Archive for the ‘NSA’ Category

NSA to hold webinar on impacts of UK livestock vaccine shortage … – Agriland.co.uk

The National Sheep Association (NSA) is set to hold a webinar on the ongoing impact of the UK livestock vaccine shortage next month.

The webinar, Vaccines, why we cant get them and how to manage the implications, is free to join and will take place at 8:30a.m on Wednesday, October 4, 2023.

Hosted by the NSAs Breakfast Club, the webinar will explore the issues UK farmers are having related to sourcing vaccines and the knock-on effect that this is having on animal health and welfare.

It will also aim to give practical advice to farmers on what they can do if they are unable to access vaccines.

NSA chief executive, Phil Stocker, said: NSA has endeavoured to keep its members and other UK sheep farmers up to date on the ongoing difficulties felt in sourcing vaccines via its NSA publications and online engagement.

This webinar will add to this providing a fuller update on the vaccine availability situation across the UK, giving a a chance to attendees to hear and ask questions over alternative strategies to reduce disease risk.

The NSA said problems with supply have existed across many vaccines for more than a year, including those preventing clostridial and pasteurella disease, abortion, lameness and orf, with some more acutely affected than others.

The association for UK sheep farmers said it has been in regular contact with manufacturing companies to try to help resolve the issues seen across the country.

Stocker said the NSA webinar will dissect these issues as well as providing guest speakers to talk about different aspects of vaccine shortage and its impacts.

In this NSA Breakfast Club we will hear from Jonathon Statham chair of the Animal Health and Welfare Board for England Committee who will discuss the reasons why we are seeing a shortage across supply chains, how it might be rectified and how long this might take to resolve as well as the wider long term impacts this shortage might have across the livestock industry, Stocker said.

We will also hear from Dr Joe Henry specialist beef and sheep vet (Black Sheep Vets) on management practices, how to mitigate long term impacts and what to do if you cant access vaccines along with what should be classed as priority stock and how you can move towards overcoming some impacts of a vaccine shortage across industry.

Read more from the original source:
NSA to hold webinar on impacts of UK livestock vaccine shortage ... - Agriland.co.uk

NSA Scotland to host field day at the end of next month – Agriland.co … – Agriland.co.uk

The Scottish branch of the National Sheep Association (NSA) will hold the NSA Scotland Field Day on Tuesday, October 31, 2023.

The event will take place on Fearn Farm on the Easter Ross Peninsula and visitors will view real-time demonstrations of the Scott familys flock of commercial sheep.

Attendees will have the chance to join industry workshops that offer the chance to learn and discuss issues with fellow sheep producers.

The event is sponsored by Elanco and will address and demonstrate best practice concerning the issue of flock health and welfare from efficient stock handling and data collection to parasite management and disease prevention.

NSA Scotland chair, Peter Myles, said: NSA Scotland is very much looking forward to welcoming new and old faces to the regions first field day.

This will be a fantastic opportunity for sheep producers to gain up to date advice from incredibly knowledgeable and experienced sessions in what is a fantastic location with highly respected farm hosts.

The NSA Scotland Field Day is open to both NSA members and non members and will be free to attend.

The following workshops will feature at the event:

The varied programme of the day, we hope, will appeal to a wide range of sheep producers, Myles said.

And of course, it will be a great opportunity to meet up with farming friends before the winter arrives.

The day will conclude with a live cookery demonstration and lamb BBQ and a chance to network with fellow attendees, NSA Scotland said.

Read more from the original source:
NSA Scotland to host field day at the end of next month - Agriland.co ... - Agriland.co.uk

Cyber Command, NSA pick advances to Senate floor, but path to confirmation remains blocked – The Record from Recorded Future News

The Senate Armed Services Committee has approved President Joe Biden's nominee to be U.S. Cyber Command and National Security Agency chief, sending it to the chamber floor where an impasse over military promotions drags on.

Due to the dual-hat leadership structure that governs the two organizations, the panel technically cleared Air Force Lt. Gen. Timothy Haughs nomination last month so that it could be taken up by the Intelligence Committee, which shares jurisdiction. That committee approved his nomination July 13.

Haugh sailed through both of his nomination hearings this month and since no lawmakers objected within a 30-day window that ended this week, he was automatically sent to the full Senate.

However, there is no clear path for Haughs confirmation. Sen. Tommy Tuberville (R-AL) maintains a hold on the approval of senior military nominees in a months-long bid to reverse the Pentagon's abortion travel policy.

The one-man blockade now impacts nearly 300 officers, including Army Gen. William Hartman, the chief of the elite Cyber National Mission Force, who Biden has nominated to replace Haugh as Cyber Commands No. 2. He was also approved by the Armed Services Committee last month.

The Senate could leave as soon as today for its summer recess and wont return until after Labor Day, meaning it would be at least several more weeks before Haugh or Hartman get a vote.

Last night, a group of a dozen Senate Democrats spoke on the chamber floor for five hours to urge Tuberville to withdraw his blanket objection.

The Senate has always treated military nominations with respect and bipartisan support as part of a routine promotion process. Now, they have been turned into political pawns by the Senator from Alabama, Armed Services Committee Chair Jack Reed (D-RI) said, adding only willful ignorance or stubborn hubris could lead one to continue down this path.

The speeches came just days after a group of Armed Services members sent a letter to Senate Minority Leader Mitch McConnell (R-KY), asking him to prevail on Tuberville to end the pileup.

"As the leader of the Republican Conference, we count on you to hold your colleagues accountable when they recklessly cross boundaries and upend Senatorial order," the senators told McConnell, who has publicly disagreed with Tubervilles tactics but hasnt intervened.

"It falls to you to act now, for the safety and security of our nation. We urge you to exercise your leadership and prevail on Senator Tuberville to end his reckless hold," they added.

Majority Leader Chuck Schumer (D-NY) previously offered Tuberville a floor vote on the DoD abortion policy as the chamber works through its annual defense authorization bill but the Alabama Republican rejected the idea.

Schumer hasnt ruled out keeping the Senate in session in August to deal with the issue but has thus far opted not to hold individual votes on nominees, instead hoping political pressure will force GOP leadership to get Tuberville in line and end the logjam.

Recorded Future

Intelligence Cloud.

Martin Matishak is a senior cybersecurity reporter for The Record. He spent the last five years at Politico, where he covered Congress, the Pentagon and the U.S. intelligence community and was a driving force behind the publication's cybersecurity newsletter.

See the rest here:
Cyber Command, NSA pick advances to Senate floor, but path to confirmation remains blocked - The Record from Recorded Future News

Former NSA-er Harry Coker Nominated National Cyber Director – Dark Reading

President Joe Biden has announced that Harry Coker, former executive director of the National Security Agency (NSA), would be his intended nominee for the position of US national cyber director.

The position has been vacant since February, when Chris Inglis, who served as the country's first ever national cyber director and was former deputy director of the NSA, stepped down from the role.

Coker will have plenty to do:Earlier this year, the Biden administration announced a national cybersecurity strategy that was the first of its kind; there were 57 pages with over 65 initiatives that federal agencies would incorporate over the next few years within the cyberspace. These plans include enforcing liability for software products and strengthening infrastructure against cyber threats. If confirmed by the Senate, Coker would be the one to begin implementing these initiatives and ensuring that stakeholders are actively partaking in protecting organizations against cyber threats.

Coker served the United States in the Navy and held multiple positions in the CIA before moving to the NSA in 2017. In 2020 he went to work for the national security staff of President Biden's transition team.

In a press release put out by co-chairs of the Cyberspace Solarium Commission (CSC) Rep. Mike Gallagher (R-WI) andSen. Angus King (I-ME) they stated, "We are relieved to hear that the Biden administration has finally nominated the permanent replacement for the National Cyber Director,and strongly support the decision to select Harry Coker, as we see him as being a natural choice for this position. Coker's long and distinguished career in government hasled him to posts in the National Security Agency, Central Intelligence Agency and the US Navy. We firmly believe that this experience and the expertise and skill set it imbued him with makes him highly qualified for the position of National Cyber Director."

The news of Coker's nomination comes after it was reported that Kemba Walden would not receive the nomination, though she had strong cyber and political support.

Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

Go here to read the rest:
Former NSA-er Harry Coker Nominated National Cyber Director - Dark Reading

Preventing Web Application Access Control Abuse – CISA

SUMMARY

The Australian Signals Directorates Australian Cyber Security Centre (ACSC), U.S. Cybersecurity and Infrastructure Security Agency (CISA), and U.S. National Security Agency (NSA) are releasing this joint Cybersecurity Advisory to warn vendors, designers, and developers of web applications and organizations using web applications about insecure direct object reference (IDOR) vulnerabilities. IDOR vulnerabilities are access control vulnerabilities enabling malicious actors to modify or delete data or access sensitive data by issuing requests to a website or a web application programming interface (API) specifying the user identifier of other, valid users. These requests succeed where there is a failure to perform adequate authentication and authorization checks.

These vulnerabilities are frequently exploited by malicious actors in data breach incidents because they are common, hard to prevent outside the development process, and can be abused at scale. IDOR vulnerabilities have resulted in the compromise of personal, financial, and health information of millions of users and consumers.

ACSC, CISA, and NSA strongly encourage vendors, designers, developers, and end-user organizations to implement the recommendations found within the Mitigations section of this advisoryincluding the followingto reduce prevalence of IDOR flaws and protect sensitive data in their systems.

Download the PDF version of this report:

IDOR vulnerabilities are access control vulnerabilities in web applications (and mobile phone applications [apps] using affected web API) that occur when the application or API uses an identifier (e.g., ID number, name, or key) to directly access an object (e.g., a database record) but does not properly check the authentication or authorization of the user submitting the request. Depending on the type of IDOR vulnerability, malicious actors can access sensitive data, modify or delete objects, or access functions.

Typically, these vulnerabilities exist because an object identifier is exposed, passed externally, or easily guessedallowing any user to use or modify the identifier.

These vulnerabilities are common[1] and hard to prevent outside the development process since each use case is unique and cannot be mitigated with a simple library or security function. Additionally, malicious actors can detect and exploit them at scale using automated tools. These factors place end-user organizations at risk of data leaks (where information is unintentionally exposed) or large-scale data breaches (where a malicious actor obtains exposed sensitive information). Data leaks or breaches facilitated by IDOR vulnerabilities include:

ACSC, CISA, and NSA recommend that vendors, designers, and implementors of web applicationsincluding organizations that build and deploy software (such as HR tools) for their internal use and organizations that create open-source projectsimplement the following mitigations. These mitigations may reduce prevalence of IDOR vulnerabilities in software and help ensure products are secure-by-design and -default.

For more information, see the joint Enduring Security Frameworks Securing the Software Supply Chain: Recommended Practices Guide for Developers, CISAs Supply Chain Risk Management Essentials, and ACSCs Cyber Supply Chain Risk Management.

Additionally, ACSC, CISA, and NSA recommend following cybersecurity best practices in production and enterprise environments. Software developers are high-value targets because their customers deploy software on their own trusted networks. For best practices, see:

ACSC, CISA, and NSA recommend that all end-user organizations, including those with on-premises software, SaaS, IaaS, and private cloud models, implement the mitigations below to improve their cybersecurity posture.

Additionally, ACSC, CISA, and NSA recommend following cybersecurity practices. For best practices, see ACSCs Essential Eight, CISAs CPGs, and NSAs Top Ten Cybersecurity Mitigation Strategies.

ACSC, CISA, and NSA recommend that organizations:

ACSC, CISA, and NSA recommend that organizations with on-premises software or IaaS consider using SaaS models for their internet-facing websites.

Organizations leveraging SaaS with sufficient resources may consider conducting penetration testing and using vulnerability scanners. However, such tests may interfere with service provider operations. Organizations should consult with their legal counsel as appropriate to determine what can be included in the scope of the penetration testing.

If you or your organization are victim to a data breach or cyber incident, follow relevant cyber incident response and communications plans, as appropriate.

[1] A01 Broken Access Control - OWASP Top 10:2021

[2] A massive stalkerware leak puts the phone data of thousands at risk

[3] Mobile device monitoring services do not authenticate API requests

[4] Behind the stalkerware network spilling the private phone data of hundreds of thousands

[5] First American Financial Corp. Leaked Hundreds of Millions of Title Insurance Records

[6] Biggest Data Breaches in US History [Updated 2023]

[7] AT&T Hacker 'Weev' Sentenced to 3.5 Years in Prison

[8] Fuzzing | OWASP Foundation

The information in this report is being provided "as is" for informational purposes only. ACSC, CISA, and NSA do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States or Australian Governments, and this guidance shall not be used for advertising or product endorsement purposes.

This document was developed in furtherance of the authors cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

Continue reading here:
Preventing Web Application Access Control Abuse - CISA