Back to news

July 4, 2024 | International, Security

Microsoft Uncovers Critical Flaws in Rockwell Automation PanelView Plus

Microsoft reveals critical security flaws in Rockwell Automation devices, allowing remote code execution and DoS attacks.

https://thehackernews.com/2024/07/microsoft-uncovers-critical-flaws-in.html

On the same subject

  • Teams Will Test Concepts for Exploring Underground in SubT Integration Exercise

    January 23, 2019 | International, Land

    Teams Will Test Concepts for Exploring Underground in SubT Integration Exercise

    In early April, nine qualified teams will attempt to remotely navigate the dark and dirty corridors of Edgar Experimental Mine in Idaho Springs, Colorado, in preparation for the Circuits Stage of the DARPA Subterranean (SubT) Challenge later this year. The SubT Integration Exercise, known as STIX, offers teams an opportunity to try out their technologies, including robotics, sensors, and communications solutions, in a representative environment. The locations for the Circuits Stage events have not been announced. The Subterranean Challenge seeks to revolutionize how first responders and warfighters operate in human-made tunnel systems, urban underground settings, and natural cave networks that are too dangerous, dark, deep, and unknown to risk human lives. Teams are competing to develop breakthrough technologies that rapidly and remotely map, navigate, and search subterranean environments. To qualify for STIX, teams were required to demonstrate baseline performance capabilities and appropriate safety measures. The participating teams and members are as follows: CERBERUS: CollaborativE walking & flying RoBots for autonomous ExploRation in Underground Settings University of Nevada, Reno ETH Zurich, Switzerland Sierra Nevada Corporation University of California, Berkeley Flyability, Switzerland CoSTAR: Collaborative SubTerranean Autonomous Resilient Robots Jet Propulsion Laboratory California Institute of Technology Massachusetts Institute of Technology KAIST, South Korea CRAS: Center for Robotics and Autonomous Systems Czech Technological University, Czech Republic Université Laval, Canada CRETISE: Collaborative Robot Exploration and Teaming In Subterranean Environments Endeavor Robotics Neya Systems CSIRO Data61 Commonwealth Scientific and Industrial Research Organisation, Australia Emesent, Australia Georgia Institute of Technology Explorer Carnegie Mellon University Oregon State University MARBLE: Multi-agent Autonomy with Radar-Based Localization for Exploration University of Colorado, Boulder University of Colorado, Denver Scientific Systems Company, Inc. PLUTO: Pennsylvania Laboratory for Underground Tunnel Operations University of Pennsylvania Exyn Technologies Ghost Robotics Robotika.cz Robotika.cz, Czech Republic Czech University of Life Science, Czech Republic The SubT Challenge comprises two competitions – the Systems Competition, where teams will develop novel hardware solutions to compete in physical underground environments, and the Virtual Competition, where teams will develop software-based solutions to test in simulated scenarios. Teams will compete in three preliminary Circuit events and a Final event pursuing high-risk and high-reward approaches. The Final event, planned for 2021, will put teams to the test with courses that incorporate diverse challenges from all three environments. Teams in the Systems track will compete for up to $2 million in the Systems Final event, with up to $200,000 in additional prizes available for self-funded teams in each of the Systems Circuit events. Teams in the Virtual track will compete for up to $1.5 million in the Virtual Final event, with additional prizes of up to $500,000 for self-funded teams in each of the Virtual Circuit events. Other teams interested in participating in the SubT Challenge may submit their qualification materials to be eligible for future events. The next qualification deadline is April 22, 2019, to establish eligibility for the Tunnel Circuit in August. Requirements can be found in the SubT Qualification Guide available on the Resources Page. Interested teams are also encouraged to join the SubT Community Forum, where they can engage with other participants and ask any questions. For additional information on the DARPA Subterranean Challenge, please visit www.subtchallenge.com. Please email questions to SubTChallenge@darpa.mil. https://www.darpa.mil/news-events/2019-01-22

  • Contracts for March 2, 2021

    March 3, 2021 | International, Aerospace, Naval, Land, C4ISR, Security

    Contracts for March 2, 2021

    Today

  • CENTCOM chief: The future of warfare demands more cyber authorities

    December 19, 2018 | International, C4ISR

    CENTCOM chief: The future of warfare demands more cyber authorities

    By: Justin Lynch The Pentagon has received more power to conduct cyber operations in the past 18 months. But for the top Army commander in the Middle East and Central Asia, the new authority is not enough. The head of U.S. Central Command, Gen. Joseph Votel, wrote in a Dec. 18 paper that the Pentagon must “normalize” electronic warfare and cyberattacks and incorporate them into daily operations. “Normalizing the cyberspace domain means broader authorities that are more responsive than current bureaucratic processes,” Votel wrote in the Army's Cyber Defense Review. “It also means we need simple and streamlined organizations and processes to increase lethality and enhance performance.” The paper was coauthored by Votel, Maj. Gen. Julazadeh and Maj. Weilun Lin. “Our failure to operationalize and normalize the cyberspace domain effectively cedes it to our adversaries, gives them a competitive advantage and, ultimately, creates an increased attack vector against our objectives,” the authors said. President Trump gave the Pentagon new authorities to conduct cyber operations in August and minimized the process where other agencies can object to cyberattacks, known as “deconfliction.” Secretary of Defense Jim Mattis can conduct hacking operations without approval from the White House so long as they do not interfere with the American “national interest,” according to four current and former White House and intelligence officials who were either part of internal deliberations or briefed on the changes. Yet some current and former U.S. officials are skeptical that the new authorities will mean more effective hacking operations for the Pentagon, because it does not solve the nuances of cyberattacks. But the new mandates do not go far enough for the three officer authors, who argued that cyberwarfare should be under the same authorities as other types of operations. “We must not see cyberspace as drastically different and separate from other domains that we create new processes to prepare, plan and fight in this new domain. We continue to seek processes that smooth and simplify operations, reducing friendly friction and accelerating decision-making.” Current and former Pentagon officials have pointed to conducting cyberattacks against enemies that use networks of neutral or partner nations as an area where the Pentagon has changed its decision-making process in recent years. Those officials also pointed to how the Pentagon was able to use hybrid warfare tactics during the 2016 liberation of Mosul, Iraq, as a textbook example of future hybrid operations. Votel, Julazadeh and Lin echoed the sentiment of other Pentagon officials who have advocated for cyberattacks, electronic warfare and other information operations to be integrated earlier in military operations. “We need to proactively execute cyberspace and information operations early in 'Phase 0 / steady state' of the planning process — well before operation execution. Only then can we shape the [information environment], hold our adversaries' capabilities at risk and execute at the speed of war,” the three wrote. For example, Pentagon officials say they closely monitored Russia's 2014 hybrid war in Ukraine and learned from Moscow's tactics. Votel, Julazadeh and Lin shed light on the changes, writing that information operations were previously “integrated as an afterthought.” Yet over the last two years, Central Command has incorporated cyberattacks, electronic warfare and military deception at the “strategic level.” And this hybrid warfare has driven new acquisition demands in the Pentagon. “We need technology and capabilities to keep pace with the operational environment and continue to build the partnerships to do so,” the three officers wrote. In recent years, Central Command has bolstered its hybrid warfare through new contracts. The centerpiece of that effort is a July 2017 contract worth $621 million to Science Applications International Corporation for IT support to Central Command that could last seven years. In August 2018, Vistra communications was also awarded a $22 million contract to support offensive and defensive cyber operations for Central Command. https://www.fifthdomain.com/dod/2018/12/18/centcom-chief-the-future-of-warfare-demands-more-cyber-authorities

All news