Home Blog Page 3826

‘Brainless’ robotic can navigate complicated obstacles

0


By Matt Shipman

Researchers who created a mushy robotic that might navigate easy mazes with out human or laptop route have now constructed on that work, making a “brainless” mushy robotic that may navigate extra complicated and dynamic environments.

“In our earlier work, we demonstrated that our mushy robotic was capable of twist and switch its manner via a quite simple impediment course,” says Jie Yin, co-corresponding writer of a paper on the work and an affiliate professor of mechanical and aerospace engineering at North Carolina State College. “Nevertheless, it was unable to show except it encountered an impediment. In sensible phrases this meant that the robotic may generally get caught, bouncing backwards and forwards between parallel obstacles.

“We’ve developed a brand new mushy robotic that’s able to turning by itself, permitting it to make its manner via twisty mazes, even negotiating its manner round transferring obstacles. And it’s all executed utilizing bodily intelligence, quite than being guided by a pc.”

Bodily intelligence refers to dynamic objects – like mushy robots – whose habits is ruled by their structural design and the supplies they’re manufactured from, quite than being directed by a pc or human intervention.

As with the sooner model, the brand new mushy robots are manufactured from ribbon-like liquid crystal elastomers. When the robots are positioned on a floor that’s no less than 55 levels Celsius (131 levels Fahrenheit), which is hotter than the ambient air, the portion of the ribbon touching the floor contracts, whereas the portion of the ribbon uncovered to the air doesn’t. This induces a rolling movement; the hotter the floor, the quicker the robotic rolls.

Nevertheless, whereas the earlier model of the mushy robotic had a symmetrical design, the brand new robotic has two distinct halves. One half of the robotic is formed like a twisted ribbon that extends in a straight line, whereas the opposite half is formed like a extra tightly twisted ribbon that additionally twists round itself like a spiral staircase.

This asymmetrical design implies that one finish of the robotic exerts extra power on the bottom than the opposite finish. Consider a plastic cup that has a mouth wider than its base. In case you roll it throughout the desk, it doesn’t roll in a straight line – it makes an arc because it travels throughout the desk. That’s as a consequence of its asymmetrical form.

“The idea behind our new robotic is pretty easy: due to its asymmetrical design, it turns with out having to come back into contact with an object,” says Yao Zhao, first writer of the paper and a postdoctoral researcher at NC State. “So, whereas it nonetheless adjustments instructions when it does come into contact with an object – permitting it to navigate mazes – it can’t get caught between parallel objects. As an alternative, its capacity to maneuver in arcs permits it to basically wiggle its manner free.”

The researchers demonstrated the power of the asymmetrical mushy robotic design to navigate extra complicated mazes – together with mazes with transferring partitions – and match via areas narrower than its physique measurement. The researchers examined the brand new robotic design on each a metallic floor and in sand.

“This work is one other step ahead in serving to us develop modern approaches to mushy robotic design – significantly for purposes the place mushy robots would be capable to harvest warmth power from their surroundings,” Yin says.

The paper, “Bodily Clever Autonomous Delicate Robotic Maze Escaper,” seems within the journal Science Advances. First writer of the paper is Yao Zhao, a postdoctoral researcher at NC State. Hao Su, an affiliate professor of mechanical and aerospace engineering at NC State, is co-corresponding writer. Further co-authors embrace Yaoye Hong, a current Ph.D. graduate of NC State; Yanbin Li, a postdoctoral researcher at NC State; and Fangjie Qi and Haitao Qing, each Ph.D. college students at NC State.

The work was executed with assist from the Nationwide Science Basis below grants 2005374, 2126072, 1944655 and 2026622.


NC Sate College

A Name to Motion for Securing ICS/OT Environments

0


Aug 30, 2024The Hacker InformationICS Safety / OT Safety

A Name to Motion for Securing ICS/OT Environments

A complete information authored by Dean Parsons emphasizes the rising want for specialised ICS safety measures within the face of rising cyber threats.

With a staggering 50% improve in ransomware assaults focusing on industrial management programs (ICS) in 2023, the SANS Institute is taking decisive motion by saying the discharge of its important new technique information, “ICS Is the Enterprise: Why Securing ICS/OT Environments Is Enterprise-Important in 2024.” Authored by Dean Parsons, CEO of ICS Protection Power and a SANS Licensed Teacher, this information provides a complete evaluation of the quickly evolving menace panorama and offers important steps that organizations should take to safeguard their operations and guarantee public security. As cyber threats develop in each frequency and class, this information is an indispensable useful resource for securing the very important programs that underpin our world.

Key Insights from the Technique Information:

  1. The Rising Risk Panorama: The information particulars the alarming rise in cyber-attacks towards ICS/OT environments, with a portion being focusing on important infrastructure sectors. “The fact is that these assaults are not a query of if, however when,” says Parsons. “Organizations within the ICS area should acknowledge that their ICS is the enterprise.”
  2. Excessive-Affect, Low-Frequency Assaults: The information highlights the hazards of high-impact, low-frequency (HILF) assaults that may probably trigger catastrophic penalties, equivalent to widespread energy outages and environmental disasters. “These are the assaults that hold safety CSOs, VP of Engineering and others chargeable for ICS cyber protection, security, and danger administration, up at evening,” Parsons notes. “A coordinated focused management system assault could have cascading results throughout industries, areas, or nations.”
  3. 5 ICS Cybersecurity Important Controls: Parsons outlines the SANS 5 important controls mandatory for defending ICS/OT environments, together with ICS-specific incident response and defensible management system community structure. These controls aren’t simply technical suggestions but additionally enterprise imperatives supporting operational continuity and security.
  4. AI as an Augmentation Instrument: The information additionally discusses the position of synthetic intelligence (AI) in enhancing ICS safety whereas cautioning towards over-reliance on AI on the expense of human experience. “AI generally is a highly effective device, but it surely can not substitute the specialised data and decision-making capabilities of skilled ICS/OT

“We can not afford to be complacent,” Parsons warns. “This information is a must-read for anybody chargeable for defending important infrastructure – CSOs, VP Engineering, engineering security, and danger mangers. The steps outlined listed below are important for guaranteeing that our industrial programs proceed to function safely and reliably.”

SANS Institute encourages all organizations with ICS/OT environments to obtain the technique information and start implementing the advisable safety controls. Defending our important infrastructure is not only a technical problem however a business-critical crucial that requires rapid motion.

To obtain the complete technique information, go to https://www.sans.org/mlp/ics-business-guide-2024/.

Considering diving deeper into the world of Industrial Management Methods (ICS) Safety? Try the programs working at SANS Cyber Protection Initiative 2024.

Discovered this text attention-grabbing? This text is a contributed piece from one in all our valued companions. Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



Broadcom is working to combine optical connectivity instantly into GPUs

0


Ahead-looking: We’re approaching some extent the place conventional copper interconnections will not be capable to carry sufficient knowledge to maintain GPUs and different specialised chips absolutely utilized. The AI market is urgently demanding a next-generation resolution to this interconnection bottleneck, and Broadcom seems to be engaged on an optics-based resolution that’s nearer to the chip itself.

Broadcom is creating new silicon photonics know-how aimed toward considerably rising the bandwidth out there to GPUs and different AI accelerators. By using co-packaged optics (CPOs), the fabless chip producer goals to combine optical connectivity elements instantly into GPUs, enabling greater knowledge charges whereas concurrently decreasing energy necessities.

The corporate has been engaged on CPO options for a number of years and showcased its newest developments on the latest Sizzling Chips conference. Broadcom’s “optical engine” reportedly delivers a complete interconnect bandwidth of 1.6 TB/sec, equal to six.4 Tbit/sec or 800 GB/sec in every course.

This new connection can present “error-free” knowledge switch to a single chiplet, reaching efficiency ranges akin to Nvidia’s NVLink and different specialised knowledge middle options. Nevertheless, Broadcom has not but included its optical interconnections right into a market-ready GPU, such because the A100 or MI250X. As a substitute, it used a take a look at chip designed to emulate an actual GPU for demonstration functions.

In keeping with Manish Mehta, Broadcom’s vp of the optical techniques division, copper connections begin to degrade after simply 5 meters. Whereas optical communications have lengthy been seen as the answer to this sign degradation concern, they historically require way more energy than copper-based applied sciences.

For instance, Nvidia estimates that an optics-powered NVL72 system would require a further 20 kilowatts per rack, on high of the 120 kilowatts the system already consumes.

Broadcom has managed to scale back energy consumption with the usage of co-packaged optics, which locations particular person transceivers in direct contact with the GPU. The corporate utilized TSMC’s chip-on-wafer-on-substrate (CoWoS) packaging know-how to bond a pair of high-bandwidth reminiscence stacks to the compute die. The logic and reminiscence elements of the chip sit on a silicon interposer, whereas Broadcom’s optical engine is situated on the substrate.

Mehta defined that CPO know-how may join as much as 512 particular person GPUs throughout eight racks, permitting all the setup to operate as a single system. Compared, Nvidia’s NVL72 can obtain comparable unified computing capabilities with “simply” 72 GPUs, suggesting that Broadcom’s resolution may ultimately supply a aggressive benefit for next-generation AI workloads.

North Korean Hackers Goal Builders with Malicious npm Packages


Aug 30, 2024Ravie LakshmananCryptocurrency / Malware

North Korean Hackers Goal Builders with Malicious npm Packages

Risk actors with ties to North Korea have been noticed publishing a set of malicious packages to the npm registry, indicating “coordinated and relentless” efforts to focus on builders with malware and steal cryptocurrency property.

The newest wave, which was noticed between August 12 and 27, 2024, concerned packages named temp-etherscan-api, ethersscan-api, telegram-con, helmet-validate, and qq-console.

“Behaviors on this marketing campaign lead us to consider that qq-console is attributable to the North Korean marketing campaign generally known as ‘Contagious Interview,'” software program provide chain safety agency Phylum mentioned.

Contagious Interview refers to an ongoing marketing campaign that seeks to compromise software program builders with info stealing malware as a part of a purported job interview course of that entails tricking them into downloading bogus npm packages or faux installers for video conferencing software program comparable to MiroTalk hosted on decoy web sites.

The tip objective of the assaults is to deploy a Python payload named InvisibleFerret that may exfiltrate delicate knowledge from cryptocurrency pockets browser extensions and arrange persistence on the host utilizing legit distant desktop software program comparable to AnyDesk. CrowdStrike is monitoring the exercise below the moniker Well-known Chollima.

Cybersecurity

The newly noticed helmet-validate package deal adopts a brand new method in that it embeds a bit of JavaScript code file referred to as config.js that instantly executes JavaScript hosted on a distant area (“ipcheck[.]cloud”) utilizing the eval() perform.

“Our investigation revealed that ipcheck[.]cloud resolves to the identical IP deal with (167[.]88[.]36[.]13) that mirotalk[.]web resolved to when it was on-line,” Phylum mentioned, highlighting potential hyperlinks between the 2 units of assaults.

The corporate mentioned it additionally noticed one other package deal referred to as sass-notification that was uploaded on August 27, 2024, which shared similarities with beforehand uncovered npm libraries like call-blockflow. These packages have been attributed to a different North Korean risk group referred to as Moonstone Sleet.

“These assaults are characterised through the use of obfuscated JavaScript to write down and execute batch and PowerShell scripts,” it mentioned. “The scripts obtain and decrypt a distant payload, execute it as a DLL, after which try to scrub up all traces of malicious exercise, forsaking a seemingly benign package deal on the sufferer’s machine.”

Well-known Chollima Poses as IT Employees in U.S. Corporations

The disclosure comes as CrowdStrike linked Well-known Chollima (previously BadClone) to insider risk operations that entail infiltrating company environments below the pretext of legit employment.

“Well-known Chollima carried out these operations by acquiring contract or full-time equal employment, utilizing falsified or stolen id paperwork to bypass background checks,” the corporate mentioned. “When making use of for a job, these malicious insiders submitted a résumé sometimes itemizing earlier employment with a distinguished firm in addition to extra lesser-known firms and no employment gaps.”

Cybersecurity

Whereas these assaults are primarily financially motivated, a subset of the incidents are mentioned to have concerned the exfiltration of delicate info. CrowdStrike mentioned it has recognized the risk actors making use of to or actively working at greater than 100 distinctive firms over the previous yr, most of that are positioned within the U.S., Saudi Arabia, France, the Philippines, and Ukraine, amongst others.

Prominently focused sectors embody expertise, fintech, monetary providers, skilled providers, retail, transportation, manufacturing, insurance coverage, pharmaceutical, social media, and media firms.

“After acquiring employee-level entry to sufferer networks, the insiders carried out minimal duties associated to their job position,” the corporate additional mentioned. In some instances, the insiders additionally tried to exfiltrate knowledge utilizing Git, SharePoint, and OneDrive.”

“Moreover, the insiders put in the next RMM instruments: RustDesk, AnyDesk, TinyPilot, VS Code Dev Tunnels, and Google Chrome Distant Desktop. The insiders then leveraged these RMM instruments in tandem with firm community credentials, which allowed quite a few IP addresses to connect with the sufferer’s system.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



layer2 – MTU mismatch state of affairs, two hosts deal with another way ingoing packets greater than native interface MTU. How does MTU actually work?


I’ve been fighting the MTU matter for some time and I nonetheless can’t get the way it actually works. Nearly all of books that I learn and the programs that I attended all appear to deal with this topic in a superficial manner.

I attempted sending pings between a Mac Os host and a Home windows host by simulating completely different mtu situations.
Each hosts are in the identical Lan and are linked to a Wifi router.

Situation A

Mac Os host , mtu 1500

Home windows host, mtu 1300

I despatched a 1500 bytes ip packet with icmp echo request out of the Mac Os interface to the Home windows 1300 mtu interface.
The Home windows machine accepts the packet usually after which sends again the echo reply by fragmenting the ip packet into two elements .

Situation B

Mac Os host , mtu 1300

Home windows host, mtu 1500

This state of affairs is the other of the primary one. Hower once I ship a 1500 bytes ip packet with ping request to the Mac Os host I don’t get any reply ( shouldn’t the Mac Os host have despatched icmp error fragmentation wanted ? ).

This behaviour it’s just a little complicated. Is the mtu involved with ingoing, outgoing or each instructions site visitors ?

How may very well be defined the completely different behaviour of the Mac Os and Home windows hosts ?

A whole lot of books and sources discuss “subsequent hop mtu” when referring to icmp error fragmentation wanted.
This assertion appears applicable if now we have a state of affairs like this :

enter image description here

On this case after we ship a packet greater than 1492 destined to host B the router goes to ship an ICMP error fragmentation wanted ( offered that it hasn’t a firewall that stops that from occurring ).
It’s because the “mtu interface to the subsequent hop” is barely 1492 bytes.

Nevertheless take into account this different state of affairs :

enter image description here

Let’s say I ship a 1500 bytes ip packet with icmp echo request to R1 ( handle 10.0.0.2 ). What’s R1 going to do on this case ? Settle for the packet because the Home windows host did ? Merely drop the packet because the Mac Os host did ? Drop the packet and ship an icmp error fragmentation wanted ?

Is there some mtu wizard who might clarify how issues actually work in relation to mtu and attempt to make some order by explaining and placing collectively the situations I simply confirmed ? What is that this mtu at its core ? Is it a {hardware} limitation ( NIC )? Is it a software program limitation ?

Large thanks to whoever goes to make clear this matter !