out

ETSI IPv6 White Paper outlines best practices, challenges, benefits and the way forward

Sophia Antipolis, 26 August 2020

The ETSI IP6 Industry Specification Group has just released a White Paper on the lessons learned from IPv6 best practices, use cases, benefits and deployment challenges. This White Paper puts forward recommendations to ease the adoption of IPv6 and to motivate the industry for the upcoming large-scale deployment of IoT, 4G/5G, IoT Cloud Computing benefiting from the restoration of the end to-end model.

Read More...




out

ETSI unveils 2021 Fellows rewarding outstanding personal contribution

ETSI unveils 2021 Fellows rewarding outstanding personal contribution.

Sophia Antipolis, 22 April 2021

ETSI is pleased to unveil its 2021 ETSI Fellows. The Award committee composed of the GA Chair and Vice-Chairs, the Board Chair and the ETSI Director-General, nominated Dr. Gabrielle Owen, Mr. Charles Brookson, Ms. Nurit Sprecher, Dr.- Ing.Hans Wilhelm Gierlich and Dr. Jamshid Khun-Jush and  Mr. Anthony Wiles as ETSI fellows for their outstanding personal contribution to ETSI.

Read More...




out

ETSI unveils 2022 Fellows rewarding outstanding personal contribution

ETSI unveils 2022 Fellows rewarding outstanding personal contribution

Sophia Antipolis, 6 April 2022

ETSI is pleased to unveil its 2022 ETSI Fellows. The Award committee, composed of the GA Chair and Vice-Chairs, the Board Chair and the ETSI Director-General, unanimously nominated Dr. Diego López, Dr. Günter Kleindl, Mr. Larry Taylor and Mr. Lindsay Cornell as ETSI Fellows for their outstanding personal contributions to the organization.

Read More...




out

ETSI unveils 2024 Fellows rewarding outstanding personal contribution

Sophia Antipolis, 18 April 2024

ETSI is pleased to unveil its 2024 ETSI Fellows who were announced at the 83rd ETSI General Assembly on 16 April 2024.
The Award Committee, composed of the GA Chair and Vice-Chairs, the Board Chair and the ETSI Director-General, unanimously named Dr. Howard Benn, Mr. Philippe Magneron, Dr. Matthias Schneider, Mrs. Isabelle Valet Harper and Mr. Dirk Weiler, as ETSI Fellows 2024 for their outstanding personal contributions to the organization.

Read More...




out

MAA South Korea: Annual Networking Event

Starts: Sat, 23 Nov 2024 18:30:00 -0500
11/23/2024 06:30:00PM
Location: Seoul, Korea (south)




out

Los Angeles Holiday Party - Smoked Meat & Poutine Brunch

Starts: Sat, 07 Dec 2024 13:30:00 -0500
12/07/2024 11:30:00AM
Location: Los Angeles, U. S. A.




out

Civil War: The Southern Perspective

The Civil War began with a largely symbolic battle at Fort Sumter, a battle in which the only fatality was a (southern) horse.




out

CVE-2024-47575: Frequently Asked Questions About FortiJump Zero-Day in FortiManager and FortiManager Cloud

Frequently asked questions about a zero-day vulnerability in Fortinet’s FortiManager that has reportedly been exploited in the wild.

Background

The Tenable Security Response Team (SRT) has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a zero-day vulnerability in Fortinet’s FortiManager.

Update October 23: The blog has been updated with new information about in-the-wild exploitation and threat actor activity associated with this vulnerability.

View Change Log

FAQ

What is FortiJump?

FortiJump is a name given to a zero-day vulnerability in the FortiGate-FortiManager (FGFM) protocol in Fortinet’s FortiManager and FortiManager Cloud. It was named by security researcher Kevin Beaumont in a blog post on October 22. Beaumont also created a logo for FortiJump.

What are the vulnerabilities associated with FortiJump?

On October 23, Fortinet published an advisory (FG-IR-24-423) for FortiJump, assigning a CVE identifier for the flaw.

CVEDescriptionCVSSv3
CVE-2024-47575FortiManager Missing authentication in fgfmsd Vulnerability9.8

What is CVE-2024-47575?

CVE-2024-47575 is a missing authentication vulnerability in the FortiGate to FortiManager (FGFM) daemon (fgfmsd) in FortiManager and FortiManager Cloud.

How severe is CVE-2024-47575?

Exploitation of FortiJump could allow an unauthenticated, remote attacker using a valid FortiGate certificate to register unauthorized devices in FortiManager. Successful exploitation would grant the attacker the ability to view and modify files, such as configuration files, to obtain sensitive information, as well as the ability to manage other devices.

Obtaining a certificate from a FortiGate device is relatively easy:

Comment
by from discussion
infortinet

 

According to results from Shodan, there are nearly 60,000 FortiManager devices that are internet-facing, including over 13,000 in the United States, over 5,800 in China, nearly 3,000 in Brazil and 2,300 in India:

When was FortiJump first disclosed?

There were reports on Reddit that Fortinet proactively notified customers using FortiManager about the flaw ahead of the release of patches, though some customers say they never received any notifications. Beaumont posted a warning to Mastodon on October 13:

 

Was this exploited as a zero-day?

Yes, according to both Beaumont and Fortinet, FortiJump has been exploited in the wild as a zero-day. Additionally, Google Mandiant published a blog post on October 23 highlighting its collaborative investigation with Fortinet into the “mass exploitation” of this zero-day vulnerability. According to Google Mandiant, they’ve discovered over 50 plus “potentially compromised FortiManager devices in various industries.”

Which threat actors are exploiting FortiJump?

Google Mandiant attributed exploitation activity to a new threat cluster called UNC5820, adding that the cluster has been observed exploiting the flaw since “as early as June 27, 2024.”

Is there a proof-of-concept (PoC) available for this vulnerability/these vulnerabilities?

As of October 23, there are no public proof-of-concept exploits available for FortiJump.

Are patches or mitigations available for FortiJump?

The following table contains a list of affected products, versions and fixed versions.

Affected ProductAffected VersionsFixed Version
FortiManager 6.26.2.0 through 6.2.12Upgrade to 6.2.13 or above
FortiManager 6.46.4.0 through 6.4.14Upgrade to 6.4.15 or above
FortiManager 7.07.0.0 through 7.0.12Upgrade to 7.0.13 or above
FortiManager 7.27.2.0 through 7.2.7Upgrade to 7.2.8 or above
FortiManager 7.47.4.0 through 7.4.4Upgrade to 7.4.5 or above
FortiManager 7.67.6.0Upgrade to 7.6.1 or above
FortiManager Cloud 6.46.4 all versionsMigrate to a fixed release
FortiManager Cloud 7.07.0.1 through 7.0.12Upgrade to 7.0.13 or above
FortiManager Cloud 7.27.2.1 through 7.2.7Upgrade to 7.2.8 or above
FortiManager Cloud 7.47.4.1 through 7.4.4Upgrade to 7.4.5 or above
FortiManager Cloud 7.6Not affectedNot Applicable

Fortinet’s advisory provides workarounds for specific impacted versions if patching is not feasible. These include blocking unknown devices from attempting to register to FortiManager, creating IP allow lists of approved FortiGate devices that can connect to FortiManager and the creation of custom certificates. Generally speaking, it is advised to ensure FGFM is not internet-facing.

Has Tenable released any product coverage for these vulnerabilities?

A list of Tenable plugins for this vulnerability can be found on the individual CVE page for CVE-2024-47575 as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.

Get more information

Change Log

Update October 23: The blog has been updated with new information about in-the-wild exploitation and threat actor activity associated with this vulnerability.

Join Tenable's Security Response Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.




out

Social Media for Science Outreach – A Case Study: Career changing and pseudonyms

To tie in with this month’s SoNYC birthday celebrations, we are hosting a collection of case




out

Social Media for Science Outreach – A Case Study: Marine Science & Conservation Outreach

A twitter TeachIn about marine protected areas, hosted by @RJ_Dunlap on 4/8/2013




out

Social Media for Science Outreach – A Case Study: The Beagle Project, Galapagos Live & ISS Wave

Selected responses categorized into 'helped', 'helped and harmed' and 'harmed'.




out

Social Media for Science Outreach – A Case Study: AntarcticGlaciers.org

To tie in with this month’s SoNYC birthday celebrations, we are hosting a collection of case




out

Social Media for Science Outreach – A Case Study: Chemicals Are Your Friends

To tie in with this month’s SoNYC birthday celebrations, we are hosting a collection of case




out

Social Media for Science Outreach – A Case Study: National Science Foundation-funded IGERT project team

To tie in with this month’s SoNYC birthday celebrations, we are hosting a collection of case




out

Social Media for Science Outreach – A Case Study: TEDMED Great Challenges

To tie in with this month’s SoNYC birthday celebrations, we are hosting a collection of case




out

Social Media for Science Outreach – A Case Study: Lessons From a Campaign Twitter Account

James King is a geomorphologist interested in exploring the processes that govern sediment transport and




out

SpotOn London 2013 – draft programme: Outreach track

As we’re getting ready to make tickets available for this year’s SpotOn London conference, we’re




out

Outcast. Volume 1, A darkness surrounds him / Robert Kirkman, creator, writer ; Paul Azaceta, artist ; Elizabeth Breitweiser, colorist ; Rus Wooton, letterer.

Kyle Barnes has been plagued by demonic possession all his life and now he needs answers. Unfortunately, what he uncovers along the way could bring about the end of life on Earth as we know it.




out

Outcast. Volume 3, This little light / Robert Kirkman, creator, writer ; Paul Azaceta, artist ; Elizabeth Breitweiser, colorist ; Rus Wooton, Letterer ; Sean Mackiewicz, editor.

"Kyle is faced with the most emotional exorcism he's performed yet … as he begins to learn more about his abilities and what's really happening around him. The pieces are starting to fall into place as secrets are revealed that will change everything." -- Description provided by publisher.




out

Outcast. Volume 2, A vast and unending ruin / Robert Kirkman, creator, writer ; Paul Azaceta, artist ; Elizabeth Breitweiser, colorist ; Rus Wooton, letterer.

Kyle Barnes has been plagued by demonic possession all his life. In light of recent revelations, he finally feels like he's starting to piece together the answers he's looking for. But while he feels a new sense of purpose is Reverend Anderson's life falling apart?




out

Outcast. Volume 4, Under Devil's wing / Robert Kirkman, creator, writer ; Paul Azaceta, artist ; Elizabeth Breitweiser, colorist ; Rus Wooton, letterer.

"Answers are given, secrets are revealed, and the Barnes family has never been in more danger. Allison learns that there's something very special about her daughter, bu where's Kyle? Will Anderson risk everything to save him?' -- Page 4 of cover.




out

Edited out : a mysterious detective mystery / E. J. Copperman.

Mystery author Rachel Goldman is getting used to the idea that her fictional creation Duffy Madison has somehow taken flesh-and-blood form and is investigating missing person cases not far from where Rachel lives. Wait. No. She’s not getting used to it at all, and the presence of this real-life Duffy is making her current manuscript—what’s the word?—lousy. So she doesn’t want to see Duffy—the living one—at all. To make matters worse, when he shows up at her door and insists on talking to her, it’s about the one thing she doesn’t want to do: Find a missing person. But the man Duffy seeks this time around might be able to solve Rachel’s problem. He might just be the man Duffy was before he became Duffy five years ago. The only problem is she could be letting Duffy lead her into danger yet again… Entertaining and witty, the second in E.J. Copperman's Mysterious Detective Mystery series Edited Out will delight his fans, both new and old.




out

Canadian securities regulators issue warning about fraudulent investment solicitations involving crypto assets

Montréal –The Canadian Securities Administrators (CSA) warns the public about investment schemes involving fraudulent websites that solicit investments in foreign exchange (often referred to as “forex”), binary options and/or crypto assets.




out

CSA Investor Alert: Canadian securities regulators warn the public about impersonation scams

Montreal - The Canadian Securities Administrators (CSA) is warning the public to be vigilant for unsolicited communications that come from scammers posing as CSA staff or staff of CSA members.




out

Canadian securities regulators warn public about unregistered trading platform Nova Tech Ltd

Toronto – The Canadian Securities Administrators (CSA) is warning the public that Nova Tech Ltd (NovaTech), which operates the website www.novatechfx.com, is not registered with a securities regulator in any province or territory in Canada.




out

Register: Delivering for Nutrition in South Asia Conference

South Asia grapples with escalating levels of malnutrition in various forms, including undernutrition, overweight and obesity, and micronutrient deficiencies, alongside the increasing incidence of diet-related non-communicable diseases. Malnutrition re... Source: IFPRI Bangladesh Country Office




out

Moana : the story of the movie in comics / manuscript adaptation, Alesandro Ferrari ; layouts, Alberto Zanon, Giada Perissinotto ; pencil/inking, Veronica Di Lorenzo, Luca Bertelè ; colors, Massimo Rocca [and four others].

"Sail the Pacific Islands in search of destiny and the demigod Maui in this retelling of Disney Moana. Moana is a spirited teenager who loves the ocean, yet she is forbidden to travel beyond the reef that surrounds her island home of Motunui. But she feels called to something more, and wants to discover who she was meant to be. When darkness begins to consume the island, and nature is out of balance, Moana knows the solution lies beyond the safety of the reef. Following the messages of her ancestors, and with encouragement from the ocean itself, Moana sails into the open sea to find the demigod Maui and right a wrong from his past. Together they face rough waters, monstrous creatures, and the unknown, in a mission to stop the darkness from spreading, and restore life to the islands! Become a master wayfinder in this action-packed story as Moana's love for the sea turns her into a hero among her people, the gods, and the ocean." -- Provided by publisher




out

Tenable Research Uncovers Thousands of Vulnerable Cyber Assets Amongst Southeast Asia’s Financial Sector

 New research conducted by Tenable®, Inc., the exposure management company, has uncovered more than 26,500 potential internet-facing assets among Southeast Asia’s top banking, financial services and insurance (BFSI) companies by market capitalisation across Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam.

On July 15, 2024, Tenable examined the external attack surface of over 90 BFSI organisations with the largest market capitalisations across the region. The findings revealed that the average organisation possesses nearly 300 internet-facing assets susceptible to potential exploitation, resulting in a total of more than 26,500 assets across the study group.

Singapore ranked the highest among the six countries assessed, with over 11,000 internet-facing assets identified across its top 16 BFSI companies. Over 6,000 of those assets are hosted in the United States. Next on the list is Thailand with over 5000 assets. The distribution of internet-accessible assets underscores the need for cybersecurity strategies that adapt to the rapidly evolving digital landscape.

CountryNumber of internet-facing assets amongst top 90 BFSI companies by market capitalisation
  1. Singapore
11,000
  1. Thailand
5,000
  1. Indonesia
4,600
  1. Malaysia
4,200
  1. Vietnam
3,600
  1. Philippines
2,600

“The results of our study reveal that many financial institutions are struggling to close the priority security gaps that put them at risk. Effective exposure management is key to closing these gaps,” said Nigel Ng, Senior Vice President, Tenable APJ. “By identifying and securing vulnerable assets before they can be exploited, organisations can better protect themselves against the growing tide of cyberattacks.” 


Cyber Hygiene Gaps 
The Tenable study revealed many potential vulnerabilities and exposed several cyber hygiene issues among the study group, including outdated software, weak encryption, and misconfigurations. These vulnerabilities provide cybercriminals with easily exploitable potential entry points, posing potential risk to the integrity and security of financial data. 

Weak SSL/TLS encryption 

A notable finding is that among the total assets, organisations had nearly 2,500 still supporting TLS 1.0—a 25-year old security protocol introduced in 1999 and disabled by Microsoft in September 2022. This highlights the significant challenge organisations with extensive internet footprints face in identifying and updating outdated technologies.

Misconfiguration increases external exposure

Another concerning discovery was that over 4,000 assets, originally intended for internal use, were inadvertently exposed and are now accessible externally. Failing to secure these internal assets poses a significant risk to organisations, as it creates an opportunity for malicious actors to target sensitive information and critical systems.

Lack of encryption 

There were over 900 assets with unencrypted final URLs, which can present a security weakness. When URLs are unencrypted, the data transmitted between the user's browser and the server is not protected by encryption, making it vulnerable to interception, eavesdropping, and manipulation by malicious actors. This lack of encryption can lead to the exposure of sensitive information, such as login credentials, personal data, or payment details, and can compromise the integrity of the communication.


API vulnerabilities amplify risk

The identification of over 2,000 API v3 out of the total number of assets among organisations' digital infrastructure poses a substantial risk to their security and operational integrity.

APIs serve as crucial connectors between software applications, facilitating seamless data exchange. However, inadequate authentication, insufficient input validation, weak access controls, and vulnerabilities in dependencies within API v3 implementations create a vulnerable attack surface.

Malicious actors can exploit such weaknesses to gain unauthorised access, compromise data integrity, and launch devastating cyber attacks.

“The cybersecurity landscape is evolving faster than ever, and financial institutions must evolve with it, so they can know where they are exposed and take action to close critical risk” Ng added. “By prioritising exposure management, these organisations can better protect their digital assets, safeguard customer trust, and ensure the resilience of their operations in an increasingly hostile digital environment.”

About Tenable
Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com

Notes to Editors:

  1. Tenable examined the top 12-16 BFSI companies discoverable based on market cap. 
  2. In the context of this alert:
  • An asset is a domain name, subdomain, or IP addresses and/or combination thereof of a device connected to the Internet or internal network. An asset may include, but not limited to web servers, name servers, IoT devices, network printers, etc. Example: foo.tld, bar.foo.tld, x.x.x.xs.
  • The Attack Surface is from the network perspective of an adversary, the complete asset inventory of an organisation including all actively listening services (open ports) on each asset.




out

Dear Libby : will you answer my questions about friendship?.

How do we find lasting, trusting, and fulfilling friendships? Is it by being popular? Dazzling others with your genius? Looking for that ultimate BFF? Hiding all your imperfections and trying hard to fit in? Deep and enduring friendships are essential to our psychological and physical well-being. Unfortunately, between bullying, social anxiety, peer pressure, and other issues, many teens feel isolated. In Dear Libby, trusted columnist Libby Kiszner offers a breakthrough approach to friendship and connection. You can create friendships from the inside out-rather than from the outside in. You can experience friendships with vibrant self-expression in every stage of life, making Dear Libby a book that can be read and reread at any age. Containing seven core principles, this life-changing resource not only explains the dynamics of connections and friendships but also gives practical tools to develop them. Integrating contemporary issues, timeless insight, real-life skills, and unique perspectives, Dear Libby provides a hands-on guide for dealing with everyday friendship struggles faced by teens today. Teens and readers of all ages will gain insight and understanding on how to make profound, joyful relationships possible. Find answers to real questions like: What should I do when people who are supposed to be my friends call me names or embarrass me? What should I do I do if I'm being ignored at school? What is the best way to handle loneliness? Someone just stole my friend. What can I do? What can I do when my friends get together and "forget" to invite me?




out

Dear Lilly : from father to daughter : the truth about life, love, and the world we live in.

A father offers his advice, opinions, and the many useful stories gleaned from his past experiences in order to help his beloved daughter not only survive, but thrive in the dangerous and unpredictable world of young adulthood. From the pen of a former abused child, drug addict, womanizing frat boy, and suicidal depressive, comes forth the emotionally stirring account of a young man's battle with crippling inner demons and his eventual road to enlightenment. Peter Greyson calls upon his wisdom as both father and school teacher to gently lead teenage girls through a maze of truth, deception, and adolescent uncertainty. Greyson's literary style sparkles with a youthful enthusiasm that will capture your heart and provide boundless inspiration. Dear Lilly is a survival guide that offers the brutally honest male perspective to young women struggling for answers to life's deepest questions. Topics include: Boys lie What every guy wants from his girlfriend Tales from the drug world Everybody hurts High school exposed




out

Dear limits, get out of my way / Ky-lee Hanson.

How often do you feel restricted; physically, socially, mentally or financially? Are you aware of your limitations? How often is time or lack of experience the cause of anxious procrastination; waiting for the right moment? Relearn and rethink the way you perceive limitations with each chapter from a tribe of successful, driven, strong and soulful women.




out

Afrique de l'Ouest : les tracasseries routières aggravent l'insécurité alimentaire

Créée notamment pour promouvoir le commerce intra-régional de biens dans la région, la Communauté économique des États d'Afrique de l'Ouest devait aussi permettre d'y réduire l'insécurité alimentaire. Mais les « points de sécurité », dressés le long des corridors de commerce par les autorités administratives qui prélèvent des pots-de-vin, sont venus limiter cette ambition. S’élevant jusqu’à 576 dollars aux 100 kms au Togo en 2017, cette corruption se mesure aussi en temps perdu, avec plus de trois heures aux 100 kms.




out

Outstanding Remediations Tracking

One of the common questions often asked of the IT team is “how many systems are missing patches and how many patches are missing on each system?”  This dashboard uses the “Patch Report” plugin and organizes the current patch status for systems scanned with credentials.  The IT team can now easily communicate the specific systems with missing patches to executives.

The Nessus "Patch Report" plugin (66334) elegantly summarizes all of the missing patches and general remediation actions required to remediate the discovered vulnerabilities on a given host. Instead of counting the number of vulnerabilities, the plugin lists applications that need to be upgraded. The approach is not only much easier for IT administrators to consume, but the count of applications provides a measure of how much "work" is required to secure a system.

The dashboard provides risk guidance using the “Remediation Summary” tool.  This tool works by employing a concept called “top patch”.  Tenable Security Center uses proprietary technology to identify a chain of patches.  The first patch in the chain is called the “top patch”.  If the “top patch” is applied, all subsequent vulnerabilities will also be remediated at the same time.  Using both the Remediation Summary tool and “Patch Report” plugin, the organization can better plan remediation efforts.   

The dashboard and its components are available in the Tenable Security Center Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets.  The dashboard can be easily located in the Tenable Security Center Feed under the category Executive. The dashboard requirements are:

  • Tenable Security Center
  • Nessus
  • This dashboard requires “Full Text Search” to be enabled for each analyzed repository.

Please note the "Full Text Search" option must be enabled for the repository to support the trending component.

Tenable Security Center has the ability to identify all discoverable vulnerabilities, eliminating blind spots. Tenable detects missing patches, incorrect configurations, lapsed defenses, incomplete monitoring and network intruders—so you can mitigate them.  Tenable Security Center can show risk across all systems, enabling informed decisions.  Tenable’s approach to continuous monitoring reaches across cloud, virtual, mobile and traditional systems and measures attack vectors in each of these domains.  Tenable Security Center provides a unique combination of detection, reporting, and pattern recognition utilizing industry recognized algorithms and models.  By providing that single point of data collection, Tenable.sc enables sharing of vulnerability scanning results across the technical groups and business owners. Tenable.sc is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audits.

 

Components

Remediations Tracking - Top 25 Remediations: This component provides the top 25 remediation actions that can be taken to reduce overall risk.  The table is sorted using vulnerability weight scores, which are calculated differently for each organization.  To determine score weights, login with the admin account, edit your organization and then select “Analysis”.  In the upper right hand corner, there are four scores, one for each severity level. The default scores are: critical = 40, high = 10, medium = 3 and low = 1. The vulnerability weight helps to determine a fully calculated score used in risk analysis.

The Outstanding Remediations - Time Since Patch Publication (Assets) matrix displays the total count of missing patches across the environment. The matrix is comprised of five columns. The first column provides a count of the vulnerabilities that are exploitable, and the last four columns provide counts of vulnerabilities based on Vulnerability Priority Rating (VPR) levels. VPR scores are displayed as column headers in traditional severity text.  Critical represents VPR 9-10, High represents VPR 7-8.9, Medium represents VPR 4-6.9, and Low represents VPR 0.1-3.9. Each row filters the vulnerabilities based on the patch publication date of less than 30 days ago, Current Quarter, Last Quarter, Current Year, Last Year, and greater than 365 Days.

The End of Life Software Detection table displays a list of software that is no longer supported by the vendor. The table is sorted by the count column, which lists a count of the total number of assets affected by the unsupported software package. The filter used is for Plugin Name equals Unsupported. Tenable recommends that assets found here be upgraded to a higher supported version as soon as possible, since vendors no longer list active vulnerabilities for end-of-life software.

The Outstanding Remediations by Device Type (Vulnerabilities) matrix displays the total count of missing patches by device type. The matrix is comprised of five columns. The first column provides a count of the vulnerabilities that are exploitable, and the last four columns provide counts of vulnerabilities based on Vulnerability Priority Rating (VPR) levels. VPR scores are displayed as column headers in traditional severity text.  Critical represents VPR 9-10, High represents VPR 7-8.9, Medium represents VPR 4-6.9, and Low represents VPR 0.1-3.9.  There is a row present which groups devices by type, such as Linux, Windows, or macOS devices. Counts present in each cell represents the number of vulnerabilities present for the device group and VPR score.




out

Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal

Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal

Integrating key goals of food system transformation.

The post Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal appeared first on IFPRI.





out

CSAS South Asian Film Series | Nocturnes (November 13, 2024 7:00pm)

Event Begins: Wednesday, November 13, 2024 7:00pm
Location: Off Campus Location
Organized By: Center for South Asian Studies


Continuing our Spotlight On Women Directors series, Nocturnes is a 2024 documentary on how moths convey a mysterious message.

In the dense forests of the Eastern Himalayas, moths are whispering something to us. In the dark of night, two curious observers shine a light on this secret universe. Together, they are on an expedition to decode these nocturnal creatures in a remote ecological “hot spot” on the border of India and Bhutan. The result is a deeply immersive film that transports audiences to a rarely-seen place and urges us all to look more closely at the hidden interconnections of the natural world. From directors Anirban Dutta and Anupama Srinivasan.

This screening is FREE and open to the public (must reserve free tickets/RSVP in advance)

Tickets: https://marquee-arts.org/event-page/tickets/?showingId=892704

Film website: https://www.sandboxfilms.org/films/nocturnes/

*Made possible with the generous support of the Title VI grant from the U.S. Department of Education.*




out

Respiratory Careers: Join Mayo Clinic’s Team in Southwest MN (November 13, 2024 1:00pm)

Event Begins: Wednesday, November 13, 2024 1:00pm
Location:
Organized By: University Career Center


You are invited to an interview with Mayo Clinic's Respiratory Care department on Wednesday, Nov. 13th! Our hiring leaders will be conducting virtual interviews between 11:00 AM - 1:00 PM CST. Consider joining our Respiratory Care department in Southwest MN! We are currently offering a $10,000 sign-on bonus and offer relocation assistance, in addition to ourimpressive benefits package!If you are interested in interviewing, please complete the two steps below and someone from Mayo Clinic Recruitment Team will reach out to you to confirm your appointment: 
Formally Apply Here
Schedule Interview Time Here
 Want to learn more about this opportunity? Listen to quick video about the Mayo Clinic: Why join the Mayo Clinic respiratory care team Please contact Jenna Kidd at Kidd.Jenna@mayo.edu with any questions.




out

We Write To You About Africa (November 13, 2024 11:00am)

Event Begins: Wednesday, November 13, 2024 11:00am
Location: Museum of Art
Organized By: University of Michigan Museum of Art (UMMA)


Following years of research into the Museum’s and University of Michigan’s relationships with Africa and African art collections, We Write To You About Africa is a complete reinstallation and doubling of the Museum’s space dedicated to African art. 

Featuring a wide range of artworks—from historic Yoruba and Kongo figures to contemporary works by African and African American artists, such as Sam Nhlengenthwa, Masimba Hwati, Jon Onye Lockard and Shani Peters—the exhibition directly addresses the complex and difficult histories inherent to African art collections in the Global North, including their entanglements with colonization and global efforts to repatriate African artworks to the continent.

Art collections, by their very nature, can not be anything other than subjective. With I Write To You About Africa, we examine the subjective ways UMMA and the University of Michigan as a whole have collected and presented art from and connected to the African diaspora.

Drawn from art collections across the U-M campus, a special section of the exhibition highlights how the founding of the Department of Afroamerican and African Studies (DAAS) and the African Studies Center (ASC) impacted U–M’s collecting practices. This section includes an exciting and ongoing project—contemporary African artists, scholars, and curators will be asked to write about their work on postcards, in their first language, and mail them to UMMA where they will be displayed alongside their works. 

We Write To You About Africa will be a reinstallation of the Museum’s Robert and Lillian Montalto Bohlen Gallery of African art and the connected Alfred A Taubman Gallery II. It is slated to open in 2021 and will be on view indefinitely.

Lead support for this exhibition is provided by the University of Michigan Office of the Provost, the Michigan Arts and Culture Council, and the African Studies Center.
 




out

Check Out the P4P Public Calendar Here (November 13, 2024 12:00am)

Event Begins: Wednesday, November 13, 2024 12:00am
Location: Online
Organized By: Maize Pages Student Organizations


bit.ly/p4pumcalendar




out

Winter Solstice Isn’t Complete Without a Bowl of Tang Yuan Soup

When you can’t celebrate Dong Zhi with family, a well-prepared bowl of soup can keep traditions alive—and even make new ones.




out

Amawele’s Cuisine Brings South African Flavors to San Francisco

Pam and Wendy Drew are South African identical twins who do everything together; from travel to entering the same career paths and now owning and operating Amawele’s Cuisine in San Francisco. The name of their restaurant came easy—it simply means “The Twins” in Zulu.   Amawele’s Cuisine serves what Wendy and Pam consider to be … Continue reading Amawele’s Cuisine Brings South African Flavors to San Francisco




out

Delivering for Nutrition in South Asia: Connecting the Dots Across Systems

Delivering for Nutrition in South Asia: Connecting the Dots Across Systems

South Asia grapples with escalating levels of malnutrition in various forms, including undernutrition, overweight and obesity, and micronutrient deficiencies, alongside increasing incidence of diet-related non-communicable diseases. Malnutrition results from a complex interplay of factors incorporating household and individual decision-making, agriculture and food systems, healthcare services, education, and socio-ecological systems that determine access to services and […]

The post Delivering for Nutrition in South Asia: Connecting the Dots Across Systems appeared first on IFPRI.




out

The Unjust Climate: Measuring the impacts of climate change on rural poor, women, and youth

Virtual Event: June 18, 2024 at 9:30am-11:00am EDT. This event will discuss key results from the report and hear from policymakers, practitioners, and partners on how they are working to generate relevant evidence and make a difference on the ground.   




out

Empowering Researchers in South Asia to Unlock Economic Insights: International CGE Modeling Training Program in New Delhi

Empowering Researchers in South Asia to Unlock Economic Insights: International CGE Modeling Training Program in New Delhi

New Delhi, May 3, 2024: The International Food Policy Research Institute (IFPRI) and the CGIAR Initiative on Foresight, in partnership with the South Asian Network on Economic Modeling (SANEM), the Indian Council of Agricultural Research-Indian Agricultural Research Institute (ICAR-IARI), and ICAR-National Institute of Agricultural Economics and Policy Research (ICAR-NIAP), successfully concluded today the weeklong ‘International […]

The post Empowering Researchers in South Asia to Unlock Economic Insights: International CGE Modeling Training Program in New Delhi appeared first on IFPRI.




out

Overnight Work, CTA’s Red-Purple Lines: South End of Wilson Station

Overnight Work, CTA’s Red-Purple Lines: South End of Wilson Station for track work.




out

Daily Sidewalk and Parking Lane Closures at N. Clark Street between W. Roscoe Street and approx. 250ft south

Daily Sidewalk and Parking Lane Closures at N. Clark Street between W. Roscoe Street and approx. 250ft south for substation wall construction.




out

Travel on CTA to Rock Out to Great Music at Riot Fest

CTA is the best travel option to get around town. Customers can save money by purchasing an unlimited rides pass, either the 1-Day ($5) – far more economical and convenient than the price of gas and parking - or the 3-Day ($15) pass – a real budget-saving move.




out

New Dates, Daily Sidewalk and Parking Lane Closures at N. Clark Street between W. Roscoe Street and approx. 250ft south

New Dates, Daily Sidewalk and Parking Lane Closures at N. Clark Street between W. Roscoe Street and approx. 250ft south for Substation Wall Construction.




out

Far South Side Gets Sneak Peek at What CTA Red Line Extension Will Look Like

The Chicago Transit Authority today welcomed about 75 residents and businesses from the Far South Side to the Red Line Extension (RLE) Fall Community Meet & Greet Event. Held at the site of the future Michigan Red Line station on E. 116th Street and S. Michigan Ave., CTA and RLE contractor Walsh-VINCI Transit Community Partners welcomed RLE project supporters.




out

Extended Alley Closure for The North/South Alley between: 930 thru 936 W. Roscoe Avenue (W. Roscoe Street to W. Newport Avenue)

Extended Alley Closure for The North/South Alley between: 930 thru 936 W. Roscoe Avenue (W. Roscoe Street to W. Newport Avenue) for Alley Reconstruction