leases ETSI releases specifications boosting trustful end-to-end network and service automation By www.etsi.org Published On :: Thu, 28 Apr 2022 14:40:25 GMT ETSI releases specifications boosting trustful end-to-end network and service automation Sophia Antipolis, 13 September 2021 ETSI is pleased to announce the release of three major specifications and reports developed by its Zero-touch network and Service Management (ZSM) group. ETSI GS ZSM 003, defines end-to-end network slicing management and orchestration architecture blueprint and solutions, and ETSI GS ZSM 009-1 specifies the enablers for closed-loop automation. The general security aspects related to the ZSM framework and solutions, and potential mitigation options are introduced in the ETSI GR ZSM 010. Read More... Full Article
leases ETSI releases two Technical Reports to support US NIST standards for post-quantum cryptography By www.etsi.org Published On :: Wed, 06 Oct 2021 13:28:24 GMT ETSI releases two Technical Reports to support US NIST standards for post-quantum cryptography Sophia Antipolis, 6 October 2021 In 2016 the US National Institute of Standards and Technology (NIST) announced their intention to develop new standards for post-quantum cryptography. They subsequently initiated a competition-like standardization process with a call for proposals for quantum-safe digital signatures, public-key encryption schemes, and key encapsulation mechanisms. NIST have stated that they intend to select quantum-safe schemes for standardization at the end of the current, third round of evaluation. Read More... Full Article
leases ETSI releases test specification to comply with world-leading Consumer IoT Security standard By www.etsi.org Published On :: Tue, 12 Oct 2021 08:03:19 GMT ETSI releases test specification to comply with world-leading Consumer IoT Security standard Sophia Antipolis, 12 October 2021 ETSI has released the test specification for the existing ETSI EN 303 645, the world leading consumer IoT security standard. This test specification, ETSI TS 103 701, describes how a conformity assessment is performed in a structured and comprehensive way. This will allow supplier organizations such as manufacturers, vendors or distributers to assess the compliance of their devices against ETSI ETSI EN 303 645 in self-assessments or via testing labs. User organizations can also apply the test specification for in-house testing. Read More... Full Article
leases ETSI IPE releases the first IPv6 Enhanced Innovation Report, helping global industry players to reach consensus By www.etsi.org Published On :: Tue, 02 Nov 2021 08:28:14 GMT ETSI IPE releases the first IPv6 Enhanced Innovation Report, helping global industry players to reach consensus Sophia Antipolis, 15 October 2021 ETSI is pleased to announce the first ETSI IPv6 Enhanced Innovation (IPE) report ETSI GR IPE 001 “IPv6 Enhanced Innovation: Gap Analysis”. Jointly compiled by 15 leading IP industry players, this report comprehensively analyzes gaps based on requirements created by the new use cases and services like 5G and the cloud, to accelerate IPv6 deployment and innovations, and identifies recommendations of new features of the IPv6 enhanced innovations, paving the way for a consensus to be reached among global IP industry players. Read More... Full Article
leases ETSI releases first comprehensive global standard for securing smart phones By www.etsi.org Published On :: Wed, 24 Nov 2021 14:06:25 GMT ETSI releases first comprehensive global standard for securing smart phones Sophia Antipolis, 24 November 2021 Today our smartphones and tablets are fundamental for citizens and hold a wide range of user data and apps. At the same time, security attacks have increased with malicious applications and network eavesdropping. To define security and assurance requirements for smart phones and tablets, mitigate potential risks and protect users, ETSI has released a world class standard called Consumer Mobile Device Protection Profile, ETSI TS 103 732. The specification identifies key security and privacy risks for user data and provides appropriate protection. Read More... Full Article
leases ETSI releases Report on Coordinated Vulnerability Disclosure By www.etsi.org Published On :: Thu, 17 Feb 2022 15:24:03 GMT ETSI releases Report on Coordinated Vulnerability Disclosure - Helping organizations fix security vulnerabilities Sophia Antipolis, 17 February 2022 ETSI has released on 27 January a Guide to Coordinated Vulnerability Disclosure. The Technical Report ETSI TR 103 838 will help companies and organizations of all sizes to implement a vulnerability disclosure process and fix vulnerability issues before they’re publicly disclosed. Read More... Full Article
leases ETSI releases its Annual Report and Work Programme 2022-2023 By www.etsi.org Published On :: Thu, 21 Apr 2022 12:11:02 GMT ETSI releases its Annual Report and Work Programme 2022-2023 Sophia Antipolis, 20 April 2022 ETSI has just released its two activity documents, the Annual Report that looks back on 2021 achievements and the forward looking 2022-2023 Work Programme. Read More... Full Article
leases ETSI Releases first Report on the Role of Hardware in the Security of AI By www.etsi.org Published On :: Thu, 28 Apr 2022 07:58:26 GMT ETSI Releases Group Report on the Role of Hardware in the Security of AI Sophia Antipolis, 28 April 2022 ETSI recently released a Group Report, ETSI GR SAI 006, outlining the role of hardware in the security of artificial intelligence (AI). Read More... Full Article
leases ETSI releases first specification on 5th Generation Fixed Network (F5G) architecture By www.etsi.org Published On :: Thu, 12 May 2022 12:09:30 GMT ETSI releases first specification on 5th Generation Fixed Network (F5G) architecture Sophia Antipolis, 12 May 2022 ETSI's 5th Generation Fixed Network group (ISG F5G) has released its first specification for F5G Network Architecture ETSI GS F5G 004. This architecture will deliver a variety of services to residential and business customers over a single physical network with guaranteed SLAs (service level agreements). Read More... Full Article
leases ETSI ISG IPE releases the latest IPv6 Enhanced innovation Report By www.etsi.org Published On :: Thu, 09 Jun 2022 15:03:49 GMT ETSI ISG IPE releases the latest IPv6 Enhanced innovation Report Sophia Antipolis, 9 June 2022 Facilitating IPv6-based Network-Cloud Convergence ETSI has just published a new Group Report (GR), ETSI GR IPE 002, entitled “IPv6 based Data Centres, Network and Cloud Integration”“IPv6 based Data Centres, Network and Cloud Integration”. Developed by the ETSI IPv6 enhanced group (ISG IPE), this Report comprehensively illustrates Network-Cloud convergence architecture and the requirements to the underlying network. In addition, it highlights the role of IPv6 and its enhanced features in Network-Cloud convergence. Read More... Full Article
leases ETSI releases new specification on Quality of Service for F5G By www.etsi.org Published On :: Mon, 20 Jun 2022 13:20:08 GMT ETSI releases new specification on Quality of Service for F5G Sophia Antipolis, 20 June 2022 The ETSI's 5th-Generation Fixed Network group (F5G ISG) has released a new specification, ETSI GS F5G 005 on “High-Quality Service Experience Factors”. This specification studies the end-to-end Quality of Experience (QoE) factors for services over the broadband network. High QoE reflects the overall performance of services from the end user's perspective. It also analyses the general factors that impact service performance and identifies the overall high-QoE dimensions for each service, mainly using Virtual Reality (VR) as a benchmark for F5G applications. Read More... Full Article
leases ETSI releases new Report on IPv6-based Blockchain By www.etsi.org Published On :: Wed, 31 Aug 2022 09:39:47 GMT ETSI releases new Report on IPv6-based Blockchain Sophia Antipolis, 31 August 2022 ETSI has just released ETSI GR IPE 012, a new IPv6 Enhanced innovation (IPE) Group Report “IPv6-based Blockchain”. The report outlines how IPv6 can be utilized by blockchain networks to secure direct peer-to-peer payments between end users, as well as the potential future role of IPv6 as vital infrastructure, supporting the blockchain. Read More... Full Article
leases ETSI releases first O-RAN specification By www.etsi.org Published On :: Thu, 15 Sep 2022 14:59:13 GMT ETSI releases first O-RAN specification ETSI - Sophia Antipolis/France, O-RAN ALLIANCE - Bonn/Germany, 15 September 2022 ETSI and O-RAN are pleased to announce that ETSI has adopted the first O-RAN specification as ETSI TS 103 859, namely ‘O-RAN Fronthaul Control, User and Synchronization Plane Specification v7.02’. The document focuses on Open Fronthaul, one of the interfaces in the O-RAN Architecture for open and intelligent Radio Access Networks. It specifies the control plane, user plane and synchronization plane protocols used over the fronthaul interface linking the O-DU (O-RAN Distributed Unit) and the O-RU (O-RAN Radio Unit) for the lower layer functional splits. The scope of TS 103 859 includes both LTE and NR (5G). Read More... Full Article
leases ETSI NFV Releases Architecture Enhancements to Support Cloud-Native Network Functions By www.etsi.org Published On :: Mon, 30 Jan 2023 19:30:05 GMT Sophia Antipolis, 26 January 2023 The ETSI Industry Specification Group for Network Functions Virtualization (ISG NFV) has just published its next drop of specifications around new enhancements of the NFV architecture that will support cloud-native network functions. Read More... Full Article
leases ETSI releases new report enabling more transparent security techniques By www.etsi.org Published On :: Mon, 06 Mar 2023 10:16:04 GMT Sophia Antipolis, 6 March 2023 The ETSI group on Encrypted Traffic Integration (ISG ETI) is pleased to announce the release of the group report GR-ETI-002 “Requirements definition and analysis”, the next step for the problems previously outlined in the report GR-ETI-001 “Problem Statement”. Read More... Full Article
leases ETSI releases World First Protection Profile for Quantum Key Distribution By www.etsi.org Published On :: Thu, 27 Apr 2023 07:58:49 GMT Sophia Antipolis, 27 April 2023 ETSI has just released a Protection Profile (PP) for the security evaluation of quantum key distribution (QKD) modules, ETSI GS QKD 016. This Protection Profile is a first and anticipates the need for quantum safe cryptography. The ETSI specification will help manufacturers to submit pairs of QKD modules for evaluation under a security certification process. Read More... Full Article
leases ETSI releases first use cases for Reconfigurable Intelligent Surface By www.etsi.org Published On :: Tue, 16 May 2023 14:07:05 GMT Sophia Antipolis, 16 May 2023 ETSI is pleased to announce the release of the first Group Report developed by its Reconfigurable Intelligent Surface Industry Specification Group. The ETSI Report ETSI GR RIS-001 identifies and defines relevant RIS use cases, with corresponding general Key Performance Indicators (KPIs). It also describes deployment scenarios as well as potential requirements for each identified use case, to enable interoperability with existing and upcoming wireless technologies and networks. Read More... Full Article
leases ETSI releases three Reports on Securing Artificial Intelligence for a secure, transparent and explicable AI system By www.etsi.org Published On :: Thu, 20 Jul 2023 16:31:23 GMT Sophia Antipolis, 11 July 2023 ETSI is pleased to announce three new Reports developed by its Securing AI group (ISG SAI). They address explicability and transparency of AI processing and provide an AI computing platform security framework. The last Report is a multi-partner Proofs of Concepts framework. Read More... Full Article
leases ETSI releases World-First Report to Mitigate AI-Generated Deepfakes By www.etsi.org Published On :: Thu, 07 Sep 2023 08:01:05 GMT Sophia Antipolis, 7 September 2023 ETSI is thrilled to announce its new Group Report on Artificial Intelligence on the use of AI for what are commonly referred to as deepfakes. The Report ETSI GR SAI 011, released by the Securing AI (ISG SAI) group, focuses on the use of AI for manipulating multimedia identity representations and illustrates the consequential risks, as well as the measures that can be taken to mitigate them. Read More... Full Article
leases ETSI releases standard for IT solution providers to comply with EU regulation on electronic signatures in email messages By www.etsi.org Published On :: Tue, 19 Sep 2023 15:47:36 GMT Sophia Antipolis, 20 September 2023 ETSI has published a new standard on “Requirements for trust service providers issuing publicly trusted S/MIME certificates” (ETSI TS 119 411-6 ) helping Trust Service Providers comply with new standards for S/MIME certificates that are enforced since 1 September 2023. Secure MIME (S/MIME) certificates are used to sign, verify, encrypt, and decrypt email messages. Read More... Full Article
leases ETSI Releases TETRA Algorithms to Public Domain, maintaining the highest security for its critical communication standard By www.etsi.org Published On :: Wed, 15 Nov 2023 09:23:53 GMT Sophia Antipolis, 14 November 2023 ETSI is happy to announce that at a meeting in October of its technical committee in charge of the TETRA standard (TCCE), a full consensus was reached to make the primitives of all TETRA Air Interface cryptographic algorithms available to the public domain. Read More... Full Article
leases ETSI Releases Ground-breaking Technical Report to mitigate technology-enabled Coercive Control By www.etsi.org Published On :: Fri, 12 Apr 2024 09:02:36 GMT Sophia Antipolis, 31 January 2024 The European Telecommunications Standards Institute (ETSI) has published a significant new technical report, "ETSI TR 103 936 V1.1.1 (2024-01): Cyber Security; Implementing Design Practices to Mitigate Consumer IoT-Enabled Coercive Control". This pioneering document addresses the increasingly important issue of safeguarding individuals from coercive control through the misuse of consumer Internet of Things (IoT) devices. Coercive control encompasses a range of abusive acts such as security breaches, privacy invasions, harassment, physical assault, and other patterns of behaviour that can limit autonomy or cause emotional harm to potential targets. Read More... Full Article
leases ETSI releases its two first reports on THz communication systems By www.etsi.org Published On :: Fri, 12 Apr 2024 08:58:10 GMT Sophia Antipolis, 05 April 2024 ETSI is pleased to announce the release of the first two Group Reports developed by its Terahertz Industry Specification Group (ISG THz). They are addressing key elements in this initial phase of the pre-standardization works for THz communications: the use-cases and the spectrum. The role of ETSI ISG THz is to develop an environment where various actors from the academia, research centres, industry can share, in a consensus-driven way, their pre-standardization efforts on THz technology resulting from various collaborative research projects and global initiatives, paving the way towards future standardization. Complementing the work of other ETSI Technical Bodies and other SDOs, the group concentrates on establishing the technical foundation for the development and standardization of THz communications. Read More... Full Article
leases ETSI Releases New Guidelines to Enhance Cyber-security for Consumer IoT Devices By www.etsi.org Published On :: Thu, 31 Oct 2024 10:43:56 GMT Sophia Antipolis, 31 October 2024 Protect Confidentiality, Integrity and Availability of Data as Smart Devices Proliferate. Read More... Full Article
leases Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources By www.tenable.com Published On :: Fri, 08 Nov 2024 09:00:00 -0500 CISA is warning about a spear-phishing campaign that spreads malicious RDP files. Plus, OWASP is offering guidance about deepfakes and AI security. Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. And get the latest on CISA’s international plan, Interpol’s cyber crackdown and ransomware trends.Dive into six things that are top of mind for the week ending Nov. 8.1 - CISA: Beware of nasty spear-phishing campaignProactively restrict outbound remote-desktop protocol (RDP) connections. Block transmission of RDP files via email. Prevent RDP file execution.Those are three security measures cyber teams should proactively take in response to an ongoing and “large scale” email spear-phishing campaign targeting victims with malicious RDP files, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA).A foreign threat actor is carrying out the campaign. Several vertical sectors, including government and IT, are being targeted.“Once access has been gained, the threat actor may pursue additional activity, such as deploying malicious code to achieve persistent access to the target’s network,” CISA’s alert reads. Other CISA recommendations include:Adopt phishing-resistant multi-factor authentication (MFA), such as FIDO tokens, and try to avoid SMS-based MFAEducate users on how to spot suspicious emailsHunt for malicious activity in your network looking for indicators of compromise (IoCs) and tactics, techniques and proceduresAlthough CISA didn’t name the hacker group responsible for this campaign, its alert includes links to related articles from Microsoft and AWS that identify it as Midnight Blizzard. Also known as APT29, this group is affiliated with Russia’s government.To get more details, check out the CISA alert “Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments.”For more information about securing RDP tools:“Commonly Exploited Protocols: Remote Desktop Protocol (RDP)” (Center for Internet Security)“What is remote desktop protocol (RDP)?” (TechTarget)“Wondering Whether RDP IS Secure? Here's a Guide to Remote Desktop Protocol” (AllBusiness)“Why remote desktop tools are facing an onslaught of cyber threats” (ITPro)“'Midnight Blizzard' Targets Networks With Signed RDP Files” (Dark Reading)2 - OWASP issues AI security resourcesHow should your organization respond to deepfakes? What’s the right way of establishing a center of excellence for AI security in your organization? Where can you find a comprehensive guide of tools to secure generative AI applications?These questions are addressed in a new set of resources for AI security from the Open Worldwide Application Security Project’s OWASP Top 10 for LLM Application Security Project. The new resources are meant to help organizations securely adopt, develop and deploy LLM and generative AI systems and applications “with a comprehensive strategy encompassing governance, collaboration and practical tools,” OWASP said in a statement.These are the new resources:“The Guide for Preparing and Responding to Deepfake Events,” which unpacks four types of deepfake schemes – financial fraud, job interview fraud, social engineering and misinformation – and offers guidance about each one in these areas:preparationdetection and analysiscontainment eradication and recoverypost-incident activity“The LLM and GenAI Center of Excellence Guide,” which aims to help CISOs and fellow organization leaders create a center of excellence for generative AI security that facilitates collaboration among various teams, including security, legal, data science and operations, so they can develop:Generative AI security policiesRisk assessment and management processesTraining and awarenessResearch and development“The AI Security Solution Landscape Guide,” which offers security teams a comprehensive catalog of open source and commercial tools for securing LLMs and generative AI applications.To get more details, read OWASP’s announcement “OWASP Dramatically Expands GenAI Security Guidance.”For more information about protecting your organization against deepfakes:“How to prevent deepfakes in the era of generative AI” (TechTarget)“Deepfake scams escalate, hitting more than half of businesses” (Cybersecurity Dive)“The AI Threat: Deepfake or Deep Fake? Unraveling the True Security Risks” (SecurityWeek)“How deepfakes threaten biometric security controls” (TechTarget)“Deepfakes break through as business threat” (CSO)3 - Fake update variants dominate list of top malware in Q3Hackers are doubling down on fake software-update attacks.That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter.Malware variants used to carry out fake browser-update attacks took the top four spots on the list: SocGholish, LandUpdate808, ClearFake and ZPHP. Collectively, they accounted for 77% of the quarter’s malware infections. It's the first time LandUpdate808 and ClearFake appear on this quarterly list.(Source: “Top 10 Malware Q3 2024”, Center for Internet Security, October 2024)In a fake software-update attack, a victim gets duped into installing a legitimate-looking update for, say, their preferred browser, that instead infects their computers with malware.Here’s the full list, in descending order:SocGholish, a downloader distributed through malicious websites that tricks users into downloading it by offering fake software updates LandUpdate808, a JavaScript downloader distributed through malicious websites via fake browser updatesClearFake, another JavaScript downloader used for fake browser-update attacksZPHP, another JavaScript downloader used for fake software-update attacksAgent Tesla, a remote access trojan (RAT) that captures credentials, keystrokes and screenshotsCoinMiner, a cryptocurrency miner that spreads using Windows Management Instrumentation (WMI)Arechclient2, also known as SectopRAT, is a .NET RAT whose capabilities include multiple stealth functionsMirai, a malware botnet that compromises IoT devices to launch DDoS attacksNanoCore, a RAT that spreads via malspam as a malicious Excel spreadsheetLumma Stealer, an infostealer used to swipe personally identifiable information (PII), credentials, cookies and banking informationTo get more information, the CIS blog “Top 10 Malware Q3 2024” offers details, context and indicators of compromise for each malware strain.For details on fake update attacks:“Fake browser updates spread updated WarmCookie malware” (BleepingComputer)“Beware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware” (The Hacker News)“Hackers Use Fake Browser Updates for AMOS Malware Attacks Targeting Mac Users” (MSSP Alert)“Malware crooks find an in with fake browser updates, in case real ones weren't bad enough” (The Register)“Fake Google Chrome errors trick you into running malicious PowerShell scripts” (BleepingComputer)VIDEOFake Chrome Update Malware (The PC Security Channel)4 - CISA’s first international plan unveiledCISA has released its first-ever international plan, which outlines a strategy for boosting the agency’s collaboration with cybersecurity agencies from other countries.Aligning cybersecurity efforts and goals with international partners is critical for tackling cyberthreats in the U.S. and abroad, according to the agency.The three core pillars of CISA’s “2025 - 2026 International Strategic Plan” are:Help make more resilient other countries’ assets, systems and networks that impact U.S. critical infrastructureBoost the integrated cyber defenses of the U.S. and its international partners against their shared global cyberthreatsUnify the coordination of international activities to strengthen cyberdefenses collectivelyThe plan will allow CISA to “reduce risk to the globally interconnected and interdependent cyber and physical infrastructure that Americans rely on every day,” CISA Director Jen Easterly said in a statement.5 - Interpol hits phishers, ransomware gangs, info stealersInterpol and its partners took down 22,000 malicious IP addresses and seized thousands of servers, laptops, and mobile phones used by cybercriminals to conduct phishing scams, deploy ransomware and steal information.The four-month global operation, titled Synergia II and announced this week, involved law enforcement agencies and private-sector partners from 95 countries and netted 41 arrests.“Together, we’ve not only dismantled malicious infrastructure but also prevented hundreds of thousands of potential victims from falling prey to cybercrime,” Neal Jetton, Director of Interpol’s Cybercrime Directorate, said in a statement.In Hong Kong, more than 1,000 servers were taken offline, while authorities in Macau, China took another 291 servers offline. Meanwhile, in Estonia, authorities seized 80GB of server data, which is now being analyzed for links to phishing and banking malware.For more information about global cybercrime trends:“AI-Powered Cybercrime Cartels on the Rise in Asia” (Dark Reading)“AI Now a Staple in Phishing Kits Sold to Hackers” (MSSP Alert)“The Business of Cybercrime Explodes” (BankDirector)“Nation state actors increasingly hide behind cybercriminal tactics and malware” (CSO)6 - IST: Ransomware attacks surged in 2023Ransomware gangs went into hyperdrive last year, increasing their attacks by 73% compared with 2022, according to the non-profit think tank Institute for Security and Technology (IST).The IST attributes the sharp increase in attacks to a shift by ransomware groups to “big game hunting” – going after prominent, large organizations with deep pockets. “Available evidence suggests that government and industry actions taken in 2023 were not enough to significantly reduce the profitability of the ransomware model,” reads an IST blog.Global Ransomware Incidents in 2023Another takeaway: The ransomware-as-a-service (RaaS) model continued to prove extremely profitable in 2023, and it injected dynamism into the ransomware ecosystem. The RaaS model prompted ransomware groups “to shift allegiances, form new groups, or iterate existing variants,” the IST blog reads.The industry sector that ransomware groups hit the hardest was construction, followed by hospitals and healthcare, and by IT services and consulting. Financial services and law offices rounded out the top five.To learn more about ransomware trends:“Ransomware Is ‘More Brutal’ Than Ever in 2024” (Wired)“Ransomware on track for record profits, even as fewer victims pay” (SC Magazine)“How Can I Protect Against Ransomware?” (CISA)“How to prevent ransomware in 6 steps” (TechTarget)“Steps to Help Prevent & Limit the Impact of Ransomware” (Center for Internet Security) Full Article
leases OSC releases 2024 Investment Fund Survey Data Dashboard By www.osc.ca Published On :: Tue, 15 Oct 2024 13:59:16 GMT TORONTO - The Ontario Securities Commission (OSC) is pleased to announce the release of the 2024 Investment Fund Survey (IFS) data dashboard. Full Article
leases PrecisionPath Consortium Releases Technology Roadmap for Large-Scale Manufacturing By www.qualitymag.com Published On :: Wed, 05 Sep 2018 00:00:00 -0400 July PPC meeting at the CMSC Conference concludes last phase of Roadmap project. Full Article
leases Maplesoft Releases Online Courseware Environment for STEM By www.maplesoft.com Published On :: Thu, 20 Apr 2017 04:00:00 Z Maplesoft today released Möbius, a hands-on learning tool focused on science, technology, engineering and mathematics education. The online courseware environment provides an interactive platform for students to explore STEM concepts, visualize problems and solutions, and receive real-time assessment feedback. Full Article
leases AHR Expo releases 2025 Education Program By www.achrnews.com Published On :: Mon, 04 Nov 2024 18:00:08 -0500 The AHR Expo (International Air-Conditioning, Heating, Refrigerating Exposition) released the full schedule for the 2025 AHR Expo Education Program. Full Article
leases Trane Product Releases Aim to Help Customers Meet Decarbonization, Efficiency Goals By www.achrnews.com Published On :: Tue, 18 Apr 2023 00:00:00 -0400 Trane introduces Thermal Battery™ Storage-Source Heat Pump System, Trane/Mitsubishi Electric HVRF, Versatile Axiom™ Water Source Heat Pumps, Next-Generation Precedent® Rooftop Units, and two enhanced air handlers. Full Article
leases CISA Releases Eight Industrial Control Systems Advisories By seclists.org Published On :: Tue, 21 Mar 2023 19:26:19 GMT Posted by CISA on Mar 21Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Secure Tomorrow You are subscribed to Cybersecurity Advisories for Cybersecurity and Infrastructure Security Agency. This information has recently been updated, and is now available. CISA Releases Eight Industrial Control Systems Advisories [ https://www.cisa.gov/news-events/alerts/2023/03/21/cisa-releases-eight-industrial-control-systems-advisories ] 03/21/2023 08:00 AM... Full Article
leases CISA Releases Six Industrial Control Systems Advisories By seclists.org Published On :: Thu, 23 Mar 2023 17:24:17 GMT Posted by CISA on Mar 23Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Secure Tomorrow You are subscribed to Cybersecurity Advisories for Cybersecurity and Infrastructure Security Agency. This information has recently been updated, and is now available. CISA Releases Six Industrial Control Systems Advisories [ https://www.cisa.gov/news-events/alerts/2023/03/23/cisa-releases-six-industrial-control-systems-advisories ] 03/23/2023 08:00 AM EDT... Full Article
leases Apple Releases Security Updates for Multiple Products By seclists.org Published On :: Tue, 28 Mar 2023 17:12:59 GMT Posted by CISA on Mar 28Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Secure Tomorrow You are subscribed to Cybersecurity Advisories for Cybersecurity and Infrastructure Security Agency. This information has recently been updated and is now available. Apple Releases Security Updates for Multiple Products [ https://www.cisa.gov/news-events/alerts/2023/03/28/apple-releases-security-updates-multiple-products ] 03/28/2023 01:00 PM EDT Apple... Full Article
leases XGIMI Releases Horizon S Series Hybrid Projectors By www.projectorcentral.com Published On :: Tue, 15 Oct 2024 03:00:00 PDT XGIMI has released the Horizon S series lifestyle projectors featuring an advanced hybrid laser/LED light source that achieves wide BT.2020 gamut while minimizing laser speckle and color fringing. Full Article Home Theater Projectors
leases Hisense Releases PL2 Single-Laser UST Projector By www.projectorcentral.com Published On :: Fri, 25 Oct 2024 03:00:00 PDT Hisense has bolstered its 2024-2025 UST line-up with the PL2, a cost effective single-laser model that brings many of the desirable features of its higher end offering at an attractive $2,499 price point. Full Article Home Theater Projectors
leases U.S. Plastics Pact Releases Guides to Advance Circular Economy for Plastics By www.packagingstrategies.com Published On :: Thu, 22 Aug 2024 00:00:00 -0400 Comprehensive playbooks on recyclability, reuse and compostability offer roadmap for sustainable plastic management. Full Article
leases Sustainability in Packaging US 2025 Releases Agenda By www.packagingstrategies.com Published On :: Thu, 31 Oct 2024 12:28:51 -0400 Returning to Swissotel Chicago, Sustainability in Packaging US 2025 will take place March 5-7 Full Article
leases SOMA Releases Next-Generation Slitters By www.packagingstrategies.com Published On :: Tue, 15 Nov 2022 13:07:25 -0500 SOMA increases the performance parameters of its slitters, offering greater speed and larger rewind roll diameter. Full Article
leases BMG Releases the Mantis Robotic Trim Press Handler By www.packagingstrategies.com Published On :: Tue, 24 Jan 2023 14:59:55 -0500 The new machine is the industry’s first robotic automated system that can reliably handle the flow of parts ejected from any trim press, as the system enables full automation of the entire thermoforming process. Full Article
leases WeighPack Releases High Pressure Washdown Vertical Bagging Machine By www.packagingstrategies.com Published On :: Fri, 17 Feb 2023 14:27:04 -0500 The updated VF-1200 is more sanitary, allowing for high pressure washdown needs to be met. Full Article
leases Tequila Cayéya Releases Limited-Edition Duo of the Devils vs Angels Tequilas By www.packagingstrategies.com Published On :: Mon, 01 Jul 2024 14:13:04 -0400 These tequilas are a part of the brand’s Devils vs. Angels themed release and come just in time for summer. With only 1,200 bottles of each expression available, they’re a must-have for tequila aficionados. Full Article
leases McDonald's Releases Sustainable Packaging for New Mini McFlurry By www.packagingstrategies.com Published On :: Wed, 04 Sep 2024 15:59:20 -0400 The four-flap cups are currently available in several other international markets like Canada and Indonesia – and this month, it’s finally time for U.S. fans to try them out. Full Article
leases Ishida Europe Releases New Version of Automatic Case Packing System By www.packagingstrategies.com Published On :: Thu, 14 Sep 2023 12:26:34 -0400 The ACP-722 RRP offers one of the smallest footprints currently available, being up to 50% smaller than equivalent casepacker models. Full Article
leases Ball releases report touting Eyeris printing technology for aluminum packaging By www.packagingstrategies.com Published On :: Wed, 27 Sep 2023 00:00:00 -0400 Eyeris® comes in nine vivid colors and adapts to various sizes and shapes of aluminum cans and impact extruded bottles, making it versatile for beverage, household and personal care products. Full Article
leases Cambio Roasters Releases Aluminum Coffee Pods By www.packagingstrategies.com Published On :: Wed, 25 Sep 2024 12:20:47 -0400 The aluminum coffee pod addresses the environmental crisis caused by the 40 million plastic coffee pods that end up in landfills and oceans every day, offering a more eco-friendly and high-quality alternative. Full Article
leases Mettler Toledo Releases X52 Dual Energy X-Ray Inspection System By www.packagingstrategies.com Published On :: Wed, 09 Oct 2024 12:16:14 -0400 The X52’s proprietary software provides increased adaptability by seamlessly transitioning between single energy, dual energy or both modes, optimizing the performance of the system depending on the application. Full Article
leases NAB Releases New Training Course on FCC Radio Regulations By www.nab.org Published On :: 15 Mar 2021 00:00:00 EST Full Article
leases NAB Releases New Spots for Broadcasters for "Depend on AM" Campaign By www.nab.org Published On :: 17 Apr 2023 00:00:00 EST Washington, D.C. -- The National Association of Broadcasters today released new radio spots and digital ads highlighting the importance of AM radio in the automobile. These tools include a direct call to action for consumers to contact Congress and will further enhance NAB's advocacy efforts to keep AM radio in the car dashboard. Full Article
leases OSCE Mission releases report on war crimes processing at state level in Bosnia and Herzegovina By feeds.osce.org Published On :: Fri, 17 Jun 2016 14:28:36 +0000 SARAJEVO, 16 June 2016 – The OSCE Mission to Bosnia and Herzegovina today published the report of Judge Joanna Korner CMG QC on war crimes processing at the state level in Bosnia and Herzegovina. At a press conference held on this occasion, Ambassador Jonathan Moore, Head of the OSCE Mission to BiH, noted that the OSCE Mission to Bosnia and Herzegovina has been monitoring the prosecution of war crimes before the domestic courts of BiH since 1996, as part of its mandate under the Dayton Peace Accords. “In 2003, the Mission developed an increasingly structured trial monitoring capacity. In November 2006, the BiH High Judicial and Prosecutorial Council issued an Opinion recognizing the role of the Mission in observing criminal proceedings, stating that the OSCE Mission’s trial monitors should be given ‘full and unrestricted access to all documents they request within their mandate which includes monitoring the activities of courts and prosecutors’ offices,’” said Moore. The Mission has carried out training courses and other capacity-building activities for judicial and prosecutorial staff, and provided expert advice to the judiciary based on its findings. “The Mission is routinely asked to provide information and analysis regarding the quality of war crimes processing at the state and entity levels. These inquiries come from a variety of sources, including private persons, victims’ and survivors’ associations, ICTY, and employees of BiH judicial institutions,” said Moore. “The purpose of such inquiries is generally to understand the capacity of domestic judicial institutions for processing war crimes cases in a manner that is fair to the interests of both victims and defendants and in line with international standards, and to identify gaps in the processing of such cases.” Moore emphasized that it is normal in democratic societies to have a vigorous public debate about judicial processes. “No one is universally happy with every verdict, sentence, conviction, and acquittal. Nevertheless, justice has yet to be done in many cases, more than 20 years after the end of the war in Bosnia and Herzegovina.” In accordance with the mandate, role, and authorities of the Mission, with the support of the HJPC and in coordination with ICTY Chief Prosecutor Serge Brammertz and the British Embassy, Judge Korner was engaged by the OSCE Mission to BiH on the basis of her professional background and knowledge. Judge Korner visited BiH twice in order to review available materials, speak with prosecutors, judges, and others, and prepare an analytical report that would offer suggestions as to how to improve the processing of war crimes at the state level, at which the most complex and serious war crimes, crimes against humanity, and genocide cases, are processed. “The work of Judge Korner, her analysis and concrete advice are very valuable. It is of course up to the institutions themselves, including the HJPC, the Prosecutor’s Office of BiH, and the Court of BiH to react to the report and to act upon its recommendations. We respect the role of those institutions in guaranteeing the rule of law in Bosnia and Herzegovina.” The Mission’s work in this regard is supported financially as part of its core budget and by additional contributions from the European Union, the United States, the United Kingdom, Switzerland, Norway, Germany, Italy, and Austria, and is closely co-ordinated with the International Criminal Tribunal for the former Yugoslavia.Related StoriesJudges and prosecutors in Bosnia and Herzegovina, at OSCE meeting, learn about videoconferencing to reach remote witnessesWar crimes prosecutors in Bosnia and Herzegovina, at OSCE meeting in Mostar, discuss cases involving enforced disappearanceOSCE supports international conference on obstacles in prosecuting war crimes in Bosnia and Herzegovina Full Article OSCE Mission to Bosnia and Herzegovina Rule of law South-Eastern Europe Press release
leases xlibre Xnest security advisory & bugfix releases By seclists.org Published On :: Thu, 31 Oct 2024 17:02:37 GMT Posted by Enrico Weigelt, metux IT consult on Oct 31XLibre project security advisory --------------------------------- As Xlibre Xnest is based on Xorg, it is affected by some security issues which recently became known in Xorg: CVE-2024-9632: can be triggered by providing a modified bitmap to the X.Org server. CVE-2024-9632: Heap-based buffer overflow privilege escalation in _XkbSetCompatMap See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632 Affected versions: * 24.1.0... Full Article