Home Blog Page 3807

Google simply confirmed Apple Intelligence the pitfalls of letting generative AI create art work

0



When Apple introduced Apple Intelligence as a part of the iOS 18 unveiling at WWDC in June, it confirmed that one of many new options that fall below that umbrella will contain photos created by generative AI. However whereas a number of the Apple Intelligence options are already out there within the iOS 18.1 developer beta, there has to date been no signal of the promised image-based generative AI magic. And Google may need simply proven why Apple is correct to hold fireplace.

Following the launch of the Google Pixel 9 sequence of gadgets, individuals have been placing Pixel Studio by its paces. It is an app that makes use of Google’s AI smarts to create photos, as you may think, primarily based on textual content prompts supplied by customers. However whereas Google has after all put guardrails in place to try to forestall individuals from misusing the know-how, some report that these guardrails aren’t doing such a superb job at … guarding.



WeLiveSecurity named Greatest Cybersecurity Vendor Weblog!


Digital Safety

The outcomes of the 2024 European Cybersecurity Blogger Awards are in and the winner of the Greatest Cybersecurity Vendor Weblog is… drumroll, please… WeLiveSecurity!

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

We’re delighted to announce that WeLiveSecurity has been named the Greatest Cybersecurity Vendor Weblog at this 12 months’s version of the European Cybersecurity Blogger Awards. It is an honor to have the collective expertise and work of ESET’s safety researchers and writers acknowledged with the accolade.

There have been many wonderful nominations this 12 months – our congratulations to all different winners and nominees throughout the occasion’s 11 classes. We additionally owe an enormous thank-you to you, our readers, to your ongoing assist.

The awards had been introduced in the course of the Safety Bloggers’ Meetup, an occasion held alongside the Infosecurity Europe convention in London final week. Annually, this gathering honors the efforts of safety bloggers, podcasters, journalists, pundits and social media personalities who assist safety practitioners and the broader public sustain with the most recent developments within the trade.

As you may think about, the competitors was really stiff. The winners had been decided by a mixture of public votes and a panel of judges, recognizing the impression that the work of the nominees has on each the safety group and most of the people.

Certainly, that is additionally a wonderful alternative to thanks, our readers, to your assist – it means the world to us and encourages us to maintain pushing the envelope. We stay up for bringing you extra top-tier content material and doing our half in serving to you and your group keep protected from digital threats.

For individuals who might not be acquainted, right here’s a fast recap of WeLiveSecurity’s journey to this point:

Launched in 2013 by ESET, WeLiveSecurity has developed right into a premier supply of cybersecurity analysis and insights. Obtainable in 5 languages, the weblog’s content material spans the most recent discoveries from ESET’s menace researchers to safety recommendation for organizations of varied sizes all the best way to sensible ideas for on a regular basis customers.

Our crew of safety professionals and writers actually lives and breathes safety because it goals to assist our readers make sense of the ever-evolving safety panorama. This entails tapping into the experience of ESET’s safety researchers who work “within the trenches” and allow us to give you a novel glimpse into a number of the most subtle threats lurking within the digital realm.

Enhance the resilience of Amazon Managed Service for Apache Flink utility with system-rollback characteristic

0


“All the pieces fails on a regular basis” – Werner Vogels, CTO Amazon

Though prospects all the time take precautionary measures after they construct purposes, utility code and configuration errors can nonetheless occur, inflicting utility downtime. To mitigate this, Amazon Managed Service for Apache Flink has constructed a brand new layer of resilience by permitting prospects to go for the system-rollback characteristic that can seamlessly revert the appliance to a earlier operating model, thereby bettering utility stability and excessive availability.

Apache Flink is an open supply distributed processing engine that provides highly effective programming interfaces for stream and batch processing. It additionally provides first-class assist for stateful processing and occasion time semantics. Apache Flink helps a number of programming languages, together with Java, Python, Scala, SQL, and a number of APIs with completely different ranges of abstraction. These APIs can be utilized interchangeably in the identical utility.

Managed Service for Apache Flink is a totally managed, serverless expertise in operating Apache Flink purposes, and it now helps Apache Flink 1.19.1, the newest launched model of Apache Flink on the time of this writing.

This put up explores easy methods to use the system-rollback characteristic in Managed Service for Apache Flink.We focus on how this performance improves your utility’s resilience by offering a extremely accessible Flink utility. By an instance, additionally, you will discover ways to use the APIs to have extra visibility of the appliance’s operations. This is able to assist in troubleshooting utility and configuration points.

Error eventualities for system-rollback

Managed Service for Apache Flink operates below a shared accountability mannequin. This implies the service owns the infrastructure to run Flink purposes which are safe, sturdy, and extremely accessible. Prospects are chargeable for ensuring utility code and configurations are appropriate. There have been instances the place updating the Flink utility failed because of code bugs, incorrect configuration, or inadequate permissions. Listed here are a number of examples of frequent error eventualities:

  1. Code bugs, together with any runtime errors encountered. For instance, null values will not be appropriately dealt with within the code, leading to NullPointerException
  2. The Flink utility is up to date with parallelism larger than the max parallelism configured for the appliance.
  3. The appliance is up to date to run with incorrect subnets for a digital personal cloud (VPC) utility which leads to failure at Flink job startup.

As of this writing, the Managed Service for Apache Flink utility nonetheless reveals a RUNNING standing when such errors happen, even though the underlying Flink utility can’t course of the incoming occasions and get better from the errors.

Errors can even occur throughout utility auto scaling. For instance, when the appliance scales up however runs into points restoring from a savepoint because of operator mismatch between the snapshot and the Flink job graph. This could occur when you did not set the operator ID utilizing the uid methodology or modified it in a brand new utility.

You might also obtain a snapshot compatibility error when upgrading to a brand new Apache Flink model. Though stateful model upgrades of Apache Flink runtime are typically suitable with only a few exceptions, you possibly can discuss with the Apache Flink state compatibility desk and Managed Service for Apache Flink documentation for extra particulars.

In such eventualities, you possibly can both carry out a force-stop operation, which stops the appliance with out taking a snapshot, or you possibly can roll again the appliance to the earlier model utilizing the RollbackApplication API. Each processes want buyer intervention to get better from the problem.

Computerized rollback to the earlier utility model

With the system-rollback characteristic, Managed Service for Apache Flink will carry out an computerized RollbackApplication operation to revive the appliance to the earlier model when an replace operation or a scaling operation fails and also you encounter the error eventualities mentioned beforehand.

If the rollback is profitable, the Flink utility is restored to the earlier utility model with the newest snapshot. The Flink utility is put right into a RUNNING state and continues processing occasions. This course of ends in excessive availability of the Flink utility with improved resilience below minimal downtime. If the system-rollback fails, the Flink utility will likely be in a READY state. If so, it is advisable repair the error and restart the appliance.

Nevertheless, if a Managed Service for Apache Flink utility is began with utility or configuration points, the service won’t begin the appliance. As a substitute, it would return within the READY state. This can be a default habits no matter whether or not system-rollback is enabled or not.

System-rollback is carried out earlier than the appliance transitions to RUNNING standing. Computerized rollback won’t be carried out if a Managed Service for Apache Flink utility has already efficiently transitioned to RUNNING standing and later faces runtime points corresponding to checkpoint failures or job failures. Nevertheless, prospects can set off the RollbackApplication API themselves in the event that they need to roll again on runtime errors.

Right here is the state transition flowchart of system-rollback.

Amazon Managed Service for Apache Flink State Transition

System-rollback is an opt-in characteristic that wants you to allow it utilizing the console or the API. To allow it utilizing the API, invoke the UpdateApplication API with the next configuration. This characteristic is obtainable to all Apache Flink variations supported by Managed Service for Apache Flink.

Every Managed Service for Apache Flink utility has a model ID, which tracks the appliance code and configuration for that particular model. You may get the present utility model ID from the AWS console of the Managed Service for Apache Flink utility.

aws kinesisanalyticsv2 update-application 
	--application-name sample-app-system-rollback-test 
	--current-application-version-id 5 
	--application-configuration-update "{"ApplicationSystemRollbackConfigurationUpdate": {"RollbackEnabledUpdate": true}}" 
	--region us-west-1

Utility operations observability

Observability of the appliance variations change is of utmost significance as a result of Flink purposes may be rolled again seamlessly from newly upgraded variations to earlier variations within the occasion of utility and configuration errors. First, visibility of the model historical past will present chronological details about the operations carried out on the appliance. Second, it would assist with debugging as a result of it reveals the underlying error and why the appliance was rolled again. That is in order that the problems may be fastened and retried.

For this, you will have two extra APIs to invoke from the AWS Command Line Interface (AWS CLI):

  1. ListApplicationOperations – This API will checklist all of the operations, corresponding to UpdateApplication, ApplicationMaintenance, and RollbackApplication, carried out on the appliance in a reverse chronological order.
  2. DescribeApplicationOperation – This API will present particulars of a particular operation listed by the ListApplicationOperations API together with the failure particulars.

Though these two new APIs will help you perceive the error, you also needs to discuss with the AWS CloudWatch logs to your Flink utility for troubleshooting assist. Within the logs, yow will discover extra particulars, together with the stack hint. When you establish the problem, repair it and replace the Flink utility.

For troubleshooting info, discuss with documentation .

System-rollback course of circulation

The next picture reveals a Managed Service for Apache Flink utility in RUNNING state with Model ID: 3. The appliance is consuming knowledge efficiently from the Amazon Kinesis Information Stream supply, processing it, and writing it into one other Kinesis Information Stream sink.

Additionally, from the Apache Flink Dashboard, you possibly can see the Standing of the Flink utility is RUNNING.

To exhibit the system-rollback, we up to date the appliance code to deliberately introduce an error. From the appliance most important methodology, an exception is thrown, as proven within the following code.

throw new Exception("Exception thrown to exhibit system-rollback");

Whereas updating the appliance with the newest jar, the Model ID is incremented to 4, and the appliance Standing reveals it’s UPDATING, as proven within the following screenshot.

After a while, the appliance rolls again to the earlier model, Model ID: 3, as proven within the following screenshot.

The appliance now has efficiently gone again to model 3 and continues to course of occasions, as proven by Standing RUNNING within the following screenshot.

To troubleshoot what went fallacious in model 4, checklist all the appliance variations for the Managed Service for Apache Flink utility: sample-app-system-rollback-test.

aws kinesisanalyticsv2 list-application-operations 
    --application-name sample-app-system-rollback-test 
    --region us-west-1

This reveals the checklist of operations achieved on Flink utility: sample-app-system-rollback-test

{
  "ApplicationOperationInfoList": [
    {
      "Operation": "SystemRollbackApplication",
      "OperationId": "Z4mg9iXiXXXX",
      "StartTime": "2024-06-20T16:52:13+01:00",
      "EndTime": "2024-06-20T16:54:49+01:00",
      "OperationStatus": "SUCCESSFUL"
    },
    {
      "Operation": "UpdateApplication",
      "OperationId": "zIxXBZfQXXXX",
      "StartTime": "2024-06-20T16:50:04+01:00",
      "EndTime": "2024-06-20T16:52:13+01:00",
      "OperationStatus": "FAILED"
    },
    {
      "Operation": "StartApplication",
      "OperationId": "BPyrMrrlXXXX",
      "StartTime": "2024-06-20T15:26:03+01:00",
      "EndTime": "2024-06-20T15:28:05+01:00",
      "OperationStatus": "SUCCESSFUL"
    }
  ]
}

Evaluation the main points of the UpdateApplication operation and be aware the OperationId. When you use the AWS CLI and APIs to replace the appliance, then the OperationId may be obtained from the UpdateApplication API response. To analyze what went fallacious, you should utilize OperationId to invoke describe-application-operation.

Use the next command to invoke describe-application-operation.

aws kinesisanalyticsv2 describe-application-operation 
    --application-name sample-app-system-rollback-test 
    --operation-id zIxXBZfQXXXX 
    --region us-west-1

This can present the main points of the operation, together with the error.

{
    "ApplicationOperationInfoDetails": {
        "Operation": "UpdateApplication",
        "StartTime": "2024-06-20T16:50:04+01:00",
        "EndTime": "2024-06-20T16:52:13+01:00",
        "OperationStatus": "FAILED",
        "ApplicationVersionChangeDetails": {
            "ApplicationVersionUpdatedFrom": 3,
            "ApplicationVersionUpdatedTo": 4
        },
        "OperationFailureDetails": {
            "RollbackOperationId": "Z4mg9iXiXXXX",
            "ErrorInfo": {
                "ErrorString": "org.apache.flink.runtime.relaxation.handler.RestHandlerException: Couldn't execute utility.ntat org.apache.flink.runtime.webmonitor.handlers.JarRunOverrideHandler.lambda$handleRequest$4(JarRunOverrideHandler.java:248)ntat java.base/java.util.concurrent.CompletableFuture.uniHandle(CompletableFuture.java:930)ntat java.base/java.util.concurrent.CompletableFuture$UniHandle.tryFire(CompletableFuture.java:907)ntat java.base/java.util.concurrent.CompletableFuture.postComplete(CompletableFuture.java:506)ntat java.ba"
            }
        }
    }
}

Evaluation the CloudWatch logs for the precise error info. The next code reveals the identical error with the whole stack hint, which demonstrates the underlying drawback.

Amazon Managed Service for Apache Flink did not transition the appliance to the specified state. The appliance is being rolled-back to the earlier state. Please examine the next error. org.apache.flink.runtime.relaxation.handler.RestHandlerException: Couldn't execute utility.
at org.apache.flink.runtime.webmonitor.handlers.JarRunOverrideHandler.lambda$handleRequest$4(JarRunOverrideHandler.java:248)
at java.base/java.util.concurrent.CompletableFuture.uniHandle(CompletableFuture.java:930)
at java.base/java.util.concurrent.CompletableFuture$UniHandle.tryFire(CompletableFuture.java:907)
...
...
...
Attributable to: java.lang.Exception: Exception thrown to exhibit system-rollback
at com.amazonaws.providers.msf.StreamingJob.most important(StreamingJob.java:101)
at java.base/jdk.inner.replicate.NativeMethodAccessorImpl.invoke0(Native Methodology)
at java.base/jdk.inner.replicate.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at java.base/jdk.inner.replicate.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.replicate.Methodology.invoke(Methodology.java:566)
at org.apache.flink.consumer.program.PackagedProgram.callMainMethod(PackagedProgram.java:355)
... 12 extra

Lastly, it is advisable repair the problem and redeploy the Flink utility.

Conclusion

This put up has defined easy methods to allow the system-rollback characteristic and the way it helps to reduce utility downtime in unhealthy deployment eventualities. Furthermore, we have now defined how this characteristic will work, in addition to easy methods to troubleshoot underlying issues. We hope you discovered this put up useful and that it supplied perception into easy methods to enhance the resilience and availability of your Flink utility. We encourage you to allow the characteristic to enhance resilience of your Managed Service for Apache Flink utility.

To be taught extra about system-rollback, discuss with the AWS documentation.


Concerning the creator

Subham Rakshit is a Senior Streaming Options Architect for Analytics at AWS primarily based within the UK. He works with prospects to design and construct streaming architectures to allow them to get worth from analyzing their streaming knowledge. His two little daughters maintain him occupied more often than not outdoors work, and he loves fixing jigsaw puzzles with them. Join with him on LinkedIn.

The High 10 Standards for Selecting the Proper SSE Resolution for Your Up to date Safety Structure


As organizations navigate immediately’s evolving digital panorama, securing their networks and information has develop into an more and more complicated enterprise. Conventional safety approaches are proving outdated in a brand new period of increasing cloud providers, IoT gadgets, versatile work, and complex threats. A brand new strategy referred to as Safety Service Edge (SSE) has emerged as a logical outgrowth of latest advances in cloud and networking applied sciences.

SSE is a cloud-based answer that delivers an built-in set of safety capabilities on the community edge, shifting safety nearer to customers and gadgets whereas eliminating poorly built-in merchandise, sluggish person experiences, and the administration complexities of the previous. SSE offers safe entry to net, cloud, and personal functions; menace safety in opposition to net and community assaults; and information leak prevention. It combines a number of level options into a single built-in safety service delivering Safe Internet Gateway (SWG), Subsequent-Gen Firewall (NGFW), Cloud Entry Safety Dealer (CASB), Knowledge Loss Prevention (DLP), and Zero Belief Community Entry (ZTNA).

SSE choice standards

A well-chosen SSE answer can function the cornerstone of your group’s safety structure. Listed here are the highest ten SSE characteristic analysis standards you must contemplate from a platform design and operations perspective:

Cloud-native structure –To make sure scalability, flexibility, and the flexibility to seamlessly combine with cloud providers and adapt to evolving safety wants, search for an answer that’s constructed as a cloud-native platform. This structure helps speedy deployment, straightforward administration, and computerized updates.

Hybrid setting help – Dynamic segmentation throughout hybrid environments, together with multi-cloud and on-premises setups, is a necessity.

Integration along with your present ecosystem – Seamlessly integrating along with your group’s present instruments, equivalent to an endpoint safety suite, identification supplier, community monitoring answer, safety analytics platform, automation platform, and cell system administration suite, can be crucial.

International cloud spine – A globally distributed community of factors of presence (PoPs) interconnected with one another in order that site visitors engineered information will be handed from PoP to PoP will guarantee low-latency entry for customers anyplace on this planet. The answer should additionally know learn how to choose and use the safety coverage enforcement level that’s closest to the person/system, contemplating not simply geographic location but in addition interconnection latency values for the precise utility entry being made. That is vital for sustaining excessive efficiency and a optimistic person expertise, particularly for distant and cell staff.

Scalability and reliability – The platform should be elastic to help peak demand bursts and the general progress of a corporation’s customers, gadgets, and information, demonstrating the flexibility to

activate extra international PoPs and processing sources as wanted and on demand. It ought to provide excessive availability and reliability for steady entry to functions and providers.

Superior AI and ML capabilities – Synthetic intelligence (AI) and machine studying (ML) can contribute superior capabilities for menace detection, response, and predictive analytics. Through the use of AI/ML to reinforce the evaluation of community site visitors and person conduct, you’ll be able to uncover Indicators of Compromise (IoC) and set up safety baselines. Performing predictive evaluation for potential threats earlier than they materialize can even permit automated preventive measures to be taken via dynamic controls primarily based on the chance profile of a person or system.

Visibility, analytics, and real-time reporting – This offers deep visibility into threats and vulnerabilities and collects a variety of knowledge varieties from numerous sources, together with community site visitors, person actions, utility utilization, safety occasions, and menace occasions; and processes information in actual time as a basis for complete analytics and reporting. Using AI/ML to reinforce analytics will help in figuring out patterns, anomalies, and developments within the information. An efficient real-time reporting system should embody an alerting mechanism that notifies related personnel of vital occasions or IoCs.

Unified administration and operations – A single administration console reduces the complexity of managing disparate safety instruments, enabling extra environment friendly coverage configuration and enforcement and updating throughout all the safety infrastructure. Observe that some distributors have acquired and bolted collectively disparate safety instruments to attempt to create this unified strategy – make certain to judge the convenience of administration, coverage administration, analytics, and troubleshooting throughout all SSE useful capabilities.

Person expertise – Your unified SSE platform of selection ought to ship a seamless and constant person expertise, no matter the place customers are positioned or what sources they’re accessing. Safety measures mustn’t impede efficiency or usability, which is especially vital for supporting versatile workforces who could also be working from house, in an workplace, and on the street utilizing cloud-based functions.

Compliance – Assembly main compliance requirements (SOC sort 2, ISO 27001, GDPR, HIPAA, PCI, and so forth.) is crucial, taking into consideration that your information is being transported by and residing in hosted infrastructure. By centralizing the oversight of knowledge safety and entry controls, organizations can simply generate experiences to streamline and validate compliance throughout yearly audits.

A remaining phrase

Choosing probably the most appropriate SSE answer is a pivotal step for organizations aiming to bolster their cybersecurity in an period marked by complicated digital threats and distributed work environments.

As you embark on the journey to safe your digital perimeters, contemplate not simply the technical capabilities of evaluated SSE options but in addition the seller’s popularity, the answer’s integration ease, and the general worth it brings to your group. The best SSE answer is greater than only a safety instrument — it’s an funding within the resilience and sustainability of your online business operations in an interconnected digital world.



Second SolarWinds Important Bug in Net Assist Desk


For the second week in a row, SolarWinds has launched a patch for a vital vulnerability in its IT assist and ticketing software program, Net Assist Desk (WHD).

In accordance with its newest hotfix discover, the difficulty — tracked as CVE-2024-28987 — issues hardcoded credentials that would enable a distant, unauthenticated attacker to interrupt into WHD and modify knowledge.

“Safety is difficult and a steady course of,” says Horizon3.ai vulnerability researcher Zach Hanley, who first found and reported the bug. “This utility had simply obtained a safety look from being exploited within the wild, and some years [before] had a distinct hardcoded credential vulnerability. Common safety evaluations on the identical utility can nonetheless be priceless for corporations.”

Two Important Bugs & Two Pressing Fixes

On Aug. 13, SolarWinds launched a hotfix for CVE-2024-28986, a Java deserialization problem that would have allowed an attacker to run instructions on a focused machine. It was given a “vital” 9.8 out of 10 rating on the CVSS scale.

Following what the corporate described as “thorough testing,” it was unable to show that the difficulty may very well be exploited by an unauthenticated attacker. However simply two days after information of it broke, CISA added CVE-2024-28986 to its catalog of identified exploited vulnerabilities, indicating that energetic exploitation by menace actors was already underway.

This week, the corporate adopted up this preliminary dangerous information with extra of the identical, this time regarding a second vulnerability in the identical program. On this case, there was no ambiguity that an unauthenticated attacker might leverage hardcoded credentials in WHD to entry inside functionalities and knowledge, which works some option to justifying its “vital” 9.1 CVSS rating.

Opposite to different reporting, CVE-2024-28987 was not first launched within the patch for CVE-2024-28986. “This problem has existed for a while within the product, probably for a number of years,” Hanley stories. SolarWinds declined to supply Darkish Studying with additional remark.

SolarWinds’ latest patch incorporates fixes for each points. Clients are suggested to replace instantly.

To hammer the purpose dwelling, Hanley says, “Think about if an attacker had entry to all of the particulars in assist desk tickets — what delicate data might they have the ability to extract? Credentials, enterprise operations particulars, and so forth.”