Saturday, February 1, 2025

Trump Agenda is Spreading 2-1-25

Trump is encouraging States to solve their problems. California needs to stop dumping their water in the Pacific Ocean and begin developing reservoirs to store this water.  California also needs to begin protecting residential areas from fires using proven methods of removing dry brush from forest areas. 

Trump is encouraging European Countries to expand their Private Sector Economies. France and Briton have responded to the call to focus on improving their economies using Trumps Agenda to put their countries first. European countries need to reduce their 20% “Value-Added” Sales Taxes to give their citizens a break. The cost of maintaining the EU plus their own governments is excessive. Europe need to decrease their Sales Tax to 10% to give their citizens a break. Trump’s plan to increase oil and natural gas production will increase the Supply and lower the cost of energy across the globe. This will lower the cost of crops that requires Nitrogen Fertilizer that is made from Natural Gas.

European Countries are deporting the “refugees” they accepted in 2015. According to recent EU statistics, in the third quarter of 2024, over 112,000 non-EU citizens were ordered to leave an EU country, with France issuing the most orders to leave, followed by Germany and Spain; the most common nationalities ordered to leave were Algerian, Moroccan, Syrian, Turkish, and Afghan; and while the number of deportation orders increased slightly, the number of individuals actually returned to third countries also rose, with France, Germany, and Spain reporting the highest figures. 

https://www.google.com/search?q=refugee+deportation+in+europe+statistics&oq=refugee+deporataion+in+europe+&gs_lcrp=EgZjaHJvbWUqCQgEECEYChigATIGCAAQRRg5MgkIARAhGAoYoAEyCQgCECEYChigATIJCAMQIRgKGKABMgkIBBAhGAoYoAEyCQgFECEYChigATIHCAYQIRiPAtIBCTM3NDI4ajBqN6gCALACAA&sourceid=chrome&ie=UTF-8

Norb Leahy, Dunwoody GA Tea Party Leader

 

AI Investment in US 2-1-25

$1.1 trillion is being invested in the US by other countries. The Saudis are providing $600B of this investment. The plan is to build facilities to generate and maintain AI Software for high-speed processing. The Energy required to increase processing speed will come from Small Nuclear Power Plants on-site in these facilities. 

Cyber Security is required.

IBM® Guardium® Data Security Center helps you manage the data security lifecycle, from discovery to remediation, and empowers multi-disciplinary teams to effectively manage data vulnerabilities and risks. It offers five modules to protect data across all data types and environments.

Unveil Critical Cloud Security Hurdles

Remain aware of obstacles in application development and cloud security as organizations strive to optimize processes and safeguard data assets. Our research revealed the following:   

·        61% of organizations fear AI-powered attacks compromise sensitive data.

·        33% struggle to keep up with rapid technology changes and evolving threats.

·        91% of respondents say point tools create blind spots affecting threat prevention.

·        54% cite complexity and fragmentation in cloud environments as a top data security problem.

We are pleased to present Red Canary’s 2024 Threat Detection Report. Our sixth annual retrospective, this report is based on in-depth analysis of nearly 60,000 threats detected across our 1,000+ customers’ endpoints, networks, cloud infrastructure, identities, and SaaS applications over the past year.

This report provides you with a comprehensive view of this threat landscape, including new twists on existing adversary techniques, and the trends that our team has observed as adversaries continue to organize, commoditize, and ratchet up their cybercrime operations.

As the technology that we rely on to conduct business continues to evolve, so do the threats that we face. Here are some of our key findings:

·        Everyone is migrating to the cloud, including bad guys: Cloud Accounts was the fourth most prevalent ATT&CK technique we detected this year, increasing 16-fold in detection volume and affecting three times as many customers as last year.

·        Despite a spate of new CVEs, humans remained the primary vulnerability that adversaries took advantage of in 2023. Adversaries used compromised identities to access cloud service APIs, execute payroll fraud with email forwarding rules, launch ransomware attacks, and more.

·        While both defenders and cybercriminals have discovered use cases for generative artificial intelligence (GenAI), we see defenders as having the edge.

·        Container technology is omnipresent, and it’s as important as ever to secure your Linux systems to prevent adversaries from escaping to host systems.

·        Mac threats are no myth–this year we saw more stealer activity on macOS environments than ever, along with instances of reflective code loading and AppleScript abuse.

·        Often dismissed, malvertising threats delivered payloads far more serious than adware, as exemplified by the Red Canary-named Charcoal Stork, our most prevalent threat of the year, and related malware ChromeLoader and SmashJacker.

·        Our new industry analysis showcases how adversaries reliably leverage the same small set of 10-20 techniques against organizations, regardless of their sector or industry.

We also check back on the timeless threats and techniques that are prevalent year-after-year, explore emerging ones that are worth keeping an eye on, and introduce two new free tools that security teams can start using immediately.

Use this report to:

·        Explore the most prevalent and impactful threatstechniques, and trends that we’ve observed.

·        Note how adversaries are evolving their tradecraft as organizations continue their shift to cloud-based identity, infrastructure, and applications.

·        Learn how to emulate, mitigate, and detect specific threats and techniques.

·        Shape and inform your readiness, detection, and response to critical threats.

Behind the data Methodology

The Threat Detection Report sets itself apart from other annual reports with its unique data and insights derived from a combination of expansive detection coverage and expert, human-led investigation and confirmation of threats. The data that powers Red Canary and this report are not mere software signals—this data set is the result of hundreds of thousands of expert investigations across millions of protected systems. Each of the nearly 60,000 threats that we responded to have one thing in common: These threats weren’t prevented by our customers’ expansive security controls—they are the product of a breadth and depth of analytics that we use to detect the threats that would otherwise go undetected.

Comments

Using AI to train a programmable robot is probably not a risk. Using AI to streamline automated payments within your Operating System and Business Databases should be controllable with strong Cyber Security capability. Making the Cloud non-hackable looks difficult. Developing something like the Israelis used against Hizballah looks promising. We need to avoid “never-ending Measures and Countermeasures”.

Norb Leahy, Dunwoody GA Tea Party Leader