September 17, 2019
September 5, 2019
September 3, 2019
August 31, 2019
The Imperial has been bestowed with the honor of Asia’s Best ‘Luxury Historical Hotel’ by the prestigious World Luxury Hotel Awards 2014 amongst top hotels in the continent. The recognition was conferred upon The Imperial at the 2014 World Luxury Hotel Awards Gala Ceremony held at The Bay Hotel, Cape Town, South Africa on December 6. The Imperial has been winning this award since 2010 as ‘The Leading Luxury Hotel of India’ from a list of nominations that featured most of the known brands in the industry and this is the 5th year of our victory as Continent’s Best Luxury Historical Hotel, in recognition of unsurpassed facilities and services. Also Read – ‘Playing Jojo was emotionally exhausting’The World Luxury Hotel Awards was established in 2006 to recognize the worldwide luxury hotel industry and legendary hotels with respect to overall service excellence. Award winners raised the bar of service delivery within the industry ever since as some of the world’s top hotels .Over 1,000 hotels from 145 countries were nominated to participate in the world’s most prestigious Awards initiative for luxury hotels in 2014. World Luxury Hotel Awards events offer hoteliers with a unique opportunity to savour and celebrate their achievements of the past year with their industry peers. Gracing the red carpet at the award ceremony were well-known South African celebrities alongside leading hoteliers from around the globe.
Kolkata: The Election Commission will retain 200 companies of Central Forces in the state till May 27, to assist counting and also to handle post-poll violence, if any. Out of the 200 companies, 82 will be deployed for the counting centres while the rest will be deployed in areas where the commission anticipates post-poll violence.”The remaining 510 companies of Central Forces that were present in the state during the last phase of elections on Sunday, will move out now,” a senior EC official said. Also Read – Rs 13,000 crore investment to provide 2 lakh jobs: MamataAccording to the EC official, there will be 58 counting centres across the state, with at least one centre in each of the 42 parliamentary constituencies. There will be 144 observers deputed for the counting process. “There will be a three-tier security system and section 144 will be imposed around all counting centres. The first layer will be maintained by the state police to keep interested people out of the purview of the counting centres. The second layer will be managed by the state armed police, while the third layer – in and around the counting halls – will be maintained by the Central Forces,” the official said. Also Read – Lightning kills 8, injures 16 in stateApart from the returning officers and the observers, none will be allowed with mobile phones and cameras within the counting halls. All the halls will be under CCTV surveillance and will be covered by webcasting so that it can be directly controlled by the Commission. The candidates will have to give detailed lists of the counting agents beforehand. All the people allowed to enter the counting halls will be closely frisked. The vehicles carrying the EVMs will be GPS-enabled, so that their movement can be tracked. According to sources in the CEO’s office in Bengal, the entire process of counting might take 14 hours or more. Only one table will be counted at a time. Once it is finished, counting will start for the next table. 5 percent of VVPATs will be counted from each Assembly constituency. VVPATs will be counted after the completion of counting the ballot units.
August 26, 2019
NCCIC, in collaboration with cybersecurity authorities of Australia, Canada, New Zealand, the United Kingdom, and the United States has released a joint ‘Activity Alert Report’. This report highlights five publicly available tools frequently observed in cyber attacks worldwide. Today, malicious tools are available free for use and can be misused by cybercriminals to endanger public security and privacy. There are numerous cyber incidents encountered on a daily basis that challenge even the most secure network and exploit confidential information across finance, government, health sectors. What’s surprising is that a majority of these exploits are caused by freely available tools that find loopholes in security systems to achieve an attacker’s objectives. The report highlights the five most frequently used tools that are used by cybercriminals all over the globe to perform cyber crimes. These fall into five categories: #1 Remote Access Trojan: JBiFrost Once the RAT program is installed on a victim’s machine, it allows remote administrative control of the system. It can then be used to exploit the system as per the hacker’s objectives. For example, installing malicious backdoors to obtain confidential data. These are often difficult to detect because they are designed to not appear in lists of running programs and to mimic the behavior of legitimate applications. RATs also disable network analysis tools (e.g., Wireshark) on the victim’s system. Operating systems Windows, Linux, MAC OS X, and Android are susceptible to this threat. Hackers spammed companies with emails to infiltrate their systems with the Adwind RAT into their systems. The entire story can be found on Symantec’s blog. #2 Webshell: China Chopper The China Chopper is being used widely since 2012. These webshells are malicious scripts which are uploaded to a target system to grant the hacker remote access to administrative capabilities on the system. The hackers can then pivot to additional hosts within a network. China Chopper consists of the client-side, which is run by the attacker, and the server, which is installed on the victim server and is also attacker-controlled. The client can issue terminal commands and manage files on the victim server. It can then upload and download files to and from the victim using wget. They can then either modify or delete the existing files. #3 Credential Stealer: Mimikatz Mimikatz is mainly used by attackers to access the memory within a targeted Windows system and collect the credentials of logged in users. These credentials can be then used to give access to other machines on a network. Besides obtaining credentials, the tool can obtain Local Area Network Manager and NT LAN Manager hashes, certificates, and long-term keys on Windows XP (2003) through Windows 8.1 (2012r2). When the “Invoke-Mimikatz” PowerShell script is used to operate Mimikatz, its activity is difficult to isolate and identify. In 2017, this tool was used in combination with NotPetya infected hundreds of computers in Russia and Ukraine. The attack paralysed systems and disabled the subway payment systems. The good news is that Mimikatz can be detected by most up-to-date antivirus tools. That being said, hackers can modify Mimikatz code to go undetected by antivirus. # 4 Lateral Movement Framework: PowerShell Empire PowerShell Empire is a post-exploitation or lateral movement tool. It allows an attacker to move around a network after gaining initial access. This tool can be used to generate executables for social engineering access to networks. The tool consists of a a threat actor that can escalate privileges, harvest credentials, exfiltrate information, and move laterally across a network. Traditional antivirus tools fail to detect PowerShell Empire. In 2018, the tool was used by hackers sending out Winter Olympics-themed socially engineered emails and malicious attachments in a spear-phishing campaign targeting several South Korean organizations. # 5 C2 Obfuscation and Exfiltration: HUC Packet Transmitter HUC Packet Transmitter (HTran) is a proxy tool used by attackers to obfuscate their location. The tool intercepts and redirects the Transmission Control Protocol (TCP) connections from the local host to a remote host. This makes it possible to detect an attacker’s communications with victim networks. HTran uses a threat actor to facilitate TCP connections between the victim and a hop point. Threat actors can then redirect their packets through multiple compromised hosts running HTran to gain greater access to hosts in a network. The research encourages everyone to use the report to stay informed about the potential network threats due to these malicious tools. They also provide a complete list of detection and prevention measures for each tool in detail. You can head over to the official site of the US-CERT for more information on this research. Read Next 6 artificial intelligence cybersecurity tools you need to know How will AI impact job roles in Cybersecurity New cybersecurity threats posed by artificial intelligence
August 19, 2019
Monday, February 26, 2018 << Previous PostNext Post >> Share