Russian telecom consortium warns of impractical import substitution targets

Russia’s Telecommunication Technologies Consortium (TT Consortium), which includes Rostech, Rostelecom, and Element, has raised serious concerns about the country’s new import substitution requirements for telecom equipment. The consortium has formally communicated to the Ministry of Industry and Trade and the Ministry of Digital Transformation that the proposed targets for domestic components are unachievable.

According to the TT Consortium, the domestic market in Russia needs more suitable alternatives to many foreign components, making the mandated thresholds for domestic content impractical. Furthermore, the consortium has warned of potential severe repercussions if the stringent regulations are adopted in their current form. They fear the resolution could lead to the suspension of decisions recognising telecom equipment as domestic starting 1 December 2024. Consequently, this could result in no domestic telecom equipment being available, disrupting supply chains and impacting key sectors, including government operations and critical information infrastructure.

Additionally, the Telecommunication Technologies Consortium has criticised the draft government decree’s ambitious targets, which require telecom equipment to include 10% domestic components by 2026, 30% by 2028, and 60% by 2030. Manufacturers within the consortium argue that redesigning equipment to meet these requirements is daunting, given the current state of domestic component availability. They assert that such redesigns could lead to significant operational disruptions and hinder their ability to supply essential equipment to government clients and critical infrastructure entities.

US CISA urges to address vulnerable Ivanti appliance

The Cybersecurity and Infrastructure Security Agency (CISA) have urged federal agencies to either remove or upgrade an outdated Ivanti appliance that has been exploited in recent attacks.

Ivanti updated its advisory, warning that a ‘limited number of customers’ had been breached due to the vulnerability CVE-2024-8190, which was disclosed earlier in the week. The flaw affects Ivanti’s Cloud Service Appliance (CSA), a tool used for secure internet communication and managing devices connected to central consoles. Exploitation of this bug, which the CISA confirmed, allows hackers to gain access to the affected device.

CISA has mandated that all federal civilian agencies remove the appliance or upgrade to version 5.0 by October 4. Ivanti advised customers to check for any new or modified administrative users, which could indicate exploitation of the bug, and to monitor security alerts with specific tools.

This advisory came just one day after another Ivanti vulnerability raised concerns. The company, which faced significant scrutiny after a series of high-profile nation-state attacks exploited its products earlier this year, has committed to a security overhaul.

Microsoft proposes shift in cybersecurity by eliminating kernel-level access

Microsoft is developing an alternative platform for cybersecurity companies that currently rely on deep access to its operating system’s kernel layer, following a global IT crisis caused by a faulty CrowdStrike update. In response to customer and partner demand, Microsoft announced plans to design a ‘new platform capability’ that would allow security vendors to operate without needing kernel-level access, which is the most critical layer of the OS.

This initiative aims to improve system reliability while maintaining strong security. The shift will require significant changes not only for Microsoft but also for external cybersecurity firms that use kernel access to detect threats. Microsoft explained that newer versions of Windows provide more ways for cybersecurity vendors to offer services outside of the kernel layer. However, some in the security industry believe kernel access is still essential for innovation and advanced threat detection.

Sophos’ Chief Research Officer, Simon Reed, emphasised that kernel access is vital for security products, describing it as fundamental to both Sophos’ offerings and Windows endpoint security in general. ESET echoed this sentiment, supporting changes to the Windows ecosystem as long as they do not weaken security or limit cybersecurity solution options. Both companies argue that restricting kernel access would hinder innovation and the detection of future threats.

The debate over kernel access is unlikely to result in major changes soon, as security companies fear it could give Microsoft’s own security products an unfair advantage. Given Microsoft’s antitrust history, this issue could end up in court, with government officials from the US and Europe closely monitoring developments.

Malta launches public consultation to establish legal protections for ethical hackers

The Government of Malta has initiated a public consultation to establish a comprehensive legal framework for ethical hackers, also known as security researchers, who identify and disclose vulnerabilities in ICT systems to bolster cybersecurity. That initiative aims to clearly define the role of ethical hackers, ensuring that their activities are regulated and protected by law, enabling them to operate within a transparent and legitimate framework.

In addition, the Government of Malta has proposed that ICT system owners, especially those managing critical infrastructure, implement Coordinated Vulnerability Disclosure Policies (CVDP) to handle better the detection and resolution of security flaws identified by ethical hackers. Overseen by the Directorate for Critical Infrastructure Protection (CIPD), this policy comes in response to an incident where four computer science students were arrested after discovering a vulnerability in the FreeHour app.

Despite acting in good faith, the students faced legal consequences, highlighting the urgent need for clearer protections and legal guidance for ethical hackers. The proposed framework aims to formalise the process, encouraging cooperation between public and private entities and ensuring that cybersecurity research is conducted safely and responsibly.

Open to public input until 7 October 2024, the consultation is expected to lead to legislative reforms that distinguish ethical hacking from illegal activities, providing much-needed clarity for those working to enhance cybersecurity.

SITA launches advanced NAC solution for enhanced airport security

SITA has introduced its new cybersecurity solution, SITA Managed NAC (Network Access Control), designed to enhance airport and airline digital infrastructure security. That innovative solution addresses the increasing threats to digital networks in complex environments like airports, providing essential protection for critical communication systems.

SITA Managed NAC offers advanced security features for Local Area Network (LAN) and Wireless LAN communications. Specifically, it incorporates additional layers of identification checks and network segmentation, which ensure compliance with industry standards while safeguarding passenger systems and operational efficiency.

Furthermore, the solution provides granular control over network access, including detailed logging capabilities and the ability to quarantine non-compliant devices. As a result, it supports airports and airlines in meeting stringent cybersecurity recommendations from authorities such as the US Transportation Security Agency (TSA) and the Airports Council International (ACI).

Moreover, SITA Managed NAC integrates seamlessly with the existing SITA Campus Network product, leveraging Cisco’s Identity Services Engine (ISE) platform to enforce identity-based access controls and policies. Adopting a Zero Trust security model, the solution continuously authenticates and authorises access requests, significantly reducing the risk of unauthorised access and potential breaches.

Dubai to introduce AI security policy

Dubai has introduced a pioneering AI security policy through the Dubai Electronic Security Center, led by H.E. Amer Sharaf. This landmark initiative is designed to address the unique challenges and vulnerabilities associated with AI. The policy focuses on three critical pillars: data integrity, protection of critical infrastructure, and ethical AI usage.

By establishing robust guidelines and best practices, Dubai aims to ensure that AI systems are resilient against emerging threats and operate securely. This comprehensive approach not only sets a high standard for AI security but also positions Dubai as a global leader in digital innovation in accordance with the UAE National Strategy for Artificial Intelligence 2031.

As part of its broader strategy to drive digital transformation, Dubai has implemented a pioneering AI security policy that plays a crucial role in its ambition to become a leading global digital city. Integrating advanced security measures into its AI initiatives allows Dubai to mitigate risks while effectively creating an environment conducive to innovation. That policy underpins ambitious projects such as self-driving vehicles and smart health systems, highlighting Dubai’s commitment to fostering a secure and dynamic digital landscape that aligns with its forward-looking vision.

FCC pushes for new players in space economy

The chair of the Federal Communications Commission (FCC), Jessica Rosenworcel, has called for increased competition to SpaceX’s Starlink satellite internet service. Starlink currently operates nearly two-thirds of all active satellites and is responsible for a significant portion of space-based internet traffic.

Rosenworcel highlighted that monopolies do not benefit the economy, emphasising the need to bring in more companies to develop satellite constellations and drive innovation in space. She stressed that competition in communications markets typically leads to lower prices and more innovation, and the space sector should not be an exception.

The FCC has been working to support new entrants in the space economy, offering guidance on licensing processes and promoting outreach efforts. Rosenworcel aims to encourage more players to enter the market and challenge Starlink’s dominant position.

In 2022, the FCC withdrew $885.5 million in rural broadband subsidies from Starlink, citing the service’s inability to meet basic program requirements. SpaceX had originally agreed to deliver high-speed internet to over 600,000 rural homes and businesses across 35 US states.

China amends law to tackle data fraud

Top legislative body in China has approved changes to its statistics law to combat data fraud. The move addresses growing concerns over the reliability of economic figures in the world’s second-largest economy. Amended regulations aim to prevent statistical manipulation and penalise officials involved in falsifying economic reports.

Authorities have acknowledged persistent problems with statistical fraud, which has led to public mistrust in economic data. The issue has become a major focus for lawmakers, as many believe it harms the accuracy of important economic indicators.

External analysts have long questioned the authenticity of Chinese data, particularly as the country grapples with an economic slowdown. The new law is part of ongoing efforts to restore confidence by cracking down on fraudulent reporting.

Government in China has vowed to investigate and penalise officials involved in data manipulation, seeking to improve transparency and the overall quality of economic statistics.

Surge in cyberattacks targets US utilities

Cyberattacks targeting US utilities surged nearly 70% this year, according to data from Check Point Research. The energy sector is particularly vulnerable, with outdated software systems making utilities easier targets. Despite the spike in incidents, none of the attacks have yet caused severe damage, but experts warn that a coordinated effort could be disastrous, affecting essential services and resulting in major financial losses.

Check Point data showed an average of 1,162 cyberattacks through August, compared to 689 in 2023. These figures highlight the increasing risks as the US power grid rapidly expands to meet higher energy demand, particularly from new sectors such as AI data centres. Experts say the grid’s rapid growth creates more potential entry points for attackers.

Outdated Internet of Things (IoT) and Incident Command Systems (ICS) used by many utilities are not as secure as other industries’ advanced software, putting critical infrastructure at heightened risk. Regulations like NERC’s Critical Infrastructure Protection provide only a basic level of security, which some experts argue is insufficient given the growing threats.

The financial impact of cyber breaches in the energy sector has been significant. In 2022, IBM reported the average cost of a data breach in the sector reached $4.72 million. With the 2024 US election approaching, cybersecurity experts expect an even greater surge in cyberattacks on essential infrastructure.

Data centres now deemed critical national infrastructure in the UK

Great Britain has recently designated its data centres as critical national infrastructure,’ a move designed to bolster their protection against cyber threats. This new classification aligns data centres with other essential services, such as water and energy, highlighting their importance in maintaining the country’s communications and economy.

The announcement comes amidst significant investment in the sector. This includes a £3.75 billion plan by DC01UK to build Europe’s largest data centre in Hertfordshire and an £8 billion commitment by Amazon Web Services for UK operations over the next five years. These investments underscore the increasing importance of securing digital infrastructure.

UK technology minister Peter Kyle emphasised that the new designation would improve collaboration between the government and data centre operators. This collaboration aims to prevent disruptions and protect against cybercriminals. This move follows recent incidents such as the CrowdStrike outage in July, which revealed vulnerabilities in digital infrastructure and underscored the need for increased security.