More stories

  • in

    Chipotle launches a tech-focused venture fund

    Written by

    Greg Nichols, Contributor

    Greg Nichols
    Contributor

    Greg Nichols covers robotics, AI, and AR/VR for ZDNet. A full-time journalist and author, he writes about tech, travel, crime, and the economy for global media outlets and reports from across the U.

    Full Bio

    Chipotle
    Some of the most interesting tech development is happening in an unusual space: Fast food. From burger-flipping robots to drone delivery and Amazon-level logistics, the face of fast food is changing quickly. The latest proof? Chipotle has announced a new venture fund called Cultivate Next, which will make early-stage investments into strategically aligned companies.

    Innovation

    Why does a quick-serve chain need a venture fund? I put the question to Chipotle CTO Curt Garner.”Cultivate Next aims to support seed to Series B stage companies that can accelerate our strategic priorities such as running great restaurants,” says Garner, “amplifying technology and innovation, further advancing our Food With Integrity mission, and expanding access and convenience for our consumers.”The subtext is that competition is fierce in fast food, and it pays to be in on the ground floor of technological innovation — a lesson the sector might well have gleaned from Amazon’s ambitious takeover of Kiva Robotics, which was a big key in unlocking Amazon’s logistical competitive advantage.”Cultivate Next allows us to meet consumer and employee preferences that have evolved over the last two years,” says Garner. “We have an aggressive goal of achieving 7,000 restaurants, and technology is the key to accelerating these growth plans.”Also: Are ghost kitchens here to stay?Chipotle is already making headway, teaming up with companies like Miso Robotics on a tortilla chip-making robot, which Chipotle is piloting at select locations. The chain is also testing RFID technology for backend management, which is critical to maintaining quality in a high throughput kitchen. “Chipotle is testing radio-frequency identification (RFID) technology to enhance its traceability program and inventory management systems,” says Garner. “Ingredients arrive at Chipotle restaurants affixed with RFID enabled case labels and are scanned by RFID readers. Our RFID program is designed to allow the company to act on food safety and quality concerns swiftly, efficiently, and precisely.”The new venture fund will have an initial size of $50 million and will be financed solely by Chipotle. As funds go, it’s not the biggest, but this is surely a sign of growing competition and white-hot development in an industry largely aided by pandemic-influenced consumer trends but also reeling from an extremely competitive labor market and rising wages. In that regard, it’s a bellwether and sign of lively development in fast food tech.”We are looking to support a wide range of forward-thinking ventures, including those focused on farming, supply chain, employee experience, and advanced robotics.” More

  • in

    Remote execution holes in Log4j, Exchange and Confluence lead Five Eyes 2021 exploited CVE list

    Written by

    Chris Duckett, APAC Editor

    Chris Duckett
    APAC Editor

    Chris started his journalistic adventure in 2006 as the Editor of Builder AU after originally joining CBS as a programmer. After a Canadian sojourn, he returned in 2011 as the Editor of TechRepublic Australia, and is now the Australian Editor of ZDNet.

    Full Bio

    Image: Shutterstock
    During 2021, the top 15 vulnerabilities that were exploited — as observed by the US Cybersecurity and Infrastructure Security Agency, US NSA, US FBI, the Australian Cyber Security Centre, the Canadian Centre for Cyber Security, New Zealand National Cyber Security Centre, and the United Kingdom’s National Cyber Security Centre — led to remote code execution (RCE) across a range of products, and left IT administrators with a short window to keep their house in order. “For most of the top exploited vulnerabilities, researchers or other actors released proof of concept code within two weeks of the vulnerability’s disclosure, likely facilitating exploitation by a broader range of malicious actors,” the agencies said in an alert. Topping the list was the RCE hole in Java logging library Apache Log4j, also known as Log4Shell, that was disclosed in December. “The rapid widespread exploitation of this vulnerability demonstrates the ability of malicious actors to quickly weaponize known vulnerabilities and target organizations before they patch,” the alert said. This was followed by CVE-2021-40539, an RCE hole in Zoho ManageEngine, and seven vulnerabilities in Exchange that became known as ProxyShell and ProxyLogin. Next on the list was CVE-2021-26084 in Atlassian Confluence, which US Cybercom warned was facing mass exploitation in September. In this instance, the agencies said the exploit code was released a week after it was disclosed. The final vulnerability from 2021 on the list was CVE-2021-21972, which impacted VMware vSphere. Completing the list was a quartet of vulnerabilities that were highlighted in July, consisting of CVE-2020-1472 in Microsoft Netlogon which is also called Zerologon, CVE-2020-0688 in Exchange, CVE-2019-11510 from Pulse Secure Connect, and CVE-2018-13379 impacting Fortinet FortiOS and FortiProxy. A secondary list of another 15 CVEs was also issued, and included holes in Accellion FTA, and additional RCE bugs in VMware vCenter and the Windows print spooler. To mitigate these vulnerabilities, the agencies repeated advice on timely patching, having a centralised patch management system, and shifting to cloud or managed service providers if rapid scanning is not considered doable. The advice added that organisations should enforce multifactor authentication on all users without exception, with VPN logins in particular called out, as well as regularly reviewing privileged accounts at least yearly and adopting the least privilege principle. Companies should also move to allowlisting, properly segment networks to limit lateral movement, and constantly monitor attack surfaces. Related Coverage More

  • in

    Google Search removal requests expanded to include personal contact information

    Written by

    Aimee Chanthadavong, Senior Journalist

    Aimee Chanthadavong
    Senior Journalist

    Since completing a degree in journalism, Aimee has had her fair share of covering various topics, including business, retail, manufacturing, and travel. She continues to expand her repertoire as a tech journalist with ZDNet.

    Full Bio

    Google has now expanded Google Search removal requests to include additional personally identifiable contact information, such as a person’s phone number, email address, or physical address.Up until now, people have been able to request the removal of other certain sensitive information from Search, such as doxxing content — which is when a person’s contact information is shared in a malicious way — or information like bank account or credit card numbers that could be used for financial fraud.Under the expanded policy, users can also request for the removal of additional information that may pose a risk for identity theft — such as confidential log-in credentials — when it appears in search results. “The availability of personal contact information online can be jarring — and it can be used in harmful ways, including for unwanted direct contact or even physical harm. And people have given us feedback that they would like the ability to remove this type of information from Search in some cases,” Google Search global policy lead Michelle Chang wrote in a post.Chang said when a Google Search removal request is submitted, Google evaluates all the content on the web page. Following the evaluation, Google may remove the provided URL from all search queries; remove the search results in which the query includes a person’s name or other provided identifiers, such as aliases; or in some circumstances deny the request. “We will evaluate all content on the web page to ensure that we’re not limiting the availability of other information that is broadly useful, for instance in news articles,” Chang said. “We’ll also evaluate if the content appears as part of the public record on the sites of government or official sources. In such cases, we won’t make removals.”Google warned, however, that removing content from Google Search does not remove it from the internet, and recommended that people contact the hosting site directly if that is what they want it removed entirely. This latest update follows on from Google rolling out a new policy last October to enable people under the age of 18, or their parents or guardian, to request the removal of their images from Google search results. RELATED COVERAGE More

  • in

    Best 4G mobile network (2022)

    Discover the best 4G mobile broadband service providers with our in-depth reviews of four of the most highly rated and common carriers in the country. We looked at AT&T, Cricket, T-Mobile, and Verizon and ranked them on four main criteria: price, speeds, data caps, and customer service. The results reveal several options regardless of what’s important to you in your 4G mobile plan and mobile internet service.  

    See at Verizon

    Verizon

    Best 4G mobile network

    Provider score: 5/5Verizon performs strongly across the board, securing our No. 1 spot for 4G mobile broadband service. It offers unlimited data with the option for premium data during high traffic periods, which is ideal for customers requiring large data usage.Its lowest-ranking category was pricing compared to the competition, although Verizon does have a range of options for different budgets. Best for:  Heavy data usersNot for:  Tight budgetsPricing4th place: Plans start at $35 per month, but go up to $55 for one line, which is about average compared to its competitors.Download/Upload Speeds2nd place: Verizon download speeds start at five Mbps and go up from there. While you won’t be able to stream 4K, you’ll definitely meet the three Mbps required for regularly streaming.Data Cap1st place: The highest plan comes with unlimited data, plus 75GB of premium data gets you faster speeds during peak traffic hours.Customer Service2nd place: Verizon ties for second place with a four out of five rating from J.D. Power.

    See at AT&T

    AT&T

    Best Variety

    Provider score: 2/5With the exception of low 4G plan prices, AT&T ranks at a mediocre level in the other categories. Download speeds start at the cusp of streaming capabilities and while data caps are unlimited, you’ll notice a slowing between 50GB and 100GB (depending on your plan).While providing lower-priced plans can appeal to customers, the potential for slower download speeds and negative customer service rankings may be off-putting for some.Best for: Budget-friendly options Not for: Exceptional servicePricing2nd place: Plans range from $35 to $50, making AT&T a lowered-priced option for consumers in need of low-budget plans.Download/Upload Speeds4th place: 4G uploads go up to a maximum of 7.1Mbps, although you’ll experience faster speeds if you upgrade to the 4G LTE network.Data Cap4th place: Unlimited data is great, but users in need of constant and high-performing speeds can find the data caps frustrating.  Customer Service4th place: AT&T has one of the lowest customer service scores from J.D. Power, so if you’re unhappy with your plan, you may not receive a lot of help in solving your issues.

    T-Mobile

    Fastest Speeds

    Provider score: 4/5T-Mobile ranks first in three categories: price, speed, and customer service. The downside is its data caps, which can slow data speeds down after 50GB of use. As long as you pay attention to how much data you’re using, you’ll benefit from exceptional speeds for both downloading and uploading.Best for: Fast speeds Not for: Constant data usePricing1st place: At a minimum, you can spend just $30 on a T-Mobile plan with 4G. On the high end for a single line, the cost only jumps to $50.Download/Upload Speeds1st place:  Download speeds start at 9 Mbps and go up to 47Mbps — enough to stream in 4K.Data Cap5th place:  T-Mobile users get a max of uninterrupted 50GB of data included in plans, and while it does include hours of streaming video and music, your data prioritization could slow down speeds. Customer Service1st place:  J.D. Power ranks T-Mobile first among full-service carriers for service. If you have an issue with your account, you’ll be confident in the resolution process from T-Mobile.

    Cricket

    Best Flexible Plans

    Cricket

    Provider score: 3/5Cricket’s third-place ranking is strong, considering it’s the only no-contract carrier on our list. In addition to taking advantage of quality customer service and a high data cap, Cricket customers can sign up for month-to-month plans, which helps customers not interested in long-term plans.Best for: No-contract data plans Not for: Fast speeds Pricing3rd place: Cricket plans start at $30 per month and max out at $60 for unlimited data and a mobile hotspot. This range provides cheaper alternatives for unlimited data than other well-known carriers. Download/Upload Speeds5th place: Download speeds range between just one and 4Mbps, so you’ll only be able to stream video at the upper end of that range, likely outside of peak hours.Data Cap2nd place: Cricket offers unlimited data, so even though you may not be able to stream all the time simply based on speed, you at least don’t have to worry about your data running out.Customer Service1st place: Cricket ties for first in our customer service ranking and is J.D. Power’s top-rated carrier with no contracts. Knowing you have a reputable company providing solid customer service is a plus for new customers.

    Guide to Mobile BroadbandBefore you pick a provider and a plan, it’s imperative to learn the differences between each type of mobile broadband service.3G vs. 4GGenerations of mobile data technology have progressed successively recently and the generational window may shrink even faster as technology improves. Simply put, the higher the number connection (3G vs. 4G), the faster and stronger you can expect your mobile data connection to be.As new mobile data networks emerge, older ones become obsolete. Today, 3G networks are rarely used and most new mobiles only provide 4G. Although no longer the fastest iteration, 4G networks are still common nationwide.LTELTE is the acronym for “long-term evolution.” It’s a version of 4G that is much faster than 3G, particularly when downloading media on your phone. While many networks carry LTE, it’s not as fast as pure 4G.5G5G mobile broadband is the latest network available — and consequently, the fastest. However, it hasn’t made its way into every locale yet. Verizon currently offers 5G in 31 cities in the U.S. and T-Mobile has extensive coverage nationwide, but it’s still not comprehensive. Consider fiber or cableFor fast data speeds and streaming capabilities at home from wireless internet providers, consider fiber or cable internet. You can still connect your smartphone to your home wi-fi network to use data from your internet plan rather than your mobile plan. While there may be geographic limitations in some rural areas, most places in the U.S. have internet service providers to compare.

    How Did We Choose the Best?

     We looked at each carrier’s 4G mobile broadband offerings in terms of price, speed, data caps, and J.D. Power customer service rankings. Next, we ranked the carriers in each category and averaged the numbers.

    What is the best 4G network?

    Verizon is the best 4G network provider, with the highest overall scores for data limits, price, speeds, and customer service.

    Will my 5G phone work on 4G/3G networks?

     Your 5G phone should automatically select the best signal according to your network, including 4G or 3G networks. 5G-capable phones are not strictly limited to the 5G signal. Your phone will automatically select a network according to what signal is available. If signals overlap, your phone will grasp the best signal and automatically change to the next best signal if the device travels beyond the network area.

    How does 5G coverage compare to 4G?

     5G is still in its infancy, although the United States has installed numerous 5G towers over the last year. That being so, the coverage is still just a portion of the 4G coverage that currently exists. Metropolitan areas and their neighboring cities will likely be the first areas targeted, as was the case for 4G when it was first implemented.

    Will 5G cost more than 4G?

     At this point, 5G will not cost more than a 4G plan. 5G is simply a more powerful, efficient radio transmission. What this means is more information can be broadcasted through 5G signals without interfering with other broadband signals. Ultimately, however, down the road, your network provider may adjust rates according to their infrastructure or signal quality.

    ZDNet Recommends More

  • in

    Best home security camera (2022)

    Security is imperative for companies to deter trespassers and would-be thieves and to protect valuable equipment crucial for businesses to operate successfully.  A robust setup with cameras, sensors, and night vision can take the pressure off security teams and give business owners peace of mind out-of-hours. Luckily for organizations, the emergence of the Internet of Things (IoT) technology, mobile connectivity, apps, and cloud technologies has radically changed the security landscape and made it easier than ever to set up multi-room and on-premise systems. The possibilities are endless: cloud or local feed storage, customizable or automatic alerts and alarms, smartphones and tablet connectivity, wired or wireless, battery-powered or mains options, video capture, night vision, audio feeds of varying quality, and the ability to check-in, in real-time, are all on offer and can be tailored depending on the requirements of your business.  To make navigating the variety of hardware and vendor ecosystems available to today’s company owners less of a challenge, we have assembled our top ten picks for businesses. 

    Ring Stick Up Cam Solar

    Best home security camera

    Ring

    Once the case, heavy-duty, wired surveillance systems were the only options available to protect a business premise. Times have changed, and with the explosion in mobile solutions and the increased bandwidth offered by broadband and 4G/5G, there are mobile-friendly options for SMBs seeking a budget-conscious security option.  The benefit of the Ring camera range, including indoor, outdoor, stick-up, and floodlights, lies within its flexibility. Each camera can be connected to the same account and accessed via smartphone, alerting users to motion from all areas.  Of particular note are Stick Up Cams, which can be placed inside or outdoors and on flat surfaces or walls. Battery and wired options are available, as well as devices that come with a solar panel and backup battery pack. The Spotlight and Floodlight models, too, are of interest given their inbuilt security sirens.  As there are a variety of different cameras users can pick from, a mix-and-match set up to protect a premise is possible.ProsFlexible and quick setupsProfessional monitoring availableBolt-on ecosystem additions available, including outdoor camerasConsLong shipping timeMultiple camera costs are high

    Google Nest Cam

    Discreetly keep an eye out for intruders outside of hours

    Nest

    Google Nest cameras will be of interest to business owners already in the Nest ecosystem — including users of the Nest Thermostat, Nest CO2 alarms, as well as Nest X Yale Locks. The Nest Cam Indoor and Outdoor cameras are mobile options for on-premise security. They are best suited for budget-friendly users that need basic security measures in place. The cameras can record footage in 1080p HD, and when it comes to the outdoor version, this quality is maintained at night through infrared LEDs. You can pick up battery or wire-powered options. Both versions have inbuilt speakers and will alert users via their mobile devices if suspicious activity or visitors are detected by motion and noise sensors. Once the app has been installed, and an account has been set up, monitoring begins.  Subscriptions vary.ProsEasy setupMobile device monitoring and accessFlexible optionsConsExpensive for single cameras

    Wyze Cam v3

    Best budget security camera

    Wyze

    If you want to dip a toe into the world of IoT and intelligent home security devices, you may want to consider the Wyze Cam v3, one of the most affordable options on the market today.The Wyze Cam v3 is a $35 internet-connected camera offering 1080p recording, IP65 quality for indoor or outdoor use, a CMOS sensor designed to improve nighttime vision, a siren, and two-way communication.The camera can be part of a wider Wyze security ecosystem, including outdoor cameras, motion sensors, leak sensors, keypads, and entry monitors. ProsAdditional security products on offer to create a wider security networkSmall, compact designBudget-friendlyConsLimited cloud storage included unless subscribed

    Arlo Pro 4

    Wireless monitoring for the workplace

    Arlo

    Another option is the Arlo Pro 4. This slimline, business-ready option can be used either in or outdoors, being a weather-resistant model with a variety of mounting options that can detect both sound and motion. The Arlo Pro 4, available in black or white, can work as a day-to-day camera on the shop floor; a discreet camera placed outside to act as a night watchman, or as a part of a full network of cameras in a large workplace. A spotlight to improve low-light recording is included alongside object scanning and detection.Arlo’s camera is compatible with Amazon Alexa, Google Assistant, and Apple HomeKit. Users will receive real-time alerts whenever motion or sound is detected, and footage is captured in up to 2K HDR resolution. The vendor has also implemented Activity Zones which can be set to reduce unwanted or nuisance notifications.ProsSix months of battery lifeMagnetic mountsConsAn Arlo Secure subscription is required for premium features 

    SimpliSafe security systems

    Best for small homes and apartments

    SimpliSafe

    SimpliSafe is another worthy addition to our list and would suit users who need a flexible solution for smaller homes and apartments. SimpliSafe is a Wi-Fi-connected security solution backed by real-time monitoring in remote centers. While wired, in the case of a blackout, devices in the SimpliSafe range have backup batteries. The basic ‘Essentials’ package, starting at $219, includes a base station, keypad, three entry sensors, and one motion sensor. A free HD camera is also included in the bundle at the time of writing.Other packages and bolt-on options include panic buttons, freeze and water sensors, smoke detectors, and sirens. ProsNo drilling requiredStylish, discreet designConsExpensive 

    What is the best home security camera?

    The Ring Stick Up Cam Solar is the best home security camera, offering an exceptional product at an affordable price. We loved the easy setup, professional monitoring, and the entire range of Ring security products.

    How did we choose these security cameras?

    The requirements of home and business security cameras vary: the average consumer may lean toward an easy-to-install, budget-conscious product, whereas a company may be more inclined to invest in a more powerful alternative to protect valuable assets. In each case, we have considered as many aspects of a security system as possible, including recording capabilities, environmental use, and cost — both upfront and due to ongoing subscriptions.

    Which is the right security camera for you?

    When you are selecting your home security camera, you should consider the pain points at home or at your business location. What areas are the most important when it comes to monitoring? What assets do I need to protect? When might my home or premises be most vulnerable?If you’re working from home, for example, you might forgo constant video capture and a subscription, settling instead for clips and the ability to check-in while you’re away. However, if there is valuable stock in an office that is shut at night, you might pivot toward an option including night vision and constant video/audio feeds.Security cameraPricePower sourceVideoRing Stick Up Cam Solar$149Solar1080p HD, Live View, Night VisionGoogle Nest Cam$100Wired1080p HDWyze Cam v3$36Wired1080p HD, Live View, Color Night VisionArlo Pro 4$180Battery/Solar1080p, Color Night VisionSimpliSafe$270BatteryHD video with Night Vision

    Is it necessary to subscribe to a monitoring service?

    No, but technology services now — ranging from streaming to IoT — will not usually stop at hardware: revenue models are pivoting to subscriptions, too. If you want constant monitoring and footage to be stored beyond a specific period of time, you may need to sign up.

    Will pets trigger alerts on a home security camera?

    This was once a common problem with earlier forms of IoT and smart cameras, but vendors are constantly improving false-positive rates through improved object detection and the implementation of features such as ‘activity’ zones. 

    Do I have to connect my camera to assistants like Amazon Alexa?

    This bolt-on integration is usually added to make products more appealing and for the convenience for users, but you do not need to connect your home security system to anything else in your IoT ecosystem.

    Are there alternative security cameras worth considering?

    While our top picks have included a variety of functions and uses, the below are still worth consideration.

    ZDNet Recommends More

  • in

    Ransomware demands are growing, but life is getting tougher for malware gangs

    Victims of ransomware attacks are paying higher ransoms than ever before, but there are signs that organisations are starting to take heed of cybersecurity advice, making them more resilient to cyber criminals. According to analysis by cybersecurity researchers at Sophos, the average ransom payment made by victims to choose to pay cyber criminals for a decryption key to restore their files and servers following a successful ransomware attack has increased to $812,260 – an almost five-fold increase compared with the 2020 average of $170,000. And the proportion of victims who pay ransoms of over $1 million has also risen substantially, up from 4% of ransom payments in 2020 to 11% in 2021 – meaning one in ten successful ransomware attacks is providing cyber criminals with a million dollar pay day. According to analysis by Sophos, just under half of ransomware victims pay the ransom, perceiving it to be the quickest way to restore the network – even though decryption keys provided by cyber criminals can’t be trusted and paying a ransom might just show that the victim is an easy target who could be extorted again. Ransomware attacks continue to be successful because cyber criminals can still exploit common cybersecurity vulnerabilities to enter networks and carry out campaigns. But while ransomware is still a major cybersecurity issue, there are signs that the situation could be about to get better.SEE: Cybersecurity: Let’s get tactical (ZDNet special report)”I’m a little optimistic for the first time in years about ransomware – I think we might be at the peak of our worst right now and I’m hoping we start to turn a corner,” Chester Wisniewski, principal research scientist at Sophos told ZDNet, citing how government bodies like the US Cybersecurity and Infrastructure Security Agency (CISA) and the UK National Cyber Security Centre (NCSC) have stepped in in “a meaningful way” to provide accessible and useful advice on how to improve cybersecurity. “The advice they’re giving and the things they’re doing are actually helping – I don’t think enough organisations are listening to them yet, but at least the resources are accessible, approachable and usable, so it’s a good start,” he said In addition to this, cyber insurance providers are demanding better security preparations from companies before issuing policies, while Wisniewski says the US sanctions against Russia following its invasion of Ukraine has had an impact on American businesses which do not want to pay ransoms to cyber criminals who are often working out of that region. “We’re seeing it being a really serious motivator for American companies and insurance companies to not pay ransoms,” said Wisniewski But while there are some encouraging signs, it’s unlikely ransomware is going away anytime soon.  The reason ransomware is so lucrative for cyber criminals is because there are victims who pay the ransoms. And if there are organisations out there who are vulnerable to cyber attacks and are still willing to pay six-figure ransom demands, there’s always going to be ransomware groups trying to exploit this. “I don’t think you’re ever going to deter the hardcore ransomware groups because there’s too much money to be made when they’re getting multi-million dollar hits,” said Wisniewski. “Crooks aren’t going to walk away from that, even if it’s a one in twenty chance – it’s still a million dollars,” he added.  MORE ON CYBERSECURITY More

  • in

    FAA is giving commercial drone operators the green light

    Written by

    Greg Nichols, Contributor

    Greg Nichols
    Contributor

    Greg Nichols covers robotics, AI, and AR/VR for ZDNet. A full-time journalist and author, he writes about tech, travel, crime, and the economy for global media outlets and reports from across the U.

    Full Bio

    There can be little doubt that the FAA is paving the way for a framework governing the widespread operation of commercial drones in the U.S. In advance of a definitive ruling on whether commercial drones can operate beyond visual line of sight (BVLOS), the FAA has been busily granting case-by-case permission to drone operators for exactly that.One recent example, just announced, drone company American Robotics has added seven additional sites of operation approved by the FAA for its automated BVLOS drone technology, the Scout System. American Robotics has 10 operational sights across eight U.S. states.”American Robotics is excited to have seven additional sites of operation approved by the FAA. As we continue to build upon our offerings, we look forward to providing current and future customers with the tools needed to unlock scalable, autonomous drone operations that will help propel their businesses and critical industries forward,” says Reese Mozer, co-founder and CEO of American Robotics. “Not only is this a milestone for American Robotics, but it is also another signal that we have reached an inflection point in commercial drone operations in the United States, and American Robotics is proud to be at the forefront of these industry advancements.”Elsewhere in the commercial drone sector, Percepto, which offers autonomous inspection by industrial robotics, recently announced it will deploy autonomous drones to monitor Florida Power & Light’s substations and power distribution grids across the state. The deployment represents the largest commercial autonomous drone project in the world, a staggering feat given the relatively slow pace with which the FAA has moved to adopt a framework.Not surprisingly, both Percepto and American Robotics are on the FAA’s industry-focused BVLOS rulemaking committee, which is tasked with helping the FAA adopt a regulatory framework for wider commercial drone adoption. The companies that invested early in that process are reaping early benefits from their friendly stance toward the FAA. The FAA previously issued a nationwide waiver for Florida Power & Light to fly Percepto drones for surveillance and inspection purposes at sites owned and serviced by FPL. The Beyond Visual Line of Sight (BVLOS) Aviation Rulemaking Committee (ARC) has provided its regulatory recommendations to fully incorporate highly automated BVLOS operations flights in US national airspace, a process that is expected to take place in the months ahead.For players like Percepto and American Robotics, eventual approval will open the floodgates. The FAA has been very deliberate in its progress (slow in the eyes of some in the sector). “Every step by American Robotics toward full autonomy is significant: autonomous drones provide continuous, real-time information,” says David Boardman, CEO of Stockpile Reports. “With zero touch, high frequency automated data collection, the bulk materials supply chain will be transformed as we can provide answers to enable real-time decisions at any site. This approval is a critical turning point in addressing the market demand for continuous information.” More

  • in

    Bronze President spies on Russian targets as Ukraine invasion continues

    Bronze President has potentially shifted from Asia to focus on Russia as the invasion of Ukraine continues. Also known as Mustang Panda, TA416, or RedDelta, the Chinese cyberespionage group has been active since at least 2018 and has traditionally focused on gathering intelligence from NGOs, research institutes, and internet service providers (ISPs).

    Ukraine Crisis

    Past countries and regions on the hit list include Europe, Mongolia, Russia, Vietnam, and South Africa. According to Secureworks Counter Threat Unit (CTU), the group is either “sponsored or at the very least tolerated by the Chinese government” and “appears to be changing its targeting in response to the political situation in Europe and the war in Ukraine.” Recent campaigns have primarily focused on Southeast Asia, with targets infiltrated for “political and economic” data theft and ongoing, long-term surveillance. However, CTU says that Bronze President has now pivoted to Russian speakers alongside European organizations. “This suggests that the threat actors have received updated tasking that reflects the changing intelligence collection requirements of the People’s Republic of China (PRC),” the researchers say. Government-sponsored — or, perhaps, tolerated — cyberattackers are tasked with activities that will benefit their government somehow. This often includes intelligence-gathering, spying, and activities that improve situational awareness, especially in times of conflict. These activities don’t only include ‘enemies’ or ‘hostile’ states — it also extends to who a country considers an ally or friend. CTU suggests that the recent Bronze President shift could indicate “an attempt by China to deploy advanced malware to computer systems of Russian officials.”

    ZDNet Recommends

    The best security key

    While robust passwords help you secure your valuable online accounts, hardware-based two-factor authentication takes that security to the next level.

    Bronze President is suspected of targeting the Russian military. The team analyzed a malicious executable called “Blagoveshchensk – Blagoveshchensk Border Detachment.exe,” which was disguised with a .PDF icon and heavily obfuscated to hide a downloader for PlugX malware. (The city of Blagoveshchensk is close to the Chinese border and is home to part of the Russian military.)If executed, the file will display a decoy document (written in English, oddly), which describes the refugee situation and EU sanctions. In the background, a downloader grabs PlugX from a command-and-control (C2) server previously tied to campaigns in Europe. PlugX is a Remote Access Trojan (RAT) capable of file exfiltration, executing remote command shells, establishing a backdoor, and deploying additional malicious payloads. Bronze President has a wide range of tools, including Cobalt Strike, the China Chopper backdoor, RCSession, and ORat, at its disposal. In March, ESET said the group was taking advantage of the war to spread a new Korplug/PlugX RAT variant, dubbed Hodur, via Ukraine & Russia-themed phishing campaigns. In other cybersecurity news related to Russia and Ukraine, Aqua Security has been tracking the use of cloud repositories by those on both sides of the conflict. The researchers found that 40% of public repositories with descriptions or names linked to the invasion, including tools and guides, promoted denial-of-service (DoS) activities “aimed at disrupting the network traffic of online services.” See alsoHave a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More