Tag Archive for: Share

IRGC Ready to Share Cyberwarfare Experiences with Syria – Politics news


In a meeting with Syrian Defense Minister Ali Mahmoud Abbas, held in Tehran on Tuesday, the IRGC commander underlined the importance of closer military and defense cooperation between Iran and Syria.

Voicing the IRGC’s readiness to assist the Syrian armed forces in various fields, Major General Salami highlighted the need to share experiences in the spheres relating to cyberwarfare, intelligence and information warfare, and electronic warfare.

While the IRGC remains committed to the previous military agreements with Syria, it is prepared to broaden training cooperation with the Syrian armed forces in various sectors, such as the command and staff courses, supreme courses of war strategies, supreme courses for branches, and other expert fields, Salami stated.

The IRGC chief further described the growing cases of insecurity and the recent developments in the territories occupied by the Zionists and in the West Bank, Jenin and Gaza as a sign of the decline of the Zionist regime, adding, “Those who sought to destroy Syria one day with a global onslaught are now on the road to decline and perdition.”

The Syrian defense minister, for his part, expressed gratitude to Iran for supporting his country in the fight against terrorism and Daesh (ISIL or ISIS).

Abbas also noted that the Syrian military forces are going to win the final victory and cleanse the entire Syria of occupiers with the resistance shown by its people and the unwavering support provided by Iran and Hezbollah.

He also emphasized that it is necessary to promote cooperation between Syria and Iran in various military and training sectors in order to stand against and defeat the enemies.

On Monday, Chief of Staff of the Iranian Armed Forces Major General Mohammad Hossein Baqeri called for plans to hold a joint war game with Syria, which he hailed for being at the forefront of supporting Palestine against the Zionist regime.

Source…

TCS Delivers Strong Q3; Rev Crosses $7 bn Propelled by Cloud Demand and Market Share Gains


–          Revenue Growth of +13.5% YoY in CC; 8.4% YoY in USD

–          Growth led by North America & UK (+15.4% YoY in CC)

–          Operating Margin at 24.5%; Net Margin at 18.6%

–          IT Services Attrition trending down: LTM Attrition at 21.3%

–          Board Announces Dividend of `75/share Including Special Dividend of `67/share
 

MUMBAI, January 9, 2023: Tata Consultancy Services (BSE: 532540, NSE: TCS) reported its consolidated financial results according to Ind AS and IFRS, for the quarter ending December 31, 2022.


Highlights of the Quarter Ended December 31, 2022

  • Revenue at 7.075 billion, +8.4% YoY, +13.5% YoY in constant currency
  • Order Book at $7.8 billion | Book to Bill at 1.1
  • Operating Margin at 24.5%; contraction of 0.5% YoY
  • Net Income at $1.318 billion, +1.1% YoY | Net Margin at 18.6%
  • Net Cash from Operations at $1.354 billion ie 102.8% of Net Income
  • Net headcount addition of -2,197 |Workforce strength: 613,974
  • Diverse and inclusive workplace: Women in the workforce: 35.7% | 153 Nationalities
  • Building a G&T workforce: 11.4 million learning hours clocked | 1.3 million competencies acquired
  • LTM IT Services attrition rate at 21.3%
  • Total Dividend per share of `75 per share including `67 as special dividend
    Record date 17/01/2023 | Payment date 03/02/2023
  • Total Shareholder Payout of `33,297crore Year till Date


Rajesh Gopinathan, Chief Executive Officer and Managing Director
, said: “We are pleased with our strong growth in a seasonally weak quarter, driven by cloud services, market share gains through vendor consolidation, and continued momentum in North America and UK. The sustained strength of demand for our services is a validation of the value we provide to our clients in helping them differentiate themselves, while enhancing their competitiveness. Looking ahead, and beyond current uncertainties, our longer-term growth outlook remains robust.”
 

N Ganapathy Subramaniam, Chief Operating Officer and Executive Director, said: “As I look back at 2022, it’s gratifying to see the privileged partnership that we continue to enjoy with our clients globally. In a hybrid working model we delivered many complex…

Source…

MercyOne employees share concerns about paychecks due to ransomware attack


MercyOne said it is addressing payroll issues that stemmed from a cyberattack.A ransomware attack on MercyOne’s former parent company CommonSpirit has taken its payroll software offline. Last week, MercyOne announced that employees would be paid on Oct. 21, but because of the outage, they would be paid their full-time equivalent plus the same amount of overtime hours as their previous paycheck.Because of this, some employees say they are not being paid incentive or overtime hours from that pay period. They said they are concerned about whether they will be paid for these hours.KCCI spoke with a MercyOne nurse who asked to remain anonymous.She said she is concerned about finances as a new month approaches. “Mortgages and rents are due. The closer we get, you know, the smaller our accounts are getting. I think everyone is starting to get a little nervous about it,” the nurse said.The next payday is Nov. 4. MercyOne says all overtime or missed hours will be paid on that day. In a statement to KCCI, MercyOne wrote:”At this time, most hospital-based systems are back online, as well as the payroll platform. CommonSpirit Health has worked to make sure that payroll dates were met and is committed to paying employees for every hour worked.”The nurse KCCI spoke with said employees want and need to trust the company will pay them what is owed. “We do really want to give Mercy the benefit of the doubt and say that they just don’t have all of the information. At least our direct managers are not getting all of the information; because we know it’s not their fault. They’re just giving the information to us as they’re getting it,” the nurse said.

MercyOne said it is addressing payroll issues that stemmed from a cyberattack.

A ransomware attack on MercyOne’s former parent company CommonSpirit has taken its payroll software offline.

Last week, MercyOne announced that employees would be paid on Oct. 21, but because of the outage, they would be paid their full-time equivalent plus the same amount of overtime hours as their previous paycheck.

Because of this, some employees say they are not being paid incentive or overtime hours from that pay…

Source…

Hackers can now sneak malware into the GIFs you share


How low will malware go to get onto your device? We thought using Minecraft to gain access to your computer was the most nefarious method hackers have produced, but there’s a new, even lower type of attack that uses Microsoft Teams and GIFs to mount phishing attacks on your computer.

The new attack is called GIFShell and it installs malware on your computer to steal data. It does so by sneaking itself into innocent-looking GIFs and then waiting for you to share the GIF with your colleagues via Microsoft Teams.

A video call in progress on Microsoft Teams.

The problem was discovered by cybersecurity expert Bobby Rauch, who shared his findings exclusively with Bleeping Computers. This new GIF attack exploits multiple vulnerabilities in Microsoft Teams to create a chain of command executions.

The only thing the attackers need is a way to get into Microsoft Teams in the first place, and they have settled on one of everyone’s favorite web items: GIFs. The attacks include malicious code in base64 encoded GIFs. They then use Microsoft’s own web infrastructure to unpack the commands and install them directly on your computer.

Microsoft Teams is fairly secure and has multiple levels of protection against malicious file sharing. However, GIFs are usually benign, and people love sharing them. They’re the perfect conduit for attacks.

The files can spoof your computer into opening Windows programs such as Excel. It can then send data back to its originator by tricking Windows into connecting to a remote server.

Rauch disclosed his findings to Microsoft in May 2022, but the company has yet to fix the flaws. Microsoft told Bleeping Computers the GIF attacks “do not meet the bar for an urgent security fix.”

The best thing you can do for now is to not open any GIFs someone may share with you on Teams. We’ll keep an eye on this story and let you know when, and if, Microsoft gets around to fixing the vulnerability.

Editors’ Recommendations




Source…