Tag Archive for: join

Sequitur Labs and Lenovo join forces to secure AI models at the edge


Sequitur Labs announced that it has been selected by Lenovo as the technology vendor of choice for protecting edge AI computing applications utilized as part of the Lenovo ThinkEdge SE70 platform.

Sequitur Labs Lenovo

ThinkEdge SE70 is a powerful and flexible AI edge platform for enterprise designed to meet the expanding intelligent transformation needs from logistics, transportation and smart cities to retail, healthcare and manufacturing. The new edge solution from Lenovo is powered by the NVIDIA Jetson Xavier NX system on module. Implementing Sequitur as the security suite better ensures that Lenovo’s SE70 isolates dedicated hardware running AI models and delivering inferences and relevant data — thereby helping to secure AI models at the edge.

“Internet of Things (IoT) deployment is a tremendous market opportunity for both solution providers and enterprises based on the ability of AI solutions at the edge to make decisions to optimize operations and support new strategies,” said Blake Kerrigan, General Manager of ThinkEdge, Lenovo Intelligent Devices Group. “Although these devices offer significant upside, there remains an equally great need to better secure and protect the devices and IP in deployment. That’s why we are committed to work with Sequitur Labs to develop our first appliance designed to better protect AI models at the edge.”

Sequitur Labs’ EmSPARK Security Suite was designed to address solutions in industries where embedded security is paramount, in particular, protection of AI models at the edge. Supporting security functions for encryption, storage, data transmission and key/certificate management are delivered by EmSPARK and housed in a microprocessor’s secure memory partition. IoT hardware manufacturers use EmSPARK to easily implement device-level security by addressing technical, IP, supply chain and business process challenges.

Developers can easily build applications that use security enhanced resources without having to become experts in cryptography and complex chip-level security technologies. Overall, the solution reduces security development and deployment time and investment by 40 to 70 percent, significantly reduces risk, and reduces BOM…

Source…

oil: Ib & Central Cyber Security Agencies Join Probe Into Oil Ransomware Attack | Guwahati News


Dibrugarh: The Intelligence Bureau (IB) and country’s two leading cyber security agencies — Indian Computer Emergency Response Team (CERT-In) and National Critical Information Infrastructure Protection Centre (NCIIPC) — have joined the probe into the ransomware attack on state-run explorer Oil India Limited’s (OIL) headquarters at Duliajan in upper Assam’s Dibrugarh district.
Two representatives from each of these agencies reached Duliajan on Friday to join the probe being conducted by the local police. The anonymous hackers had sought a ransom of $7.5 million from OIL to restore the affected network.
The CERT-In is the national nodal agency that deals with cyber security threats such as hacking and phishing. The NCIIPC is the national nodal agency that handles critical information infrastructure protection. It is a unit of the National Technical Research Organisation under the Prime Minister’s Office.
To add teeth to the probe, the OIL has also separately engaged the services of a Delhi-based private cyber security agency with international exposure.
OIL spokesperson Tridiv Hazarika on Saturday said, “Our production and drilling operations are functioning normally. Our communication network is also not affected as we have an alternate network of computers in place to deal with such kind of emergencies. Most of the data is safe as we were able to isolate the infected servers… we suspect it is the handiwork of international hackers.”

Source…

Lightsense Technology and ICN Group Join Forces to Bring “DrugDetect” to Market


TUCSON, Ariz., Nov. 30, 2021 /PRNewswire/ — Lightsense Technology, a pioneer of developing multi-spectroscopic solutions to address large problems in public health—from the opioid crisis to the pandemic, food safety and quality assurance in the pharmaceutical supply chain, —announced today a new channel partnership to launch its DrugDetect-M1 device for law enforcement organizations into relevant channels in the US.

“We are very excited to partner with Lightsense Technology with an innovative solution for illicit drug detection for law enforcement, and, later, bringing future pathogen detection products to market,” said Robert Danese, CEO of the ICN Group. “DrugDetect-M1 serves as compelling evidence of the power of new light-based detection technology. We are happy to be a part of their efforts.” 

The DrugDetect platform provides a solution that is easy to operate and offers great sensitivity with high levels of accuracy at an inexpensive price point. This platform can help with the difficult opioid epidemic by providing a new tool for law enforcement to tell quickly if a white powdery substance inside a thin plastic bag could be a threat, helping them do their job efficiently and safely.

“We are pleased to team with the ICN group to bring unique, valuable solutions to broader channels within the US,” said Terje Skotheim, Founder & CEO of Lightsense Technology. “This is the beginning of a new and ongoing path to turn our advanced efforts in R&D into solutions into various channels, creating more access to our products, boosting shareholder value and providing better solutions for various problems in public health.”

About Lightsense Technology
Lightsense has developed a groundbreaking multi-spectral technology platform, such as the patented “Enhanced Photodetection Spectroscopy” (EPS), a radical new spectroscopy architecture, for chemical, molecular and pathogen identification. Their advanced miniaturized high-sensitivity spectrometer designs also enable new lightweight and inexpensive handheld devices to support solutions such as for law enforcement organizations, and beyond. These…

Source…

Watering-hole in Hong Kong. US, EU join Paris Call. NSO C-suite turnover. ICS advisories. Rising tensions in Eastern Europe.


Attacks, Threats, and Vulnerabilities

COVID-19: North Korean hackers detected searching for vaccine manufacturing secrets (Sky News) The cyber campaign comes despite the regime in Pyongyang claiming that there are no COVID-19 cases in the country and declining three million vaccine doses from UNICEF.

North Korean hackers target the South’s think tanks through blog posts (ZDNet) Responsibility for new attacks has been laid at the feet of the Kimsuky threat group.

Lazarus hackers target researchers with trojanized IDA Pro (BleepingComputer) A North Korean state-sponsored hacking group known as Lazarus is again trying to hack security researchers, this time with a trojanized pirated version of the popular IDA Pro reverse engineering application.

South Korean Users Targeted with Android Spyware ‘PhoneSpy’ (SecurityWeek) Researchers find Android malware with extensive spyware capabilities, including data theft, GPS monitoring, and audio and video recording.

PhoneSpy: The App-Based Cyberattack Snooping South Korean Citizens (Zimperium Mobile Security Blog) Zimperium has discovered the active malware campaign PhoneSpy, a spyware aimed at South Korean residents with Android devices.

macOS zero-day deployed via Hong Kong pro-democracy news sites (The Record by Recorded Future) A suspected state-sponsored threat actor has used Hong Kong pro-democracy news sites to deploy a macOS zero-day exploit chain that installed a backdoor on visitors’ computers.

Google Caught Hackers Using a Mac Zero-Day Against Hong Kong Users (Vice) “The nature of the activity and targeting is consistent with a government backed actor,” the Google researchers say.

This new Android spyware masquerades as legitimate apps (TechCrunch) The spyware has already ensnared over a thousand victims.

FBI: Iranian threat actor trying to acquire leaked data on US organizations (The Record by Recorded Future) The US Federal Bureau of Investigation says that a threat actor known to be associated with Iran is currently seeking to acquire data from organizations across the globe, including US targets.

PA alleges: NSO Group spyware used to hack foreign ministry workers’ phones (Times of Israel) Palestinian Authority asserts it has proof of…

Source…