updating or changing the scope of the application.

Kaspersky's recommendation is to temporarily hold off from the update (Microsoft said it is "working on a resolution and will provide a new update in an upcoming release"). Otherwise the mitigation appears to be an uninstall and reinstall of the afflicted application.

Very much the software equivalent of turning it off and on again. Even in 2021, the old ways remain the best, it seems.

See the rest here:
Intel audio drivers give Windows 11 the blues and Microsoft Installer borked following security update - The Register

Read More..

Netlify acquires OneGraph: One API to rule them all? – The Register

Interview Netlify has acquired OneGraph, which provides a GraphQL API that wraps the APIs of third-party services, as well as launching a new Jamstack innovation fund for startups.

Jamstack is an architectural approach for web applications where static web pages retrieve dynamic content by calling APIs, hence "JavaScript, APIs and Markup." A web server is not required and Jamstack sites are amenable to acceleration via a content delivery network (CDN), but server-side logic still exists, in the APIs that are called, and these become the potential bottleneck.

"The Jamstack and the architectural approach behind that has really changed the direction of the modern web, and this move towards decoupling the web UI layer from the back end infrastructure layer and splitting up all these different APIs and services is an architectural tendency that's only getting stronger," Matt Biilmann, Netlify CEO and co-founder, tells The Register.

Chris Bach, also a Netlify co-founder and now its chief strategy & creative officer, says Jamstack is "a much better way to build the web. It's scalable, it's more performant, it's faster to iterate on, it's more compatible, the workflow is way safer."

Netlify is a hosting company for Jamstack applications built with React, Next.js, Angular, Vue.js, Gatsby, and other frameworks. The company packages build services, serverless functions (which run on AWS Lambda), and a CDN for deployment.

The company has now acquired OneGraph, whose goal is "to put all of the internet's APIs under a single GraphQL endpoint."

The service will not be integrated immediately, but there is an initial beta launch of API authentication with Stripe, Spotify, GitHub, and Salesforce, creating an authentication token that can be used with Netlify serverless functions. However, this only does authentication and does not wrap the third-party API. A limitation of the beta is that "you can only log in with your own credentials and can't proxy site visitor credentials," making it of limited use in many scenarios.

Netlify API authentication, the first piece of OneGraph integration

Future plans are more comprehensive. "What if we could put all the world's APIs and services behind one GraphQL endpoint," Biilmann says, to give teams "one framework for how to talk to them, how to authenticate with them, and how to build with them."

The reality is that it is early days, and much will depend on third-party support for OneGraph. "It will be important that we can allow external providers to plug into our platform and extend it," Biilmann adds, "to live up to its full potential."

The big cloud providers are also offering Jamstack platforms, such as AWS Amplify and Azure Static Apps, so the space is getting more competition.

What if we could put all the world's APIs and services behind one GraphQL endpoint?

The company says it's also rolled out a new $10m Jamstack Innovation Fund, which offers startups up to $100,000. What are the missing pieces in the Jamstack ecosystem that this may help address? "We're seeing the API-ification of everything," Biilmann says. "Content has moved to headless solutions, and now we're seeing the same thing happening for commerce across a lot of different sectors so we want to see a very broad ecosystem emerging."

The company has scored one major win recently: Twilio has migrated its developer console to Jamstack and Netlify, claiming faster deployment cycles, from once a week to 10 to 15 times per day, and much faster render times.

What about enterprise development? Front-end developers find a GraphQL API easy to work with, Biilmann says, but "for back-end teams building APIs and services, we're seeing that exposing them as GraphQL services tends to be harder." This challenge is one of the things new startups may help address, he adds.

Jamstack, according to Biilmann, is the web fighting back against proprietary platforms. "The web is an unique platform in not being owned by a single company. We're investing in this to see the web become a better platform, to make sure that as new devices and new delivery landscapes like metaverse arrive, that the web is still the best way to build and operate your applications."

That said, the curious thing is that Netlify sees itself as a kind of platform of platforms, which is in part proprietary. Bach tells The Reg that "Netlify has become this aggregator of all these big interesting projects." Is that in itself a proprietary layer?

Answering a question about open source, Biilmann says that "the layer of the stack we are building, the full infrastructure automation and workflow layer, that's inherently a layer where to build that as a proprietary platform makes sense, because it's a globally distributed platform requiring a lot of operations and maintenance and vigilance.

"All the tooling around that, even stuff like our build plugins, framework and so on, we make that available to everyone as open source I don't think developers want to work with proprietary frameworks and libraries."

More here:
Netlify acquires OneGraph: One API to rule them all? - The Register

Read More..

Thousands of Firefox users accidentally commit login cookies on GitHub – The Register

Thousands of Firefox cookie databases containing sensitive data are available on request from GitHub repositories, data potentially usable for hijacking authenticated sessions.

These cookies.sqlite databases normally reside in the Firefox profiles folder. They're used to store cookies between browsing sessions. And they're findable by searching GitHub with specific query parameters, what's known as a search "dork."

Aidan Marlin, a security engineer at London-based rail travel service Trainline, alerted The Register to the public availability of these files after reporting his findings through HackerOne and being told by a GitHub representative that "credentials exposed by our users are not in scope for our Bug Bounty program."

Marlin then asked whether he could make his findings public and was told he's free to do so.

"I'm frustrated that GitHub isn't taking its users' security and privacy seriously," Marlin told The Register in an email. "The least it could do is prevent results coming up for this GitHub dork. If the individuals who uploaded these cookie databases were made aware of what they'd done, they'd s*** their pants."

Marlin acknowledges that affected GitHub users deserve some blame for failing to prevent their cookies.sqlite databases from being included when they committed code and pushed it to their public repositories. "But there are nearly 4.5k hits for this dork, so I think GitHub has a duty of care as well," he said, adding that he's alerted the UK Information Commissioner's Office because personal information is at stake.

Marlin speculates that the oversight is a consequence of committing code from one's Linux home directory. "I imagine in most of the cases, the individuals aren't aware that they've uploaded their cookie databases," he explained. "A common reason users do this is for a common environment across multiple machines."

GitHub dorks are not new, but they often only affect a single service, like AWS, Marlin said. This particular gaffe is troubling because it could allow an attacker to access any internet-facing website to which the GitHub user was authenticated at the time the cookie files were committed. He added that dorks for other browsers can probably also be found.

Exploitation, Marlin said, would be very easy. It's just a matter of creating a new Firefox profile on your local machine and then downloading the cookies.sqlite file and placing it within the Firefox profile folder. "You'll be authenticated on any services which the user was logged in on when they committed the database," explained Marlin.

There's a theoretical complication. Firefox offers an option to protect logins and passwords. But as far as we can tell, that doesn't apply to the cookies.sqlite file. The Register was able to examine multiple Firefox cookie databases with Marlin's guidance.

When the visibility of cookies came up five years ago as a Firefox macOS bug submission, it was closed.

And even if the cookies.sqlite file were protected by a database-specific password, it probably wouldn't offer much protection: Various open source projects offer the ability to crack .sqlite files, and there are commercial offerings of this sort too.

To underscore the seriousness of exposing these databases, consider this recently described Android PoC exploit of CVE-202015647, used to exfiltrate the Firefox cookies database.

Mozilla confirmed Marlin's claims about the risk of exposing these files in an email to The Register on Thursday.

"Protecting the privacy of internet users is at the core of Mozillas work," a Mozilla spokesperson said. "When using code hosting services, we encourage users to use caution when considering the sharing of private data directly on public websites. When choosing to backup sensitive Firefox profile data, Mozilla recommends Firefox Sync, which encrypts and safely stores files within Firefox servers."

One mitigating factor at least is that sessions and associated cookies tend to expire relatively quickly.

There's precedent for GitHub to take action to help those who have been unwittingly publishing their cookie databases. The social code biz has been scanning for exposed credentials in repos since 2015 and now scans for more than 70 different types of secrets. Here's one more to add to the list.

GitHub did not respond to a request for comment.

See the original post:
Thousands of Firefox users accidentally commit login cookies on GitHub - The Register

Read More..

Boffins find way to use a standard smartphone to find hidden spy cams – The Register

Recent model smartphones can be smarter still about finding hidden cameras in their vicinity, if they take advantage of time-of-flight (ToF) sensors.

ToF is a measurement technique that relies on reflected light to quickly determine the distance of objects. ToF sensors are used in LIDAR (light detection and ranging) systems and in other applications that utilize SLAM (simultaneous localization and mapping) algorithms, all of which involve the analysis of the visible and near-visible spectrum.

These sensors have started showing up in smartphones recently Apple's iPhone 12 and 13, and Samsung's Galaxy S20+, among others, include a laser-based Sony ToF sensor for augmented reality applications and adding depth information to 2D imagery.

Now, four researchers based in Singapore and South Korea have another application in mind: They see ToF sensors as a way to spot concealed cameras.

Sriram Sami, Bangjie Sun, and Sean Rui Xiang Tan, from National University of Singapore, and Jun Han from Yonsei University, describe how this might be done in a paper [PDF] titled "LAPD: Hidden Spy Camera Detection using Smartphone Time-of-Flight Sensors".

Their research was presented at the 19th ACM Conference on Embedded Networked Sensor Systems earlier this week. You can see the pitch below.

Youtube Video

LAPD in this context has nothing to do with the Los Angeles Police Department, a likely association at least for US readers reared on Hollywood police procedurals. Rather, it stands for Laser-Assisted Photography Detection a technique for ferreting out tiny concealed lenses by checking for unusually intense reflections in the scanned area.

Surreptitious spying with hidden cameras has become a global concern, according to the boffins.

"Tiny hidden spy cameras placed in sensitive locations such as hotel rooms and lavatories are increasingly a threat to individual privacy globally," the research paper explains. "For example, in South Korea alone, there were over 6,800 such reported cases in a single year."

Salacious snooping has become a particular issue for users of services like AirBnB, where the platform operator doesn't control room providers or guarantee trustworthiness.

There are dedicated signal detection devices for finding hidden cameras and other electronics like the CC308+ and the K18, to say nothing of what can be done with open source Wi-Fi analysis software.

But the researchers contend these can be difficult to use correctly. What's more, smartphones are commonplace these days, so adding an app like LAPD is likely to be more convenient than carrying a dedicated bug or signal detector at all times. LAPD's goal is to be accessible, usable, and accurate, and to judge by the results reported in the paper, it hits those marks.

"From our comprehensive experiments, LAPD achieves an 88.9 per cent hidden camera detection rate, compared to just using the naked eye which yields only a 46.0 per cent hidden camera detection rate," the paper reads.

The dedicated K18 signal detector managed detection rates of 62.3 per cent and 57.7 per cent using its continuous and blinking methods respectively.

And boffins' LAPD method produced the lowest overall false positive rate (16.67 per cent), compared to the two K18 modes (26.9 per cent and 35.2 per cent) and to the naked eye (54.9 per cent). The technique's strong results follow from its use of a deep learning filter that's been trained to remove false positives.

Sriram Sami, one of the researchers, told The Register in an email that he feels this project is a way to address what he described as asymmetric warfare.

"The 'attackers' have all the power to place hidden cameras anywhere, and the public is, in contrast, generally defenseless," he explained. "That's why we're doing this work, and why we hope hidden camera detection can become more commonplace."

Sami said he intends to release the source code for LAPD but has to coordinate that with his colleagues.

The rest is here:
Boffins find way to use a standard smartphone to find hidden spy cams - The Register

Read More..

America, when you’re done hitting us with the ban hammer, see these on-prem Zoom vulns, says Positive – The Register

US-sanctioned Positive Technologies has pointed out three vulnerabilities in Zoom that can be exploited to crash or hijack on-prem instances of the videoconferencing system.

One of the trio of bugs is an input validation flaw, which can be abused by a malicious Zoom portal administrator to inject and execute arbitrary commands on the machine hosting the software. We imagine a scenario in which someone in, say, HR is made an admin of the company Zoom installation, and their work PC is hijacked by a miscreant who then exploits this vulnerability to get a foothold on an internal server system, and go exploring from there.

The vulnerability, tracked as CVE-2021-34414, was patched in September.

"You can often encounter vulnerabilities of this class in apps to which server administration tasks have been delegated," Positive Technologies researcher Egor Dimitrenko said of the vuln.

"This vulnerability always leads to critical consequences and, in most instances, it results in intruders gaining full control over the corporate network infrastructure."

Zoom offers an on-premise option for enterprises and one of its main advantages, said the company in marketing literature, is that meeting traffic (but not user metadata) stays within the host org's private cloud. Its three components are the On-Premise Meeting Connector, Virtual Room Connector, and Recording Connector.

Dimitrenko and his Positive Technologies comrades were able, so they said, to exploit improper input validation in the on-prem component of Zoom to obtain server-level access. Two related holes, CVE-2021-34415 and CVE-2021-34416, could be exploited to crash Zoom.

The vulns affected:

If your org has an on-prem Zoom deployment, now is a good time to check its update status.

Zoom spokesman Matt Nagel told The Register: "Zoom takes the security of its platform very seriously, and has addressed these issues. We recommend users stay up to date with the latest version of Zoom to take advantage of our newest features and security updates."

Positive Technologies is a Russian infosec company that was repeatedly targeted by the US government for sanctions this year. In April the firm was accused of helping recruit people into Russian state hacking agencies, while earlier this month Positive joined Israeli spyware vendor NSO Group on the US State Department's Entity List, a naughty step for firms banned from conducting financial transactions with American companies.

This doesn't appear to have slowed the outfit's enthusiasm for security research: when the sanctions were initially slapped on it, Positive described them as "groundless accusations," making comparisons with US attitudes to Chinese tech vendor Huawei.

In October Positive did the world a genuine favor by revealing a vulnerability in ancient shareware file compression utility WinRAR, still used today by those who rely on the .rar format.

See the rest here:
America, when you're done hitting us with the ban hammer, see these on-prem Zoom vulns, says Positive - The Register

Read More..

Everything but the catch: ’90s pop act or a successful mission for Rocket Lab? – The Register

Rounding out a successful launch this morning, Rocket Lab has made good on CEO Peter Beck's promise to do pretty much everything bar catching the returning Electron booster in the company's recovery efforts.

An awful lot was riding on the mission, which placed a pair of BlackSky satellites into orbit and was dubbed "Love at first Insight." It was the second launch since a BlackSky payload was lost on May's "Running Out Of Toes" mission after a second-stage failure. In total, Rocket Lab has launched 22 Electrons and lost three (including the first, a test mission named "It's a Test").

Rocket Lab has been iterating its recovery plans; despite the failure of "Running Out Of Toes", the first stage managed a soft ocean landing by parachute. It is also almost a year since the first ocean landing as part of the "Return To Sender" mission.

The eventual goal is to snag an Electron booster by helicopter as it descends, something ebullient Rocket Lab boss Beck told us was "not that hard" ahead of the launch.

The success of this morning's efforts means that a recovery attempt is not far off.

As for the launch itself, which was from Rocket Lab's Launch Complex 1 on New Zealand's Mahia Peninsula at 01:38 UTC this morning, the Electron delivered the two Earth-Imaging satellites to a 430km orbit. The first stage then returned to Earth, descending to the ocean by parachute while being tracked by the recovery helicopter.

Unlike the propulsive antics of SpaceX's Falcon 9, the comparatively diminutive Electron will require aerial capture. The plan is then to refurbish the booster and refly it, further bringing down costs for the small-satellite launcher.

The next Electron launch (another BlackSky mission) is set for December, however, that recovery attempt will have to wait until 2022. As Beck observed: "We are all excited to move onto the next phase of reusability next year: catching Electron in the air with a helicopter."

Go here to read the rest:
Everything but the catch: '90s pop act or a successful mission for Rocket Lab? - The Register

Read More..