Main Hoon Na Hindi Mp3 Mobi

0 views
Skip to first unread message

Sabina Kehler

unread,
Aug 4, 2024, 8:48:14 PM8/4/24
to paponutsdi
CloudRAN is about meeting the requirement for edge computing as an enabler for new use cases. Furthermore, operators are looking for ways to benefit from the private wireless business opportunity. Cloud RAN can be referred to as Virtualized Radio Access Network (vRAN). Its characteristics include agility, scalability, flexibility and openness. Nokia Cloud RAN brings the needed cost efficiency and resource efficiency for Communication Service Providers and Enterprises. It complements the existing network assets, helps operators build synergies with enterprise on-premises cloud, and paves the way for 6G. Nokia Cloud RAN is providing feature and performance consistency and interworking with classical RANs from day 1.

Nokia has demonstrated through numerous successful trial projects that it can be deployed effectively and is poised for commercial availability. A1 Bulgaria, Elisa, Etisalat, Vodafone Italy, stc among others, have already successfully operated Nokia Cloud RAN and proven its capabilities, paving the way for the commercial availability of Cloud RAN.


Cloud RAN introduces an architectural evolution to Radio Access Networks. It means that RAN hardware and software are disaggregated: To take full advantage of the cloud-computing model, the functions are built with cloud-native design. With RAN virtualization, it is possible to use shared edge infrastructure for edge cloud deployments. This architectural evolution is about introducing 5G radio capacity for new services in the enterprise space.


Hardware acceleration technology is a critical element in Cloud RAN performance. Nokia In-Line architecture option implemented with a specialized high-performance accelerator, Nokia Cloud RAN SmartNIC. Nokia SmartNIC provides performance parity between Purpose-built RAN and Cloud RAN environments, and it is an energy-efficient solution with an optimal capacity/power ratio for demanding L1 processing.


Cloud RAN drives the next level of network agility for CSPs and Enterprises in collaboration with the industry ecosystem. Reliable, real-time wireless connectivity is a game-changing application in the enterprise IT environments. For mobile operators, Cloud RAN brings the opportunity to deliver innovative technologies and services that help establish new business and revenue models with enterprises with a fast time-to-market. It also opens the door for closer collaboration with public cloud providers.


Shared cloud infrastructure helps use network resources more efficiently and cost effectively. Enterprise applications can be co-hosted with 5G Cloud RAN in the on-premises cloud at the edge of the network. Network operations can be automated and simplified in a non-telecom environment for further synergies.


Digital technologies are transforming industries and enhancing productivity in a completely different scale than ever before. 5G Cloud RAN helps physical industries embrace the benefits of digitalization. Today, digital industries such as online retail, media and banking are way ahead of physical industries in adopting digitalization. 5G Cloud RAN is the reliable, real-time adhesive between the physical and digital worlds, helping industries such as manufacturing, healthcare, transportation, logistics, mining, and energy to jump start their digital transformation with private wireless connectivity.


Nokia aims to lead the market in radio network openness. Cloud RAN is one of the main pillars of it with ensuring vertical disaggregation options in radio networks, while Open RAN makes the horizontal disaggregation a reality.


Twilio recently identified unauthorized access to information related to 163 Twilio customers, including Okta. Access was gained to internal Twilio systems, where data of some Okta customers was accessible to a threat actor (detailed below).


On the evening of Sunday, August 7, 2022, Twilio disclosed that a number of Twilio customer accounts and internal applications were accessed in attacks that resulted from one or more of these phishing campaigns.


Okta offers customers a range of authenticators to choose from, including the use of SMS for the delivery of one-time codes. Twilio provides one of two services Okta leverages for customers that choose to use SMS as an authentication factor.


A review of logs provided to us by Twilio revealed that the threat actor was seeking to expand their access. We assess that the threat actor used credentials (usernames and passwords) previously stolen in phishing campaigns to trigger SMS-based MFA challenges, and used access to Twilio systems to search for One Time Passwords sent in those challenges.


The second category of exposed mobile phone numbers were incidental to this activity. Incidental, in this case, can be defined as phone numbers that may have been present in the Twilio portal during the threat actor's limited activity window. Okta's analysis reveals no indication that the threat actor targeted or used such mobile phone numbers.


This exercise uncovered an event in which the threat actor successfully tested this technique against a single account unrelated to the primary target. The threat actor did not perform any additional actions once they had validated this access, and returned to their prior activity.


Scatter Swine has directly targeted Okta via phishing campaigns on several occasions, but was unable to access accounts due to the strong authentication policies that protect access to our applications.


We have observed the threat actor delivering phishing lures in bulk to individuals in targeted organizations via text messages. We are aware of multiple instances where hundreds of messages were sent to employees and even to family members of employees.


The threat actor calls targeted individuals and impersonates support trying to understand how authentication works. The accent of the threat actor appears to be North American, confident and clearly spoken.


If the threat actor successfully harvests user credentials during a SMishing (SMS phishing) campaign, attempts are made to authenticate using anonymizing proxy services. In this particular campaign the threat actor favored Mullvad VPN.


The phishing kit used by the threat actor is designed to capture usernames, passwords and OTP factors. We have also observed the threat actor triggering multiple push notifications in an attempt to trick a target into allowing access to the account.


Train users to identify indicators of suspicious emails, phishing sites and common social engineering techniques used by attackers. Okta customers can make it easy for users to report potential issues by configuring End User Notifications and Suspicious Activity Reporting.


Protect administrative sessions: Take a "Zero Standing Privileges" approach to administrative access. Assign administrators Custom Admin Roles with the least permissions required for daily tasks, and require dual authorization for JIT (just-in-time) access to more privileged roles. Apply ASN and IP Session Binding (from Settings > Features) to all administrative apps to prevent the replay of stolen administrative sessions. Enable Protected Actions (under Settings > Features) to force re-authentication whenever an administrative user attempts to perform sensitive actions.


The following Okta System Log query searches for SMS events (authentication challenges, password resets or factor enrolment events) from new devices and network locations for a given user, filtered according to known TTPs discovered through the analysis of this campaign.


eventType sw "system.sms.send" and client.device eq "Computer" and client.userAgent.os sw "Windows" and securityContext.isProxy eq "true" and ((debugContext.debugData.behaviors co "New Device=POSITIVE" and debugContext.debugData.behaviors co "New IP=POSITIVE") OR (debugContext.debugData.logOnlySecurityData co "\"New Device\":\"POSITIVE\"" and debugContext.debugData.logOnlySecurityData co "\"New IP\":\"POSITIVE\""))


debugContext.debugData.factor ne "FIDO_WEBAUTHN" and eventType sw"user.authentication.auth_via" and client.device eq "Computer" andclient.userAgent.os sw "Windows" and ((debugContext.debugData.behaviorsco "New Device=POSITIVE" and debugContext.debugData.behaviors co "NewIP=POSITIVE") OR (debugContext.debugData.logOnlySecurityData co "\"NewDevice\":\"POSITIVE\"" and debugContext.debugData.logOnlySecurityData co"\"New IP\":\"POSITIVE\""))


Detection Logic edited in System Log events to reflect that attributes in logOnlySecurityData are captured in a json format "Key":"Value". Detections that evaluate behaviours (debugContext.debugData.behaviors) take the form of Key=Value and remain unchanged.


The Defensive Cyber Operations (DCO) team is responsible for detecting and responding to cyber threats that impact Okta or our customers via the Okta platform. Our intelligence-driven capability identifies the adversaries most likely to impact Okta and our customers, and prioritises our defensive capabilities based on the threats most likely to be realised.


ETNO members are pan-European operators, which also hold new entrant positions outside their national markets. ETNO brings together the main investors in innovative and high-quality e-communications platforms and services. Through their investment and innovation efforts, ETNO members directly contribute to building a digital economy and society and to achieving the objectives of the Digital Agenda for Europe. ETNO member companies collectively employ around 600,000 people throughout Europe.


We provide converged fixed net and mobile communication and thereby create new opportunities. For our customers this means that they get the best of both worlds. This is a crucial step towards the knowledge society. The backbone of our success is the most cutting-edge network in Austria. With our team we do everthing we can to become even better every day. Our objective is to deliver the best performance. We can do it together - with passion and inspiration.


BH Telecom has been providing telecommunication services on the whole territory of Bosnia and Herzegovina by means of the up-to-dated technologies, at the same time complying with relevant international and local standards and regulations for the purpose of further evolution of our information society.

3a8082e126
Reply all
Reply to author
Forward
0 new messages