ue

U.S. Immigration Laws and the Peril of Using the United States as a Venue for International Arbitration Proceedings

Angel Valverde presents issues for development of international arbitration in the U.S., as there are no visas that specifically allow a foreign national to be employed as an arbitrator, attorney or expert witness in an arbitration proceeding.

International Law Quarterly

View




ue

California Supreme Court Holds Plaintiffs with Arbitration Agreements Retain Standing to Pursue Non-Individual PAGA Claims in Court

  • The California Supreme Court determined that plaintiffs seeking civil penalties under California’s Private Attorneys General Act (PAGA) retain standing to pursue representative PAGA claims on behalf of other alleged aggrieved employees in court despite being bound to arbitrate their individual PAGA claims.




    ue

    The Puerto Rico Department of Health Implements Compulsory Vaccination for In-Person Educational Institutions

    On July 22, 2021 the Puerto Rico Department of Health (PRDOH) issued Administrative Order No. 2021-509 (AO) providing that, in order to physically attend school, post-school educational institutions, or universities, personnel and students age 12 and older must be vaccinated against COVID-19. According to the PRDOH, the vaccination requirement for in-person school attendance will play an essential role in controlling the pandemic and providing a safer educational environment for students.




    ue

    New Puerto Rico Executive Order Mandates Booster Shots for Health and Education Sectors

    Puerto Rico Governor Pedro R. Pierluisi recently issued back-to-back executive orders (EO) regarding COVID-19. It appears that the third EO was stuck in holiday traffic. This latest EO, like her sisters, amends November’s EO-2021-075 to curtail COVID-19 infections.




    ue

    Puerto Rico Mandates COVID-19 Booster Shots for Health and Education Sectors

    Anabel Rodríguez-Alonso and José L. Maymí-González examine Puerto Rico’s new back-to-back executive orders regarding COVID-19.

    SHRM Online

    View (Subscription required.)




    ue

    4 Questions On Discrimination Attys' Minds In The New Year

    Alyesha Dotson says the Supreme Court’s upcoming decision on whether to overrule a 2003 decision that upheld affirmative action in student admissions won’t set new precedent for employers, but may have repercussions in how diversity, equity and inclusion programming is conducted moving forward.

    Law360 Employment Authority

    View (Subscription required.)




    ue

    U.S. Departments of Education and Justice Issue Dear Colleague Letter Regarding Digital Accessibility in Higher Education

    In a joint “Dear Colleague” letter (DCL) released May 19, 2023, the U.S. Department of Education’s Office of Civil Rights teamed up with the U.S.




    ue

    U.S. Department of Education Issues Long-Awaited Final Title IX Regulations

    • U.S. Department of Education issued final Title IX regulations governing sex discrimination complaints involving educational institutions.
    • The regulations clarify terms, expand the geographical scope of Title IX, amend the investigation process, and include sexual orientation, gender identity, and pregnancy/lactation issues within Title IX’s protections. 




    ue

    Ontario, Canada Court Affirms City Lacked Control of Workplace and Exercised Due Diligence, Upholding Acquittal of OHSA Charges

    In R. v. Greater Sudbury (City), 2024 ONSC 3959, the Ontario Superior Court of Justice (OSCJ) dismissed an appeal of the trial judge’s decision in which she acquitted the City of Sudbury (City) of various charges under the Occupational Health and Safety Act (OHSA).




    ue

    OSHA Issues New Inspection Guidance Targeting Animal Slaughtering and Processing Establishments

    On October 15, 2024, the U.S. Department of Labor released expanded guidance for OSHA inspections of employers in the animal slaughtering and processing industry. This guidance supersedes previous guidance issued in 2015, which had been limited to poultry processing establishments.




    ue

    Spotting and Solving Workplace Issues Before They Lead to Legal Troubles




    ue

    Inteligencia Artificial - Implicaciones para la Fuerza Laboral




    ue

    From Michael Scott to Bill Lumbergh: Legal Strategies for When a Manager Goes Rogue




    ue

    The Presidential Elections and the Immigration Consequences




    ue

    Confidentiality and Attorney-Client Privilege Issues When Conducting Internal Investigations and Audits




    ue

    Love Your Lawyer: Littler Lawyers Answer Your Most Burning Labor and Employment Questions




    ue

    EEOC Issues Guidance on Use of AI

    Jim Paretti said the EEOC’s new guidance explaining the application of Title VII of the Civil Rights Act of 1964 to automated systems that incorporate artificial intelligence in a range of HR-related uses is a wake-up call to employers.

    SHRM Online

    View (Subscription required.)




    ue

    European Employers Navigate New Pressures Around Flexible Work Models, AI Adoption and Divisive Social Issues, Littler Survey Finds

    (November 8, 2023) – Littler, the world’s largest employment and labour law practice representing management, has released its sixth annual European Employer Survey Report. Based on responses from 780 human resources (HR) executives, in-house lawyers and business leaders from across Europe, the report explores the myriad ways in which employers are responding to changes in workplace management, policy and culture.




    ue

    Littler Attorneys Named in 2024 Best Lawyers™ for Colombia, Portugal, Puerto Rico and Spain

    (November 16, 2023) – Littler, the world’s largest employment and labor law practice representing management, is pleased to announce that attorneys in its Colombia, Portugal, Puerto Rico and Spain offices have been recognized in the 2024 edition of Best Lawyers®.

    The individual attorneys that were recognized include the following:




    ue

    Littler Continues Hiring Streak with Addition of Shareholder Kelly Cardin in New York City

    NEW YORK (May 28, 2024) – Littler, the world’s largest employment and labor law practice representing management, has added Kelly M. Cardin as a shareholder in its New York City office. Cardin – who joins the firm from Ogletree Deakins, where she was co-chair of the Pay Equity practice group – marks Littler’s fifth shareholder level addition since the beginning of April.




    ue

    Littler Continues Toronto Growth with the Addition of Shana French as Partner

    New arrival comes as Stephen Shore is appointed Littler’s Toronto Office Managing Partner

    TORONTO (June 3, 2024) – Littler, the world’s largest employment and labour law practice representing management, has added Shana French as a partner in its Toronto office. Her arrival comes as Stephen Shore, who joined Littler in April, is named Office Managing Partner in Toronto. French joins from Sherrard Kuzz and marks Littler’s seventh partner level addition since the beginning of April.




    ue

    Littler Continues Robust Canadian Expansion with Five New Additions to Toronto Office

    New Additions Follow Arrival of Three Partners in Recent Months




    ue

    Election Outcomes, AI Adoption, and ESG Issues Pose New Challenges for European Employers, Littler Survey Finds

    Littler, the world’s largest employment and labour law practice representing management, has released its seventh annual European Employer Survey Report, based on responses from nearly 630 human resources (HR) executives, business leaders, and in-house lawyers from across Europe—57% of whom hold C-suite positions at their organisations.




    ue

    Netherlands issues guidance on using AI chatbots

    Stephan Swinkels says some data breaches are inevitable and employers must move quickly to minimize the damage in the event of a breach.

    International Employment Lawyer

    View (Subscription required)




    ue

    5 Questions About NY's Workplace Violence Prevention Law

    Rebecca Goldstein and Terri Solomon comment on New York's Retail Worker Safety Act, which requires retail employers to adopt a violence prevention policy.

    Law360 Employment Authority

    View (Subscription required)




    ue

    AI in the Workplace: Labor Department Issues Best Practices for Employers

    Bradford J. Kelley stresses to employers the importance of implementing safeguards when considering adopting AI technologies.

    Thomson Reuters

    View




    ue

    ETSI issues report on IoT devices for emergency communications

    ETSI issues Report on IoT devices for emergency communications

    Sophia Antipolis, 1st of August 2019

    Since the Internet has matured, society has become more interconnected, as have the devices used to enhance everyday lives.

    Read More...




    ue

    ETSI issues two major standards for emergency calls: Next Generation 112 and Advanced Mobile Location

    ETSI issues two major standards for emergency calls: Next Generation 112 and Advanced Mobile Location

    Sophia Antipolis, 20 January 2020

    ETSI’s Emergency Communication Special Committee has recently released two major specifications, ETSI TS 103 479, for NG112, the next generation of European emergency services and ETSI TS 103 625, for the specific Advanced Mobile Location function. AML is already implemented in 22 countries worldwide following the publication of the first ETSI technical report TR 103 393.

    Read More...




    ue

    ETSI issues New White Paper on Artificial Intelligence

    ETSI issues New White Paper on Artificial Intelligence

    Sophia Antipolis, 29 June 2020

    ETSI is pleased to unveil a new White Paper on Artificial Intelligence (AI). This White Paper explores key issues of AI that present both huge opportunities and new challenges for information and communication technologies (ICT).

    This ETSI White Paper surveys the many technical activities in ETSI that consider AI. They include 5G systems, network optimization, privacy/security, data management, semantic interoperability and testing across all areas. Each area is considering the use of aspects of AI, including Health and Human Factors scenarios. Key references from other bodies are included for global context.

    Read More...




    ue

    ETSI standard to secure digital signatures solves issue for 4,000 banks

    ETSI standard to secure digital signatures solves issue for 4,000 banks

    Sophia Antipolis, 17 March 2021

    ETSI is pleased to unveil ETSI TS 119 182-1, a specification for digital signatures supported by PKI and public key certificates which authenticates the origin of transactions ensuring that the originator can be held accountable and access to sensitive resources can be controlled.

    Read More...




    ue

    CEN, CENELEC and ETSI held a workshop on standards in support of the industrial data value chain

    CEN, CENELEC AND ETSI HELD A WORKSHOP ON STANDARDS IN SUPPORT OF THE INDUSTRIAL DATA VALUE CHAIN

    Sophia Antipolis, 29 September 2021

    Industrial data has become one of the top strategic priorities for European and international industry in the recent years. Well managed and duly exploited, industrial data bring a significant competitive edge to businesses and can greatly improve overall efficiency, be it by supporting core processes or by providing a new source of insights.

    In this data-driven era, industrial data play an essential role in building the foundation of the next wave of digitization in Europe. For this reason, it is key to the success of a harmonized Single Market and European competitiveness in the global market, but also for the success of the twin transition (green and digital) at the heart of the EU policy agenda.

    Read More...




    ue

    ETSI releases new report enabling more transparent security techniques

    Sophia Antipolis, 6 March 2023

    The ETSI group on Encrypted Traffic Integration (ISG ETI) is pleased to announce the release of the group report GR-ETI-002 “Requirements definition and analysis”, the next step for the problems previously outlined in the report GR-ETI-001 “Problem Statement”.

    Read More...




    ue

    New York: Tanya Taylor - From McGill to Madison Avenue

    Starts: Wed, 13 Nov 2024 20:00:00 -0500
    11/13/2024 06:00:00PM
    Location: New York, U. S. A.




    ue

    Summary of Comments to CSA/CIRO Staff Notice 23-331 Request for Feedback on December 2022 SEC Market Structure Proposals and Potential Impact on Canadian Capital Markets

    This document is only available in PDF format.




    ue

    Notice of Ministerial Approval of Amendments to OSC Rule 91-507 Trade Repositories and Derivatives Data Reporting and Consequential Amendments to OSC Rule 13-502 Fees

    The Minister of Finance has approved amendments to Ontario Securities Commission (OSC) Rule 91-507 Trade Repositories and Derivatives Data Reporting and consequential amendments to OSC Rule 13-502 Fees (collectively, the Amendments) pursuant to




    ue

    Detailed Data on Balance of Issuers in ninth Staff Review of Disclosure regarding Women on Boards and in Executive Officer Positions




    ue

    OSC Staff Notice 81-736 - Summary Report for Investment Fund and Structured Product Issuers

    This document is only available in PDF format.




    ue

    CVE-2024-47575: Frequently Asked Questions About FortiJump Zero-Day in FortiManager and FortiManager Cloud

    Frequently asked questions about a zero-day vulnerability in Fortinet’s FortiManager that has reportedly been exploited in the wild.

    Background

    The Tenable Security Response Team (SRT) has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a zero-day vulnerability in Fortinet’s FortiManager.

    Update October 23: The blog has been updated with new information about in-the-wild exploitation and threat actor activity associated with this vulnerability.

    View Change Log

    FAQ

    What is FortiJump?

    FortiJump is a name given to a zero-day vulnerability in the FortiGate-FortiManager (FGFM) protocol in Fortinet’s FortiManager and FortiManager Cloud. It was named by security researcher Kevin Beaumont in a blog post on October 22. Beaumont also created a logo for FortiJump.

    What are the vulnerabilities associated with FortiJump?

    On October 23, Fortinet published an advisory (FG-IR-24-423) for FortiJump, assigning a CVE identifier for the flaw.

    CVEDescriptionCVSSv3
    CVE-2024-47575FortiManager Missing authentication in fgfmsd Vulnerability9.8

    What is CVE-2024-47575?

    CVE-2024-47575 is a missing authentication vulnerability in the FortiGate to FortiManager (FGFM) daemon (fgfmsd) in FortiManager and FortiManager Cloud.

    How severe is CVE-2024-47575?

    Exploitation of FortiJump could allow an unauthenticated, remote attacker using a valid FortiGate certificate to register unauthorized devices in FortiManager. Successful exploitation would grant the attacker the ability to view and modify files, such as configuration files, to obtain sensitive information, as well as the ability to manage other devices.

    Obtaining a certificate from a FortiGate device is relatively easy:

    Comment
    by from discussion
    infortinet

     

    According to results from Shodan, there are nearly 60,000 FortiManager devices that are internet-facing, including over 13,000 in the United States, over 5,800 in China, nearly 3,000 in Brazil and 2,300 in India:

    When was FortiJump first disclosed?

    There were reports on Reddit that Fortinet proactively notified customers using FortiManager about the flaw ahead of the release of patches, though some customers say they never received any notifications. Beaumont posted a warning to Mastodon on October 13:

     

    Was this exploited as a zero-day?

    Yes, according to both Beaumont and Fortinet, FortiJump has been exploited in the wild as a zero-day. Additionally, Google Mandiant published a blog post on October 23 highlighting its collaborative investigation with Fortinet into the “mass exploitation” of this zero-day vulnerability. According to Google Mandiant, they’ve discovered over 50 plus “potentially compromised FortiManager devices in various industries.”

    Which threat actors are exploiting FortiJump?

    Google Mandiant attributed exploitation activity to a new threat cluster called UNC5820, adding that the cluster has been observed exploiting the flaw since “as early as June 27, 2024.”

    Is there a proof-of-concept (PoC) available for this vulnerability/these vulnerabilities?

    As of October 23, there are no public proof-of-concept exploits available for FortiJump.

    Are patches or mitigations available for FortiJump?

    The following table contains a list of affected products, versions and fixed versions.

    Affected ProductAffected VersionsFixed Version
    FortiManager 6.26.2.0 through 6.2.12Upgrade to 6.2.13 or above
    FortiManager 6.46.4.0 through 6.4.14Upgrade to 6.4.15 or above
    FortiManager 7.07.0.0 through 7.0.12Upgrade to 7.0.13 or above
    FortiManager 7.27.2.0 through 7.2.7Upgrade to 7.2.8 or above
    FortiManager 7.47.4.0 through 7.4.4Upgrade to 7.4.5 or above
    FortiManager 7.67.6.0Upgrade to 7.6.1 or above
    FortiManager Cloud 6.46.4 all versionsMigrate to a fixed release
    FortiManager Cloud 7.07.0.1 through 7.0.12Upgrade to 7.0.13 or above
    FortiManager Cloud 7.27.2.1 through 7.2.7Upgrade to 7.2.8 or above
    FortiManager Cloud 7.47.4.1 through 7.4.4Upgrade to 7.4.5 or above
    FortiManager Cloud 7.6Not affectedNot Applicable

    Fortinet’s advisory provides workarounds for specific impacted versions if patching is not feasible. These include blocking unknown devices from attempting to register to FortiManager, creating IP allow lists of approved FortiGate devices that can connect to FortiManager and the creation of custom certificates. Generally speaking, it is advised to ensure FGFM is not internet-facing.

    Has Tenable released any product coverage for these vulnerabilities?

    A list of Tenable plugins for this vulnerability can be found on the individual CVE page for CVE-2024-47575 as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.

    Get more information

    Change Log

    Update October 23: The blog has been updated with new information about in-the-wild exploitation and threat actor activity associated with this vulnerability.

    Join Tenable's Security Response Team on the Tenable Community.
    Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.




    ue

    Microsoft’s November 2024 Patch Tuesday Addresses 87 CVEs (CVE-2024-43451, CVE-2024-49039)

    1. 4Critical
    2. 82Important
    3. 1Moderate
    4. 0Low

    Microsoft addresses 87 CVEs and one advisory (ADV240001) in its November 2024 Patch Tuesday release, with four critical vulnerabilities and four zero-day vulnerabilities, including two that were exploited in the wild.

    Microsoft patched 87 CVEs in its November 2024 Patch Tuesday release, with four rated critical, 82 rated important and one rated moderate.

    This month’s update includes patches for:

    • .NET and Visual Studio
    • Airlift.microsoft.com
    • Azure CycleCloud
    • Azure Database for PostgreSQL
    • LightGBM
    • Microsoft Exchange Server
    • Microsoft Graphics Component
    • Microsoft Office Excel
    • Microsoft Office Word
    • Microsoft PC Manager
    • Microsoft Virtual Hard Drive
    • Microsoft Windows DNS
    • Role: Windows Hyper-V
    • SQL Server
    • TorchGeo
    • Visual Studio
    • Visual Studio Code
    • Windows Active Directory Certificate Services
    • Windows CSC Service
    • Windows DWM Core Library
    • Windows Defender Application Control (WDAC)
    • Windows Kerberos
    • Windows Kernel
    • Windows NT OS Kernel
    • Windows NTLM
    • Windows Package Library Manager
    • Windows Registry
    • Windows SMB
    • Windows SMBv3 Client/Server
    • Windows Secure Kernel Mode
    • Windows Task Scheduler
    • Windows Telephony Service
    • Windows USB Video Driver
    • Windows Update Stack
    • Windows VMSwitch
    • Windows Win32 Kernel Subsystem

    Remote code execution (RCE) vulnerabilities accounted for 58.6% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 29.9%.

    Important

    CVE-2024-43451 | NTLM Hash Disclosure Spoofing Vulnerability

    CVE-2024-43451 is a NTLM hash spoofing vulnerability in Microsoft Windows. It was assigned a CVSSv3 score of 6.5 and is rated as important. An attacker could exploit this flaw by convincing a user to open a specially crafted file. Successful exploitation would lead to the unauthorized disclosure of a user’s NTLMv2 hash, which an attacker could then use to authenticate to the system as the user. According to Microsoft, CVE-2024-43451 was exploited in the wild as a zero-day. No further details about this vulnerability were available at the time this blog post was published.

    This is the second NTLM spoofing vulnerability disclosed in 2024. Microsoft patched CVE-2024-30081 in its July Patch Tuesday release.

    Important

    CVE-2024-49039 | Windows Task Scheduler Elevation of Privilege Vulnerability

    CVE-2024-49039 is an EoP vulnerability in the Microsoft Windows Task Scheduler. It was assigned a CVSSv3 score of 8.8 and is rated as important. An attacker with local access to a vulnerable system could exploit this vulnerability by running a specially crafted application. Successful exploitation would allow an attacker to access resources that would otherwise be unavailable to them as well as execute code, such as remote procedure call (RPC) functions.

    According to Microsoft, CVE-2024-49039 was exploited in the wild as a zero-day. It was disclosed to Microsoft by an anonymous researcher along with Vlad Stolyarov and Bahare Sabouri of Google's Threat Analysis Group. At the time this blog post was published, no further details about in-the-wild exploitation were available.

    Important

    CVE-2024-49019 | Active Directory Certificate Services Elevation of Privilege Vulnerability

    CVE-2024-49019 is an EoP vulnerability affecting Active Directory Certificate Services. It was assigned a CVSSv3 score of 7.8 and is rated as important. It was publicly disclosed prior to a patch being made available. According to Microsoft, successful exploitation would allow an attacker to gain administrator privileges. The advisory notes that “certificates created using a version 1 certificate template with Source of subject name set to ‘Supplied in the request’” are potentially impacted if the template has not been secured according to best practices. This vulnerability is assessed as “Exploitation More Likely” according to Microsoft’s Exploitability Index. Microsoft’s advisory also includes several mitigation steps for securing certificate templates which we highly recommend reviewing.

    Important

    CVE-2024-49040 | Microsoft Exchange Server Spoofing Vulnerability

    CVE-2024-49040 is a spoofing vulnerability affecting Microsoft Exchange Server 2016 and 2019. It was assigned a CVSSv3 score of 7.5 and rated as important. According to Microsoft, this vulnerability was publicly disclosed prior to a patch being made available. After applying the update, administrators should review the support article Exchange Server non-RFC compliant P2 FROM header detection. The supplemental guide notes that as part of a “secure by default” approach, the Exchange Server update for November will flag suspicious emails which may contain “malicious patterns in the P2 FROM header.” While this feature can be disabled, Microsoft strongly recommends leaving it enabled to provide further protection from phishing attempts and malicious emails.

    Critical

    CVE-2024-43639 | Windows Kerberos Remote Code Execution Vulnerability

    CVE-2024-43639 is a critical RCE vulnerability affecting Windows Kerberos, an authentication protocol designed to verify user or host identities. It was assigned a CVSSv3 score of 9.8 and is rated as “Exploitation Less Likely.”

    To exploit this vulnerability, an unauthenticated attacker needs to leverage a cryptographic protocol vulnerability in order to achieve RCE. No further details were provided by Microsoft about this vulnerability at the time this blog was published.

    Important

    29 CVEs | SQL Server Native Client Remote Code Execution Vulnerability

    This month's release included 29 CVEs for RCEs affecting SQL Server Native Client. All of these CVEs received CVSSv3 scores of 8.8 and were rated as “Exploitation Less Likely.” Successful exploitation of these vulnerabilities can be achieved by convincing an authenticated user into connecting to a malicious SQL server database using an affected driver. A full list of the CVEs are included in the table below.

    CVEDescriptionCVSSv3
    CVE-2024-38255SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-43459SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-43462SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-48993SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-48994SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-48995SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-48996SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-48997SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-48998SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-48999SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49000SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49001SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49002SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49003SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49004SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49005SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49006SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49007SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49008SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49009SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49010SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49011SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49012SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49013SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49014SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49015SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49016SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49017SQL Server Native Client Remote Code Execution Vulnerability8.8
    CVE-2024-49018SQL Server Native Client Remote Code Execution Vulnerability8.8
    Important

    CVE-2024-43602 | Azure CycleCloud Remote Code Execution Vulnerability

    CVE-2024-43602 is a RCE vulnerability in Microsoft’s Azure CycleCloud, a tool that helps in managing and orchestrating High Performance Computing (HPC) environments in Azure. This flaw received the highest CVSSv3 score of the month, a 9.9 and was rated as important. A user with basic permissions could exploit CVE-2024-43602 by sending specially crafted requests to a vulnerable AzureCloud CycleCloud cluster to modify its configuration. Successful exploitation would result in the user gaining root permissions, which could then be used to execute commands on any cluster in the Azure CycleCloud as well as steal admin credentials.

    Tenable Solutions

    A list of all the plugins released for Microsoft’s November 2024 Patch Tuesday update can be found here. As always, we recommend patching systems as soon as possible and regularly scanning your environment to identify those systems yet to be patched.

    For more specific guidance on best practices for vulnerability assessments, please refer to our blog post on How to Perform Efficient Vulnerability Assessments with Tenable.

    Get more information

    Join Tenable's Security Response Team on the Tenable Community.
    Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.




    ue

    OSC study finds ESG ratings greatly influence investor decisions but are difficult to understand

    TORONTO – The Ontario Securities Commission (OSC) today released the results of a study examining the influence of environmental, social and governance (ESG) factors on retail investor decision making.




    ue

    OSC publishes Summary Report for Investment Fund and Structured Product Issuers

    TORONTO – The Ontario Securities Commission has today published its




    ue

    SpotOn London 2012 Storify: ORCID – why do we need a unique researcher ID?

    Here is a Storify round up of the SpotOn London session: ORCID – why do we




    ue

    Something is killing the children. Volume 3 / written by James Tynion IV ; illustrated by Werther Dell'Edera ; colored by Miquel Muerto ; lettered by AndWorld Design ; cover by Werther Dell'Edera with colors by Miquel Muerto.

    "As the House of Slaughter arrives to clean up the situation by any means necessary, Erica will find that the true threat to those around her isn't who— or what— she ever expected. And the cost of saving the day may be too high for anyone to pay … ." -- Description provided by publisher.




    ue

    Firefly. Blue Sun rising. Part 1 / created by Joss Whedon ; written by Greg Pak ; illustrated by Dan McDaid, Lalit Kumar Sharma, Daniel Bayliss ; colored by Marcelo Costa ; lettered by Jim Campbell.

    "Sheriff Mal Reynolds has a new partner— a law enforcing robot from the Blue Sun corporation, who doesn't care about motives, about mercy, about anything other than enforcing the law— no matter the cost. The Blue Sun Corporation has helped to run the universe from the shadows for years, but they're ready to step into the light and take over. If Mal wants to keep his job and protect his sector, the smart move would be to play by their rulebook. But for Mal, there's really one choice— reunite the crew of the Serenity for one last impossible job to save the 'verse. Greg Pak and artist Dan McDaid launch Mal & the crew of Serenity into their biggest war yet, officially continuing Joss Whedon's acclaimed series." -- Provided by publisher.




    ue

    Firefly. Blue Sun rising. Part 2 / created by Joss Whedon ; written by Greg Pak ; illustrated by Dan McDaid, Lalit Kumar Sharma, Daniel Bayliss ; inks by Vincenzo Federici ; colored by Marcelo Costa ; lettered by Jim Campbell.

    "The stage is set for the final battle as the first ever Firefly event concludes, with Sheriff Mal Reynolds— yeah, he's still getting used to it too— making a choice that may cost him those he loves most, whether he knows it or not … Shocking losses lead to stunning decisions as Mal and the crew of Serenity must face the consequences of their choices in war against the Blue Sun Corporation. The 'Verse is changing in ways no one ever expected— and a new chapter of Firefly begins here." -- Provided by publisher.




    ue

    Fat Tuesday Sandra Brown.

    A police officer is furious that his partner's murderer was acquitted. In a desperate act of revenge, he kidnaps the defense attorney's wife. Who will find redemption in this story of corruption and passion?




    ue

    OSC and RCMP issue joint warning on coronavirus investment scams

    TORONTO – The Ontario Securities Commission (OSC), in partnership with the Royal Canadian Mounted Police (RCMP) – Integrated Market Enforcement Team (IMET), is warning the public about fraudulent investment opportunities related to the coronavirus (COVID-19).




    ue

    Canadian securities regulators issue warning about fraudulent investment solicitations involving crypto assets

    Montréal –The Canadian Securities Administrators (CSA) warns the public about investment schemes involving fraudulent websites that solicit investments in foreign exchange (often referred to as “forex”), binary options and/or crypto assets.




    ue

    How did households in Mali cope with covariate shocks between 2018 and 2023? Exploration of a unique dataset

    Citation Marivoet, Wim; and Hema, Aboubacar. 2024. How did households in Mali cope with covariate shocks between 2018 and 2023? Source: IFPRI Africa Regional Office (AFR)




    ue

    Informe de políticas alimentarias mundiales 2023: Repensar las respuestas a las crisis alimentarias: Sinopsis

    En 2022, el mundo se enfrentó a múltiples crisis. Continuaron las perturbaciones de los sistemas alimentarios debidas a la prolongada pandemia de COVID-19, las grandes catástrofes naturales, los disturbios civiles y la inestabilidad política, así como los crecientes efectos del cambio climático, mientras la guerra entre Rusia y Ucrania y la inflación agravaban una crisis mundial de alimentos y fertilizantes.