Tag Archive for: underscores

Mining firms’ award underscores job security


Hinatuan Mining Corp. (HMC) and Taganito Mining Corp. (TMC) were recently named Regional Winners in the 2021 Search for Outstanding Labor-Management Cooperation Program, the sister firms under Nickel Asia Corp. (NAC) said in a statement.

They are now contenders for the National LMC Competition, the awardees of which will be announced this December.

The award is given by the National Conciliation and Mediation Board (NCMB) for Outstanding Labor-Management Cooperation (LMC) and Grievance Machinery (GM) for Industrial Peace in the regional level.

NAC is the Philippine’s largest producer of lateritic nickel ore and one of the largest in the world. Its operations are multiple winners of the Presidential Mineral Industry Environment Award (PMIEA), the highest recognition for environmental excellence in mining in the country.

NCMB honored HMC and TMC, subsidiaries of NAC, for exemplary dedication, support and determination in sustaining harmonious labor-management relations in the workplace.

Policarpo O. Asilo, President of Hinatuan Mining Labor Union-National Federation of Labor Unions-Kilusang Mayo Uno (HIMLU-NAFLU-KMU), shared the excellent relationship HMC has with its Labor Union. 

“The Union and HMC management maintain a good and harmonious relationship by building trust and respect, with open table discussions in making decisions,” Asilo said.

Pedro D. Urbiztondo, TMC Labor Union president, said the award is “proof of the unity and harmony between management and labor union.”

“Through the LMC, programs and activities, and assistance are extended to employees as well as residents of neighboring communities,” he added 

With the theme “Responsiveness and Resilience in Times of Disruption”, the 2021 Search for Outstanding LMC is a special edition, recognizing organizations that have remained focused and true to the very essence of cooperation and partnership, amidst the COVID-19 pandemic.

This recognition highlights the commitment of NAC’s Human Resources team to job security most especially during crises. 

The outbreak of COVID-19 has had a negative impact in economies and employment across the globe and for a company to be able…

Source…

SolarWinds Hack Underscores Need For ‘Moving To The Cloud’


The massive SolarWinds hack that ensnared Microsoft and thousands of SolarWinds customers underscores the importance of implementing zero trust architecture and migrating to the cloud, according to Microsoft CEO Satya Nadella.

“What SolarWinds shows is the importance … of moving to the cloud,” Nadella told CRN in an exclusive interview before Microsoft was hit by separate attacks on its on-premises Exchange Server. “A lot of the SolarWinds attack surface is because of the trust relationships sometimes that get established between the weak portions of your on-premise infrastructure—where you don’t have the operational security posture … or even when the systems are not patched—and then your cloud, and then you can sort of propagate laterally.”

Microsoft has called the SolarWinds cyberattack, identified in December, “the largest and most sophisticated attack the world has ever seen” from a software engineering perspective. Suspected Russian intelligence attackers injected malicious code into Austin, Texas-based SolarWinds’ Orion network monitoring platform that was downloaded into as many as 18,000 of its customers’ computer networks. That enabled hackers to breach at least nine federal government agencies and 100 private firms.

[RELATED: Microsoft CEO Satya Nadella’s Plan To Unlock ‘Trillions Of Dollars’ In Partner Opportunity]

The hackers used a compromised internal Microsoft account to view source code in certain Microsoft repositories and download some of that code related to Microsoft Azure, Intune and Exchange, according to Microsoft, which spends $1 billion-plus annually on its security. The compromised Microsoft account didn’t have permissions to modify any code or engineering system, and none of the code was altered, Microsoft said. After gaining access to organizations’ on-premises networks, the hackers targeted their federated identity solutions and leveraged ill-gotten privileged access and forged authentication tokens to “move laterally” to Azure Active Directory and Microsoft 365 cloud environments, according to the U.S. Cybersecurity and Infrastructure Security Agency.

“Microsoft technology was not compromised…

Source…

Google Docs phishing attack underscores OAuth security risks

Google has stopped Wednesday’s clever email phishing scheme, but the attack may very well make a comeback.

One security researcher has already managed to replicate it, even as Google is trying to protect users from such attacks.

“It looks exactly like the original spoof,” said Matt Austin, director of security research at Contrast Security.

The phishing scheme — which may have circulated to 1 million Gmail users — is particularly effective because it fooled users with a dummy app that looked like Google Docs.

To read this article in full or to leave a comment, please click here

Network World Security

Potent LastPass exploit underscores the dark side of password managers

(credit: Wikimedia)

Developers of the widely used LastPass password manager are scrambling to fix a serious vulnerability that makes it possible for malicious websites to steal user passcodes and in some cases execute malicious code on computers running the program.

The flaw, which affects the latest version of the LastPass browser extension, was briefly described on Saturday by Tavis Ormandy, a researcher with Google’s Project Zero vulnerability reporting team. When people have the LastPass binary running, the vulnerability allows malicious websites to execute code of their choice. Even when the binary isn’t present, the flaw can be exploited in a way that lets malicious sites steal passwords from the protected LastPass vault. Ormandy said he developed a proof-of-concept exploit and sent it to LastPass officials. Developers now have three months to patch the hole before Project Zero discloses technical details.

“It will take a long time to fix this properly,” Ormandy said. “It’s a major architectural problem. They have 90 days, no need to scramble!”

Read 4 remaining paragraphs | Comments

Technology Lab – Ars Technica