Iranian Architecture – Afarin Rahmanifar Wed, 19 Jan 2022 16:52:05 +0000 en-US hourly 1 Iranian Architecture – Afarin Rahmanifar 32 32 Iranian-born Australian artist Hossein Valamanesh dies aged 72 Wed, 19 Jan 2022 10:43:34 +0000

The Art Gallery of South Australia remembers the life and career of famous Iranian-born Australian artist Hossein Valamanesh (born 2 March 1949), who died suddenly on Saturday 15 January 2022.

AGSA Director Rhana Devenport ONZM said: “Hossein’s passing leaves us all deeply shocked and saddened at AGSA – it has been a great privilege for AGSA to work so closely with him for decades and to witness his the extraordinary impact he had nationally and internationally. We have lost a true poet.

Born in Iran in 1949, Hossein entered the art school in Tehran at the age of 15 and graduated in 1970 focusing on political and socially charged work. Hossein immigrated to Australia in 1973 and graduated from the South Australian School of Art in 1977. Drawing inspiration from the cultural and natural worlds of his birthplace and adopted country in Australia, Hossein explored the intertwined spheres of love, spirituality and nature with frequent references. to the artist’s constant interest in poetry, in particular the texts of the Persian poet Jalâl ad-Dîn Rûmî.

Hossein’s work, in his words, has often explored “notions of an essential connection to place, the nature of being, and the transience of existence.” Her practice has embraced a wealth of materiality including sculpture, text, photography, installation, architecture, large-scale public art and the moving image.

Hossein and his wife and frequent collaborator of 46 years, Angela Valamanesh, have been leaders in the national and international artistic community. Angela and Hossein Valamanesh’s art will feature prominently in Adelaide 2022 Australian Art Biennial: Free/State, curated by Sebastian Goldspink, which opens March 4 at the AGSA.

“Despite Hossein’s tragic passing, his legacy will continue to inspire, amaze and resonate with our visitors here at AGSA every day. We are grateful to Angela to soon present her collaborative work with Hossein as part of the Adelaide Biennial of Australian Art: Free/State, which once again demonstrates their rich artistic and personal relationship,” said Rhana Devenport.

Hossein has had over thirty solo exhibitions around the world and his work has been seen in Canada, France, UK, Switzerland, India, United Arab Emirates, Singapore, Japan and Iran. Hossein’s major European solo exhibition Since Everything Passes is currently on view at the Institut des Cultures d’Islam (ICI) in Paris until February 13 – with the accompanying publication now available from the AGSA shop.

Several of Hossein’s works are on display at the AGSA, including Untitled, 1994 and After rain, 2013. Hossein’s work is held in many important collections in Australia, including the National Gallery of Victoria, Melbourne, the National Gallery of Australia , Canberra, the Art Gallery of South Australia, Adelaide, Kadist Art Foundation, Paris, Museum of New Zealand Te Papa Tongarewa, Wellington, and Sara Hilden Art Museum, Finland.

His public art commissions are installed in Australia and Japan. Hossein received the Dhaka Biennial Grand Prize, Bangladesh in 1998, a Member of the Order of Australia in 2011, the Smithsonian Artist Research Fellowship in Washington DC in 2014, and the Art Moving Image Commission of the Film Festival of Adelaide in 2015.

A memorial to celebrate the life of Hossein Valamanesh will be held with details to be announced at a later date.

The negative effects of US-Chinese competition on the future of US interests in the Middle East Sat, 08 Jan 2022 00:00:19 +0000

Many potential repercussions and negative effects may have arisen as a result of the US-China competition regionally and globally, and this conflict between them has spread to the Middle East in one way or another, especially after the signing of Israeli peace agreements with a number of Gulf countries (UAE and Bahrain), under the aegis of the United States, which made China fear an increase in American influence in the Middle -East, especially in the Arabian Gulf and the Emirates, due to the strong Israeli presence in the region. As a result, the Egyptian researcher analyzed a number of negative indicators of the trajectory of US-Chinese competition, and analyzed the extent of its future repercussions on the Middle East region, afterwards:

A disruption of oil exports from the Gulf, based on the desire to continue to ensure the flow of energy as one of the tools for maintaining world order.

China’s development and operation of fifth generation networks in the countries of the region, and this is linked to the “technological cold war which is likely to intensify in the region, and the risks it can make. weigh on security cooperation between Washington and the countries of the region “.

The expansion of the perimeter of strategic ports from which Chinese companies benefit, as part of the “Belt and Road projects”. The United States is concerned that these civilian ports could turn into military bases in times of conflict.

In addition, there is American concern about the inability to ensure the smooth flow of U.S. commerce with countries in the region and the world in general, which can confuse the U.S. economy, especially in any confrontation with it. China.

In contrast, China’s goals in the region appear clearer and less complex. China’s concern centers on (maintaining the safety of shipping lanes, continuing the flow of oil, and securing China’s extensive trade and investment interests with countries in the region).

The Biden administration has shown itself determined to maintain its role as (guarantor of the safety umbrella), despite the difference in its tools to do so compared to the previous administration. This reality reinforces the Chinese will to stay away from the conflicts in the region, perceived in China as complex and distant.

China’s approach to Belt and Road projects in the Middle East is unique and differs from the rest of the world, as it is characterized by a high degree of calm and aloofness from propaganda, desire-related behavior. of China not to send messages that it seeks to challenge the United States in the region. As long as the regional role of the United States continues, China will continue to benefit from it for the foreseeable future, and will stay away from further engaging in Middle East issues.

The Middle East can be seen as the only vital region in the world where China’s interests meet those of the United States, including freedom of navigation, the Iran nuclear deal, and the quest to end “permanent wars”. The reason for this is not only China’s desire not to carry its burdens with the United States, but also the decline of American interests in the region in recent years.

Nevertheless, the technological rivalry between the two parties remains a hot spot. Indicators so far suggest that the international arena, and at the heart of which is the Middle East, will witness the formation of a (bipolar technological world). Countries in the region are realizing that this new reality will produce great pressures on them in the future, as has happened with Israel regarding “5G” (fifth generation networks) in 2019 so far.

But, countries in the region, especially in the Gulf region, face a dilemma that (the United States has no alternatives to strategic technologies, such as fifth generation networks and intelligence (which include an essential element in their long-term development plans), such as “Vision 2030” in Saudi Arabia and Economic Vision 2030 in the United Arab Emirates. In contrast, China and Russia have no diplomatic or military alternatives through which they could (displace the United States as guarantor of the regional security equation).

Economically, most of the countries in the region are going through profound economic transformations, including structural changes, such as: (shift from dependence on oil to digitalization, and modernization of tributaries of national economies). Here, we see that relations with China are central to these plans, as China has become the largest trading partner for many countries in the region since 2016, and economic growth rates in many countries in the region. Arab Gulf and Middle East depend on their relations with China.

Here we see that although the United States has not yet presented an alternative to the Belt and Road Initiative, perhaps Washington, through its pressure, could target certain projects related to the initiative in the region.

Just as China tries to balance its relations with its opponents in the Middle East, the countries of the Middle East will, in the near future, have to try to “balance its relations with the great powers of the world”, especially in the light of the Sino-Russian alliance in the region and in the world.

This vision began to take shape quickly, as Russian Foreign Minister (Sergey Lavrov) toured the Gulf in March 2021, which included (United Arab Emirates, Saudi Arabia and Qatar). Also, Qatar and Kuwait received the Chinese official (Yang Jiechi) a member of the Central Committee of the Communist Party of China in February 2021, during which he met the leaders of the two countries.

China’s attempts in the Middle East are aimed at diversifying relations, easing pressure from Washington on its Gulf partners, and showing that it has broad options, but without sending signals that affect the (foundations of the relationship with the United States itself).

However, there are some (the countries of the region fear and hesitate to expand security relations with China in particular). These reservations are linked (to the lack of confidence in China, which insists on looking at the GCC countries and Iran on an equal footing).

In addition, major countries in the Middle East region fear that (China’s lack of security capabilities necessary to engage in the region’s politics and China’s limited security capabilities, and perhaps reluctance and China’s unwillingness to play a major role in the Middle East).

It can be concluded here that (the Gulf countries in particular do not want to replace the United States with another power, but they see the expansion of China’s economic and investment role in the region as an element of pressure on the US administration to reinforce its commitment to regional issues and support its policies).

Source link

YouTubers Can Finally Monetize Gender-Affirming Content Thu, 23 Dec 2021 18:42:00 +0000

Image of article titled YouTubers Can Finally Monetize Content With Gender-Affirming Products

Photo: Jewel Samad (Getty Images)

If you read enough stories about the inner workings of ad revenue, you’ll notice this weird incongruity that keeps coming back. On the one hand, online ads are a crucial element (although Boring AF) element of Internet architecture; the hundreds of billions dollars in digital ad spend that are dumped on the internet each year is the financial fuel that keeps your favorite streamers, retailers, and press briefings in the business. But this financial fuel is distributed by countless small middlemen, each with their own arbitrary automated systems for deciding how many dollars are distributed where.

The result, generally, is that some of those dollars do not get distributed at all, and those who do are more likely to end up funding hate speech than a site focused on, say, LGBTQ+ problems.

Queer media has gotten the end of this stick for a while, even though gay-friendly content is littered with countless TikTok feed and Instagram Ads, not to mention local store windows come june every year. Taylor Swift has a strange hymn! “Holigays” is just one word people say now! But despite this total generalization of everything LGBTQ+, these intermediaries will generally continue to view queer content, even if it is benign, as also “Icky” or “adult”To bother to monetize. While queer outlets shutter, queer journalists struggle to keep their jobs and queer streamers struggle to keep their channels monetized.

Depressing? You bet. But there is good news: This month, YouTube announcement it would expand its “advertiser-friendly content guidelines” to include videos featuring “gender identity features”. Specifically:

Uploads featuring objects that resemble genitals, such as breasts or penises, without showing nudity that help creators explain their journey against gender dysphoria may serve ads.

The line between nudity and something that “looks” like nudity is still at YouTube’s discretion, but the guidelines offer some basics: TObjects cannot primarily be used “for sexual gratification” on the one hand, and should instead be used “to simulate the weight or appearance of the genitals on the body”. This means that a transmasculine person cannot run ads next to, for example, a review of their favorite sex toy, but they can show ads next to a review of their favorite packer, or even their favorite standing pee devices. Ads can also run for free alongside videos featuring workbooks, artificial breasts, or any other device expressly designed to help a creator on their “gender dysphoria journey,” as YouTube puts it.

The platform launches LGBTQ+ community a pretty small bone here – and one that will no doubt exclude countless queer creators who express their genre outside of YouTube’s loosely defined safeguards. But it’s Something, and something that comes after year’ is exactly the opposite. From mid-2017, YouTubers who focusing their videos on queer or trans topics, suddenly discovered that the platform’s automated review systems were demonetizing their content. Despite the fact that these clips were completely safe for work, the fact that they did talk about LGBTQ+ the topics were sufficient for the content to be restricted to public view and inaccessible to advertisers.

When a creator has tried To get to the bottom of the problem in 2019, he found evidence that YouTube’s own automated system– like those of his adtech contemporaries – simply flagged words like “gay” or “lesbian” as being too “adult” for most advertisers (“heterosexual” agrees though). YouTube denied any discriminatory practices at the time, but it offered no public explanation to queer creators who found themselves demonetized en masse. A complaint filed against the platform in 2019 by a handful of these queer creators has been thrown by a California judge earlier this year.

YouTube had indeed fought this battle, so why change your mind? Good, to begin with, there is no shortage of rival plashapes chomping at the bit to woo YouTubers on their services right now.

And while YouTube can—and a!– offered tons of money to try to convince his talent to stay, eventually Instagram and TIC Tac have their own designer funds. Not only that, but these two apps have strong anchor points in the queer community, which is an advantage that YouTube clearly missing.

While this update is more about sticking with the competition than helping queer creators, the net effect is the same. YouTube’s parent company, Google, represents more than a quarter (28.6%!) Internet-wide digital ad spend, a figure only matched by other tech giants Facebook and Amazon. He brought back more than $ 7 billion in advertising revenue this most recent quarter, and this number shows no sign of get smaller.

In other words, YouTube is sort of a big deal in the online advertising world, and when it makes changes like this, the rest of the online advertising ecosystem is taking notice. Now we just need to see what they do next.

Source link

PS commentator predictions for 2022 by PS editors Fri, 17 Dec 2021 09:31:00 +0000

Forecasting is always a dangerous business. But in a world characterized by shifting power struggles, technological change, and rising temperatures, no one can claim that the future is entirely impenetrable.

Project union commentators again offered their suggestions for the most important political, economic and political developments to watch over the next 12 months. As the COVID-19 pandemic enters its third year, the drastically different ‘new normal’ from last year is no longer so new. The coronavirus continues to acquire mutations and threatens economic and social stability in the world. Global temperatures – both literal and political – continue to rise. And while a deep sense of uncertainty persists, some results are as imminent as the trends behind them are undeniable.

Daron Acemoglu

It’s hard to be optimistic about 2022. Despite all the corporate commitments and media attention focused on climate change, the COP26 conference was a failure. In 2022, we will continue to realize that greenhouse gas emissions are not decreasing and that more radical responses are needed. I am concerned that climate policy will significantly worsen the relationship between the United States and China, which is already at a breaking point. Add the intensifying repression in China and the tensions over Taiwan and you have the makings of a prolonged bout of instability.

I am also concerned about the polarization in America. US President Joe Biden’s $ 1 trillion infrastructure plan and the “Build Back Better” bill are the country’s best hopes of moving on a path of more inclusive economic growth. In general, such bold tax policies could unite the country and demonstrate that democratic politics always works for the people; yet, in today’s environment, spending plans have become another partisan football. The next year will show whether American politics can become less dysfunctional. Much will depend on how many Republicans have the courage to break with former President Donald Trump. Unfortunately, given Trump’s consolidation of control over their party, that seems unlikely.

We hope you enjoy Project union.

To continue reading and receive unlimited access to all content, subscribe now.



Unlock additional comments for FREE by signing up.


Source link

Master Chief & Cortana relationship Sun, 12 Dec 2021 21:15:00 +0000

Master Chief and the weapon in Halo Infinite from 343 Industries.

Picture: 343 Sectors

With Infinite halo, 343 Industries and Microsoft want the sixth major entry in the llong-standing shooting franchise feel like a smooth restart of the series, especially when it comes to the relationship between the Master Chief and his AI Cortana’s buddy. After his supposed death at the end of Halo 4, and Halo 5 setting him up as a digital dictator enlisting other AIs to rule the cosmos were decisions reviled by fans, Infinite is in a strange place. Does he want to skate through the events of Halo 5 and focus on a new adventure, or does he want to speak directly to his predecessor?

The answer is … sort of both, but in a bit of a weird way. And it is mainly because of this power plant Halo relationship between Master Chief and Cortana.

Image of the article titled Halo Infinite Can't Decide If This Is A Breakout Game Or Daddy's Game

Revealed before the game’s release, much of infinity the story is about Chief’s new AI buddy, the Weapon (voiced by Halo veterinarian Jen Taylor, who … well, Cortana voice). Created by the UNSC with the express intention of capturing and deleting Cortana for her past crimes in Halo 5The Weapon is just as spiritual as its predecessor, but coded as considerably younger and more pleasant. With her eyes staring at the Forerunner architecture and naive nature, the dynamic between her and Chief makes it seem like 343 is launching into make daddy play than AAA developers (in particular those from Sony, about guys with children and dead women in their lives) like to dive from time to time. The writing fully embraces this as the weapon jokes about Chief’s stoic lines and makes up names for a new kind of alien enemies encountered in Infinite called infinity. Sometimes that new youthful trick works, like when she gives a pep talk to the frustrated pilot in a way the Master Chief just isn’t fully emotionally equipped to do. Other times it’s a really naked attempt at nostalgia for fans of the original. Halo from 343, though the charisma between Steve Downes’ boss and Taylor’s AI manages to make it legit enough that you don’t mind the obvious bait.

How much Halo Infinite Narrative work regarding these two will depend entirely on how you feel about Chief and Cortana’s relationship in previous games. Reading their relationship as romantic in some way has never been very difficult, even if it’s just for a joke, and both this game and Halo 3 use cryptic visions to show how Chief struggles to deal with his longtime partner who is no longer there, and much of Halo 4The Master Chief story has also seen the Master Chief grapple with the possibility of losing Cortana forever. When you walk around Forerunner structures in Infinite Occasionally, the Boss will hear Cortana’s voice, making it clear that she will stay on his mind forever because of the years they’ve been together. The Weapon, acting both as a facsimile of this woman he loves and a reminder of what he could still lose, baffles Chief. However, taciturn as he always is, he is not able to properly express these fears or concerns beyond a handful of words most of the time.

Master Chief and Cortana in Halo 5: Guardians.

Picture: 343 Sectors

As much as Infinite wants you to feel like you’re replaying the original game, but on a new Xbox it’s not completely able to get rid of it Halo 5the story of luggage. When the game is aimed directly at his predecessor, he can’t help but ping pong between a guy who is learning to parent and a guy who keeps seeing his ex in his new partner. Since the weapon is a copy of Cortana, but if the couple had never met before, The chief is ready to trigger the integrated security which will remove it if he needs it. It takes it a step further when in-game flashbacks reveal that Cortana’s quest for the AI ​​revolution at the height of Halo 5 saw his mechanical superweapons, the Guardians, destroy the homeworld of Infinitethe main villain of, the banished boss Atriox. However, because her ex is no longer there, Chief must take the punches that were originally intended for Cortana herself.

Once the weapon learns that the leader is ready to activate its fail-safe at any time, it begins to become passive aggressive. Valid because it is for her to shoot the leader and denounce the safety to the pilot so that he takes his side, the mission where all this happens really shows how young she is supposed to be. When she blows up the boss and asks him to trust her after she’s done nothing but help, the timing doesn’t go as planned as it feels less like a natural point of conflict in the relationship between the leader and the gun, and more like it’s only there because that’s just what the game stories about single parents with kids finally do . But if you have the relationship between the Chief and Cortana in mind – as 343 invites you to make such a direct copy of the weapon – these hostile interactions read as stranger than the game intended. It’s a remix of that symbiotic relationship from the past, yes, but the romantic undertones of that relationship are also still there, despite Infinite doing his best not to take this path again.

Through InfiniteConclusion, the leader and the weapon (who decided to name themselves, although we are not told what) have learned to trust each other, and the leader himself enjoys a semblance of peace with his former partner. . Players eventually discover that Cortana apparently perished for good during the events between Halo 5 and Infinite, discovering a message she leaves for the leader that serves both as an apology for her past actions and a passing of the torch in terms of partnering with the Army – in the hope that both will be sufficiently aware of them – same to prevent the circumstances that condemned Cortana in Halo 5 to occur a second time. As far as the 343 game trilogy has had no trouble portraying the Chief and Cortana’s relationship as a tragic romance, whatever they do with him and the weapon now that this torch has been passed will have to find a way. some concentration, so that’s not the case. the impression of being a strange retread of what came before.

Infinite halo is now available on Xbox and PC.

Wondering where our RSS feed went? You can pick up the new one here.

Source link

Isfahan’s Jameh Mosque is like a museum of Iranian architecture: minister Sat, 11 Dec 2021 08:00:00 +0000

TEHRAN – Isfahan’s UNESCO-listed Jameh Mosque is a museum of architectural styles from different periods, Cultural Heritage, Tourism and Handicrafts Minister Ezatollah Zarghami has said.

He made the remarks during a visit to the World Heritage Site on Friday in the heart of the historic texture of the central city of Isfahan.

Going around the mosque is like exploring a museum of Iranian architecture, the minister added.

This structure is such an encyclopedia with more than one thousand three hundred years of history, he noted.

This masterpiece shows the exaptation abilities and artistic tastes of our ancestors, he explained.

The Jameh Mosque of Isfahan, also known as the Atiq Mosque and the Friday Mosque, is the oldest preserved building of its type in Iran and a prototype for later mosque designs throughout Central Asia.

According to UNESCO, the mosque can be considered an amazing illustration of the evolution of mosque architecture over twelve centuries.

The complex, which spans over 20,000 square meters, is also the first Islamic building that adapted the four-courtyard layout of Sasanian palaces to Islamic religious architecture.

Its ribbed, double-shelled domes represent an architectural innovation that has inspired builders across the region. The site also presents remarkable decorative details representative of the stylistic evolution of more than a thousand years of Islamic art.

Throughout history, the mosque complex evolved into its current state as extensions were added. Therefore, this building cannot be attributed to any particular historical era.

The central structure of the mosque dates back to pre-Islamic Iran, according to archaeological excavations and historical records. It is said that the building was first built as a fire temple and was used to perform religious rituals. This hypothesis was confirmed by the discovery of a column torus engraved with Sassanid motifs.

However, the remains of the Seljuk era (1037-1194), in particular the key elements of the ground plan, the four iwans (porches) and the two domes are sufficient to illustrate the progress in the architecture of the mosques and domes made at the time.

Steeped in a rich history and culture, Isfahan was once a hub of international trade and diplomacy in Iran. Today, it is one of Iran’s top tourist destinations for good reason. The ancient city is full of many architectural marvels such as unparalleled Islamic buildings, bazaars, museums, Persian gardens and tree-lined boulevards. It is a city for strolling, getting lost in its labyrinthine bazaars, dozing in beautiful gardens and meeting people.

The city has long been nicknamed Nesf-e-Jahan which translates to “half of the world”; which means seeing it is relevant to seeing the whole world. At its height, it was also one of the largest cities in the region with a population of nearly one million.


Microsoft’s vulnerabilities have serious implications for organizations of all sizes Fri, 10 Dec 2021 06:30:31 +0000

Microsoft software products are a connective tissue of many organizations, from online documents (creation, sharing, storage), to emails and calendars, to operating systems that enable business operations on the front and back end, both in the cloud and on-premises.

Over one million businesses worldwide and over 731,000 businesses in the United States use Office 365, and although Microsoft does not offer precise statistics, some sources suggest that there are over 90,000 Microsoft partners facilitating services and products for customers. It is therefore not surprising that vulnerabilities in Microsoft solutions are an attractive attack vector.

So far in 2021, Microsoft’s 12 most notable critical vulnerabilities fall into five major threat categories:

  • Exchange vulnerabilities
  • Print spooler vulnerabilities
  • Sensitive vulnerabilities of Windows registry database files
  • Remote File System Protocol (MS-EFSRPC) and Active Directory Certificate Services (AD CS) vulnerability encryption, and
  • ActiveX vulnerabilities.

Let’s break them down.

Exchange vulnerabilities

Microsoft Exchange includes the back-end of Integrated Mail, Calendar, Tasks, and Email. Exchange Server is one of the most widely used and well-known messaging solutions for governments and businesses around the world. Managing Exchange Server internally is a complex task, and improperly configured Exchange servers are particularly troubling as malicious actors actively scan and exploit vulnerable Exchange servers that are improperly configured or have fixes and updates in place. latest security.

Recent vulnerabilities in Microsoft Exchange Server include ProxyLogon, ProxyOracle, and ProxyShell.

ProxyLogon (CVE-2021-26855 and CVE-2021-27065) targets on-premises Exchange servers. This bug exploits the proxy architecture of Exchange and its logon mechanism, allowing the malicious actor to bypass authentication on the Exchange server, impersonate an administrator, and acquire capabilities. code execution.

ProxyOracle (CVE-2021-31196 and CVE-2021-31195) is a bit more complicated than ProxyLogon in that the malicious actors must trick users into clicking on a malicious link to steal the user’s password. Forms-based authentication used to manage user logins for Outlook Web Access saves credentials and passwords in a user’s browser cookies, which are encrypted. To circumvent these measures, malicious actors use a fill-in oracle attack to help decrypt user cookies and obtain clear-text passwords.

ProxyShell (CVE-2021-34473, CVE-2021-34523 and CVE-2021-31207) is another on-premises Exchange Server vulnerability on unpatched servers with Internet access. ProxyShell works by abusing the normalization of the Client Access Service URL triggered by logon requests. When logon requests are initiated, Exchange normalizes the request URL and removes the portion containing the email address before routing the logon request to the backend. With ProxyShell, malicious actors can remove part of the URL during the normalization process, grant access to an arbitrary backend URL, and run commands on the Exchange server using port 443 exposed with Exchange PowerShell Remoting. Simply put, it allows threat actors to act as an Exchange administrator and run PowerShell commands remotely.

Print spooler vulnerabilities

Printers in general and Print Spooler in particular have been the target of exploitation by malicious actors for many years. For example, the infamous 2010 Stuxnet worm – the one used against Iranian nuclear facilities – used a Print Spooler vulnerability.

Print Nightmare (CVE-2021-34527) is a vulnerability that allows attackers with a low privilege domain user account to take control of a server running on the Print Spooler service and add dynamic link library (DLL) files as as printer drivers, which they then run through SYSTEM. Once the threat actor exploits this vulnerability, they can install programs, manipulate data, and create new users with full permissions.

Sensitive vulnerabilities of Windows registry database files

The Windows registry stores information about the configurations, settings and preferences of the operating system and Windows applications. It contains a collection of files called hives, such as the SYSTEM and SECURITY hives, and the Windows Security Accounts Manager (SAM) database. A malicious actor who abuses the vulnerability of sensitive Windows registry database files and successfully authenticates to a machine can execute arbitrary code with SYSTEM privileges.

HiveNightmare aka SeriousSAM (CVE-2021-36934) is one of those vulnerabilities. Using a low-privilege account, a malicious actor can use the hash method to authenticate a remote server with the hashed credentials it has obtained from the database. (You read that correctly – the default configurations of Windows 10 and 11 grant all non-administrator users read rights to key registry hives; this is a known error.) This allows them to recover all hives. registry in Windows 10 and 11. This includes SAM data, which attacker can use to execute code as SYSTEM. Once their machine is authenticated, the attacker gains full control, can run commands, remove additional payloads, propagate over the network, and create users with full permissions.

MS-EFSRPC and AD CS vulnerabilities

Microsoft Encrypting File System Remote Protocol (MS-EFSRPC) supports your data that is encrypted, stored remotely, and accessed over a network. It performs maintenance and management operations. Active Directory Certificate Services (AD CS) is a server role that allows users to create a public key infrastructure (PKI) and provides public key cryptography, digital certificates and signing capabilities and other functions of security.

Petit Potam (CVE-2021-36942) is an example of a new technology local area network manager (NTLM) relay attack. PetitPotam is a type of relay attack in which the threat actors who have already accessed the victim’s machine have the ability to take control of an Active Directory with AC DS in use. In this type of attack, rather than taking advantage of a specific vulnerability, malicious actors exploit the authentication method in the MS-EFSRPC to produce an authentication certificate, resulting in compromise of the domain and the possibility of failure. ” elevate privileges within the domain.

ActiveX vulnerabilities

ActiveX controls are parts of a program used to create and run applications that run over a network. Applications rely on ActiveX to share functionality and data across web browsers, so this vulnerability can be exploited through Microsoft Office documents online.

MSHTML (CVE-2021-40444) is a highly sophisticated remote code execution vulnerability that allows an attacker to execute arbitrary code on a victim’s machine through an ActiveX control that is typically sent to the victim by phishing. The threat actor entices the user to open the malicious document, and after the file is opened and the code executed, the threat actor performs malicious activities such as running remote commands, removal of additional payloads and persistence.

Do you feel vulnerable?

According to IBM’s 2021 Cost of a Data Breach report, the average cost of a data breach increased by the biggest margin year-over-year in seven years, from 3.86 million in 2020 to $ 4.24 million in 2021. The average time elapsed before a violation was detected in 2021 was 212 days with an additional 75 days to contain it!

The types of attacks we have explored in this article lead to compromised domains and the possibility for criminals to create their own accounts with full administrator credentials. And according to the report, compromised credentials were the most common attack vector, responsible for 20% of breaches and costing an average of $ 4.37 million per breach.

Each of these Microsoft vulnerabilities has serious implications for organizations of all sizes. For example, PrintNightmare is essential because the Print Spooler service runs by default on all Windows servers and clients. It is alarming that this iteration evolved from an earlier vulnerability that was patched but changed to reduce the patch to only half its effectiveness. And HiveNightmare (aka SeriousSAM) works because of a vulnerability in a company’s Windows operating system. It also does not require unencrypted credentials. These types of attacks justify the need to keep all systems up to date in addition to keeping abreast of Microsoft vulnerabilities.

Cyber ​​security leaders need to ensure they deploy detection rules designed to detect and prevent attempts to exploit these vulnerabilities and create additional detection rules to focus more on risk. Release all available patches for Microsoft products and monitor not only newly discovered vulnerabilities, but also changes to known vulnerabilities.

Source link

Chris Magnus confirmed as head of customs and border protection Wed, 08 Dec 2021 01:11:35 +0000

WASHINGTON – The Senate on Tuesday approved President Biden’s choice to lead customs and border protection, in a key position overseeing one of the president’s first and biggest challenges: dealing with the historic spike in illegal crossings to the southern border of the country.

With the 50-47 vote, Chris Magnus, the Tucson, Arizona police chief, is set to become the first openly gay commissioner of the federal government’s largest law enforcement agency. He will also be the agency’s first confirmed chief since 2019. Senator Susan Collins of Maine was the only Republican to vote for.

Known as a reformist police chief, Mr. Magnus faces the daunting task of gaining the approval of the US Border Patrol, an agency championed by former President Donald J. Trump that has long been criticized for its excessive use of force and its inhuman treatment. migrants.

Mr. Magnus’ confirmation is a belated victory for the Biden administration as Republicans rally around border security as a key issue ahead of the 2022 midterm election and attack Mr. Biden as being too soft.