securitylinkindia

The Future of Drones and How They can Transform the Defense and Homeland Security Sector in India

Rohit Dey, Architect – Drone Solutions, Mistral Solutions Pvt. Ltd. Drones, also known as Unmanned Aerial Vehicles (UAVs), Miniature Pilotless Aircrafts, or Flying Mini Robots, are fast gaining popularity and have become the weapon of choice in modern warfare, used by both state and non-state organisations. Drones are becoming increasingly indispensable, considering their high level of efficacy, low cost, and low visibility. Drones are still in their infancy in terms of mainstream adoption and usage, but they have already broken-down traditional boundaries in industries that were previously thought impenetrable by similar technical advancements. Drones have become crucial to the functioning of numerous enterprises and governmental organisations over the last few years, piercing through sectors where specific industries such as industrial, defense, oil and gas, search and rescue etc., were either stagnant or lagging behind. Drones have been around for more than couple of decades, however, their origin can be traced back to World War I, when the United States and France collaborated to develop autonomous, unmanned warplanes. Drone technology has evolved and thrived in recent years, from technically staffing critical military regions to enticing enthusiasts all over the world. The last decade has been noteworthy in terms of drone acceptance, industry utilisation, development, and worldwide awareness. Types of Drones and Their Applications Typically, Drones are categorised into three major platforms – Fixed wing, Rotary wing, Hybrid VTOLs (Combination of fixed and rotary wing Vertical Take-off Landing). Further, they are also classified based on their Size (nano, micro, small, medium & large), weight, flying characteristics, type of energy source etc. Fixed wing UAV platforms, which are already operational in leading defense forces worldwide, are used for long range missions due to their characteristics like high speed, fuel consumption, flying altitude, and far greater payload capabilities. Fixed wing UAVs require moderate to larger space to take-off and land as they are launched either by hand, catapults or airstrips depending on the wingspan of the aircraft. Rotary wing UAVs, commonly known as Helicopter or Rotorcrafts, can be classified in to sub categories such as Single rotor (similar to conventional helicopters with main rotor and tail rotor), Multirotor (more than one rotor – bi, tri, quad, hexa, octa etc.) & hybrid platforms. Rotor UAVs, due to their unique ability to take off & land vertically from very limited and compact space, is finding increased applications in homeland security and military applications. The ability of these drones to hover for long duration make them ideal for search and rescue operations, small-cargo delivery, ISR, and border surveys, among others. VTOL is a very unique platform with massive capabilities and extensive operationality for Defense applications. This platform can take off and land like helicopters, hover and also fly around in Heli-mode, and can also be switched to fixed wing and fly like an airplane with speeds higher than helicopters. Drones have proved to be incredibly advantageous in locations where humans cannot access or function in a fast and effective manner, be it making rapid deliveries during rush hour or rushing supplies to an unreachable military post. Increased efficiency and productivity, reduced workload and production costs, enhanced accuracy and minimal security challenges are just a few of the many benefits drones provide organisations throughout the world. Drone technology adoption across sectors jumped from the fad stage to the standard operational stage very fast, as more and more firms realised their potential, scope, and applications. Drones, whether operated by a remote or a smartphone app, have the capacity to reach the most remote regions with the least amount of effort, time, and energy. This is one of the primary reasons that they are being accepted globally, particularly by sectors like: military, commercial, personal, cinema, agriculture, police, government, AI based applications. Some of the Drone applications include: Long distance ISR. Law enforcement and border surveillance. Self-destructing target systems. Short range armed drones for combat. Swarm operations for both military and entertainment applications. Network connectivity system. Emergency/ disaster management. Search and rescue operations. Rapid fire fighting aerial system. Express shipping and delivery. Perimeter surveillance and safety inspections. Geographic survey and mapping of inaccessible terrain and locations. Precision crop monitoring. Storm tracking and forecasting hurricanes and tornadoes. Drones in Defence Ecosystem Today, Drones have become an integral element of armed forces across the world, serving as target decoys, combat operations, research and development among others. Military spending, according to recent projections, will continue to be the primary growth driver for drones in the coming years. According to these projections, worldwide military spending on drones is expected to cross $70+ billion in 2022, and these drones will play a critical role in resolving future wars replacing human pilots. Military funds also tend to come in bigger amounts, with a single US Predator drone costing around $4 million, and overall programme spending estimated at nearly $2.4 billion. Defense forces have been using fixed wing UAVs for a few decades to conduct unmanned aerial surveillance and launch strikes in addition to using them as electronic decoys and Radar jammers. Fixed wing UAVs have their own advantages, however, rotary wing UAVs, due to the unique capabilities are considered the future of warfare. Lately, defense forces have been considering rugged special purpose tactical drones for military research, intelligence gathering at borders and to carry out combat missions beyond enemy lines. The Indian army, in the recent past, has taken various initiatives to strengthen the high-altitude border areas using drones of various capacities and capabilities. The Army is considering the induction of a wide range of Drones with varying capabilities for applications such as high-altitude heavy payload delivery, continuous border surveillance, combat and cross-border ISR among others. Heavy Payload Drones The northern and eastern borders of our country is extremely hostile and harsh with altitude ranging from 5000 to 20000 Ft, heavy snow fall during winter, presence of glaciers and treacherous mountain ranges. The most critical challenge which the Indian Army faces at these heights is the transportation of essential goods like fuel, food, medical kits &…

Read More

CEOs of the Future

HARSH WARDHAN, CEO of CSC-INDIA (American MNC) Evolution promises growth and transformation. This fast-growing contemporary world demands timely conditioning, we need to bring out the best version of ourselves regardless of age or gender. Corporate management is one sector that challenges you, the benefits of which can be reaped if one can overcome a challenge. We need more critical thinkers and problem solvers to mentor corporations to reach the pinnacle of success. Positive reformation in the corporate world requires a shift in the mindset; from profit to purpose, from controlling to empowering employees, from hierarchies to networks, from planning to experimentation, from privacy to transparency. These are some of the fundamentals of the CEOs of today.    If strategy-building was the only objective of all CEOs, then all the unicorn companies may have only remained limited to just four walls instead of gaining global recognition. For that, execution is mandatory. Many are the CEOs of today, but very few become the CEOs of tomorrow. CEOs of tomorrow will learn from their fractured policies, level up from good to great by having the ability to take risks and cultivating a unique futuristic vision.   Corporate Management is aided with manpower optimization and technological advancement. Without technology, efficient management and customer behavior analysis get blurred rather invisible. The scope of growth mellows down without having the tech-savvy expertise. CEOs need to incorporate necessary changes. In today’s world, we hire employees based on not just experience, but also passion, soft skills, proactive approach, creative thinking to fill the loopholes in the existing corporate culture. Either you can follow rules, or you can modify existing rules. In the next 10 years, this will change drastically.    When people hear the word CEO, they tend to visualize a probe of entrepreneurial greatness. A Harvard study revealed that CEOs may not necessarily share the stereotypical qualities that are usually associated with their role; instead, the chances of sharing the traditional qualities such as prioritization skills, listening, and innovative thinking with cross-functional fellow leaders.   Some of the basic qualities entrepreneurs commonly seek in their business partners are risk-taking abilities, the scope of adaptability, walking head-to-head with the latest trends. Liaising with your colleagues and business partners, bureaucrats, requires good communication skills, and a CEO should be qualitative in that.  According to McKinsey, CEOs tend to show a greater sense of passion and purpose for what they do, than other members of company leadership. Cameron Herold, a leader in C-suite leadership and business growth said the smartest CEOs are open to hearing new perspectives, are vulnerable, and are always a learner. Only the leaders, in this context CEOs who are open to learning, are capable of growth. When it comes to communication, Navalent study claims that top executives share the ability to remain consistent in their forms of communication. The approach of a remarkable CEO remains neutral with all parties. They create opportunities based on realistic optimism. A clever move can change the dynamics and position of a company. Above all, CEOs of tomorrow should have the desire and ability to lead a company towards competitive success which is often derived from ethical commitment over financial gain. The psyche of a CEO dictates the vision of a company. Assigning tasks efficiently and assertively comes naturally as a by-product. Although a CEO is fuelling the organization, without a smart team of employees, he/ she cannot start the engine alone. Future CEOs will encourage more brainstorming sessions, would be emotionally intelligent and resilient. The proficiency to turn unanticipated situations into positive results is the key objective of a coherent CEO. Catching up to the Corporate Speed  A decade later, speed will be the major factor by which growth will be computed. By speed of communication, travel time, expansion in network ranges, decision-making, artificial intelligence, technology bandwidth etc. Future CEOs need to be technologically aware and knowledgeable at the least. Advanced robotics, last-mile deliveries, logistical advancement, manufacturing of goods, and so much more discoveries are yet to surprise the world. The active competitors may not take long to dominate the market if strategies went loose. Hence, it becomes crucial for the first in line to keep leveling up and remain ahead of the game.    IT-related businesses will be one click away to find out analytical data for any or all purposes, from targeted strategy-making to easy integration of marketing automation workflows. Not many business reviews and performance reviews will be required. For a CEO, building constructive networks would be a common phenomenon to enable mutually benefitted relationships. Reading the capabilities of employees through personality development methodologies based on a CEO’s smart experience will be considered as a nurtured skill. Fostering dispositional evolvement Transparency is a key factor to gain the trust of the executives, further amplifying the accountability of the company’s employees. Overall, it assembles a common vision within the organization for efficient results. The uprising CEOs will be multifunctional, intelligent enough to bounce back from failures and push forward towards exponential growth. CEO’s demeanour complimented with honesty and humble attitude will be appreciated. Work will speak for itself, as the entire generation will become smarter, self-reliant, and most importantly skillful. Internet expansion will be a catalyst to make it possible. A pompous attitude is likely to take a back seat, and humility amongst the management will be in the forefront. Philosophical rationalizations won’t stand any ground without the factual description of thought; further, envisaging the conceptual employability. Start-ups and businesses are going to face a revolutionary change on the global front. B2B, B2C, and D2C, all will be streamlined progressively towards business development. Based on the current patterns of surfacing industries like FINTECH, IT, a distributive blueprint of the future can be drawn. New entrepreneurs of any dialect or pastoral regions from all over India will co-exist without any classification, simultaneous to the entrepreneurs of metropolitan cities. This will stock up the start-up market with potential untapped fields. Knowledge distribution via marketed artificial intelligent means will streamline…

Read More

Highlighting the Limitless Potential of Video Technology

Modernity has transformed life in the 21st century. The limitless potential of emerging technologies like AI, ML, IoT, Big Data, and automation, are revolutionizing every aspect of our lives. Video technology is one area that has significantly benefited from these integrations and has helped secure the lives of millions of individuals. Although initially used as a crime prevention tool, it has evolved in its scope to become a valuable tool to city authorities for better civic management and business leaders for fulfilling goals and the well-being of their employees. With machine learning and deep learning now broadly available in security solutions, artificial intelligence (AI) and analytics are transforming safety, security, and operational efficiency. The symposium was well attended by some notable names from the security industry and was also attended by end users of these products. The event was fundamentally a platform to discuss the critical aspects of integrated security systems to help create secure and smarter infrastructures in the future. Attendees spoke about the return of investment from these systems and how analytical outputs gleaned from them could be used understand the future state of integrated security and surveillance technologies, primarily in India. During his presentation, Sandesh Kaup, Country Manager, Milestone Systems, India said, “I am excited to be a speaker at WeConnect – the Integrated Technology Symposium. Over the years, I have witnessed a huge amount of interest from individuals to understand more about integrated security systems and its myriad possibilities in creating a safer and smarter future. VMS has come a long way since its inception, and its widespread usage is the certification for the same. This trend can now be seen in India too and reflects in the uptick in usage of CCTV cameras embedded with analytics.” “An open VMS solution can be easily integrated with an existing security system to help in streamlining operations benefitting all concerned. Smart video technology’s AIbased analytics are versatile and can help in monitoring and reporting any untoward activity in real-time. It helps bolster the security cover during these challenging times and allows operators to scan hours of video recordings and pinpoint the anomaly within minutes. This is the security roadmap that commercial and public establishments will seek once operations resume in the next normal. As most enterprises adopt the culmination of various technologies solutions like cloud, on-prem servers, and edge technologies, the architecture of technological infrastructure, internal resources and external forces like regulations need to be considered. “Milestone Systems offers an open platform VMS that integrates seamlessly with a wide array of innovative technologies such as AI, data analytics, sound detection, and behavioural analytics. As a security solution vendor, Milestone Systems helps equip organizations with tools and flexibility to choose the best solutions suited for their existing infrastructure,” Kaup said.  

Read More

Matrix Introduces New Senior Vice President – Global Sales and Marketing: Anil Mehra

Matrix Comsec is pleased to announce the appointment of Anil Mehra as the Sr. Vice President of Global Sales and Marketing. As part of the executive leadership and reporting to the Chief Executive Officer, he will be responsible for all activities related to the marketing and sales functions. His extensive experience will be an integral asset to Matrix’s go-to-market strategy for the Security and Communication segment. “With more than 2.5 decades of experience in general management, sales, product marketing, and distribution. Anil will bring leadership, knowledge and proven knowhow to our transformation plan,” said the CEO Matrix, Ganesh Jivani. He added, “Moreover, having worked with diverse industries like Fire, Security, Fitness and Electricals and has been an entrepreneur for a few years will enhance the growth of the company. “I am delighted to be joining Matrix as Senior VP – Global Sales and Marketing. I am looking forward to the opportunity to deliver profitable growth for the software and hardware solutions offered as part of the Security and Communication portfolio. I have a firm belief that sustainable businesses are laid on the foundations of trust and strong partnerships. I am excited to work closely with the team, and do everything possible for the success of our partners and customers,” said Anil Mehra. Prior to that Anil worked for about 10 years at Honeywell, his last assignment was as Country Director for ADI business where he led a large multifunctional team and was accountable for full P&L. Anil played a significant role in turning the business profitable while delivering exponential growth across all the product categories and multiple brands associated with ADI Global Distribution. Before that Anil worked at Ceasefire where he held multiple sales roles. He established the Corporate Sales Division and a Training Academy that trained people on ‘Selling Skills’ and ‘Leadership Development.’ He has well-rounded exposure to various business models including SaaS, and RTMs like B2B, B2G, B2C, D2C and B2B E-commerce along with significant exposure to almost all the industry/ customer verticals. Anil brings the right mix of leadership experience and skills to take Matrix to the next level.  

Read More

Allied Telesis Appoints Jason Nadar as Country Manager to Grow its India and SAARC Business

Allied Telesis, a global company in connectivity solutions and intelligent networking tools announced that it has appointed Jason Nadar as Country Manager for India and SAARC. This appointment will add to Allied Telesis’ growth strategy in the region with its portfolio of products and technologies providing IoT and SDN solutions for customers in large enterprise, government and critical infrastructure. Known as a leader in video networking Allied Telesis is engaged in the development and production of more intelligent, autonomously controlled and managed systems aimed at meeting the demands of a ‘smart world.’ As a network switching specialist, Allied Telesis provides solutions that are easier to deploy and easier to use which is a compelling value statement driving customer adoption. Jakub Duch, VP DevOps and Marketing Europe overseeing India operations said, “Allied Telesis has the products, skills, and resources to offer end-to-end networking solutions across multiple industries. Jason Nadar brings a wealth of experience and skills to work in large projects along with the knowledge of how to integrate all the pieces for a successful customer outcome. The Allied Telesis team is knowledgeable, engaging, and consistently enhances the value we can deliver when tackling a customer’s complex needs. Combine that with robust leadership and we have engineered a long-term vision to create lasting wins in this market.” “Allied Telesis is involved in some of the most advanced and innovative next-generation research serving the needs of the network communications industry for over 30 years. In a post-pandemic era, the need of the hour is for networks to be defined by software that configures, secures, manages, and automates the infrastructure and Allied Telesis is uniquely positioned to fulfil that need. I look forward to leveraging my experience to lead the company in expanding our footprint with partners, enterprises and SMEs to increase the adoption of our cutting-edge solutions” Jason Nadar Country Manager, India and SAARC Business, Allied Telesis A 28-year industry veteran, Jason Nadar is a strong sales and pre-sales professional with a demonstrated history of delivering rapid growth with skills in networking, security, wireless technologies, VoIP and NOC-SOC (EDR, SIEM, SOAR). With an MBA focused in Leadership Management from National Institute of Business Management he has held various senior positions at Aruba Networks, 3Com, Ingram Micro and Bluecoat. In his previous role as National Sales Manager at Fortinet, he was instrumental in growing their Secure Access & New Technologies business in India and SAARC region. “Allied Telesis is involved in some of the most advanced and innovative next-generation research serving the needs of the network communications industry for over 30 years. In a post-pandemic era, the need of the hour is for networks to be defined by software that configures, secures, manages, and automates the infrastructure and Allied Telesis is uniquely positioned to fulfil that need. I look forward to leveraging my experience to lead the company in expanding our footprint with partners, enterprises and SMEs to increase the adoption of our cutting-edge solutions.” said Jason Nadar. With a portfolio of products and technologies providing IoT and SDN-enabled solutions for enterprise, government, education and critical infrastructure customers, Allied Telesis is the smarter choice. Its Envigilant™ managed services division delivers customized, state-of-the-art IoT solutions at the edge, empowering innovation, improving process agility and helping build a competitive advantage for customers globally. They are committed to providing their customers with solutions designed and built to the highest standards and quality. Their manufacturing conforms to ISO 9001 standards and all of their facilities adhere to the strict ISO 14001 standard to ensure a healthier planet.  

Read More

IPSA Appoints a Welfare and EDI Director

The front-line security workers most often lack support and the freedom to truly express themselves within the workspace. With the appointment of Satia Rai as the Welfare and Equality, Diversity and Inclusion (EDI) Director, the International Professional Security Association (IPSA) is working on making the sector a place where each and every front-line worker could be their true selves. Satia, who started her own career at the front-line as a retail security officer, has progressed into directorship roles at leading organisations and has a strong track record leading transformational change within the security sector. Along with 25+ years of experience at operational and strategic levels, Satia brings her vision of creating a culture within the industry where every person can thrive and experience a sense of belongingness. She is the co-chair of the security sector’s first LGBTQ+ group and a supporter of various initiatives that help her promote diversity and inclusivity within the industry. “Prior to Satia’s appointment we talked extensively about the culture, ethos and welfare of the IPSA front-line members and their welfare needs. It was important that we had a non-political caring person who would be there for everyone. I feel that Satia is the right person for IPSA, and the wellbeing of IPSA members. We are very proud to have her on the Board representing the EDI and welfare needs of all our members,” said Una Riley, Chief Executive Officer, IPSA. “The community we protect and help secure is diverse,” said Satia, It is important we reflect this diversity within our security workforce to be able to best serve the people within the community. With the appointment of Satia as the EDI Director, IPSA aims to ensure that its vision of giving ‘One Voice’ to the front-line security workers embraces people from every culture, gender, age and background. The Association will soon be launching the IPSA Alliance SIG, conceptualised with and led by Satia. IPSA will inform, inspire change and empower people to be themselves. IPSA is the largest security trade association in the UK with a membership of 3500+ front-line security workers. Incorporation of the Welfare and EDI directorship will help IPSA provide better support to its rapidly growing membership. Commenting on her appointment, Satia said, “It’s an honour and privilege to be joining the longest established security association in the UK. I recognise that there is still a way to go to becoming an inclusive sector. I will lead from the front when it comes to this agenda, as I know that getting it right is critical. We have made good progress in creating a diverse and inclusive security sector but we are not yet representative of the communities which we serve. We also have work to do to nurture a culture of inclusion where we can all be ourselves. Working together as a sector, we are more likely to create success and fulfilment for all of us and, together, do our best work. This strategy strives towards better representing the people and communities we serve and creating a more inclusive working environment. IPSA will lead and set ambitious goals, measure progress and shape the future of the security sector. The new IPSA Alliance SIG will innovate, inspire and engage and lead the way.”  

Read More

FortiGuard Labs Reports Ransomware Not Slowing; Continues to be Relentless and More Destructive

Fortinet®, a global player in broad, integrated, and automated cybersecurity solutions, recently announced the latest semiannual FortiGuard Labs Global Threat Landscape Report. Threat intelligence from the second half of 2021 reveals an increase in the automation and speed of attacks demonstrating more advanced persistent cybercrime strategies that are more destructive and unpredictable. In addition, the expanding attack surface of hybrid workers and hybrid IT is a focal point that cyber adversaries are attempting to exploit. For a detailed view of the report, as well as some important takeaways, read the blog. Highlights of the 2H 2021 report follow: Log4j demonstrates dramatic speed of exploit organizations face: The Log4j vulnerabilities that occurred in late 2021 demonstrate the rapidly increasing speed of exploit that cybercriminals are attempting to leverage to their advantage. Despite emerging in the second week of December, exploitation activity escalated quickly enough, in less than a month, to make it the most prevalent IPS detection of the entire second half of 2021. In addition, Log4j had nearly 50x the activity volume in comparison to the well-known outbreak, ProxyLogon, that happened earlier in 2021. The reality is that organizations have very little time to react or patch today given the speeds that cyber adversaries are employing to maximize fresh opportunities. Organizations need AI and ML-powered intrusion prevention systems (IPS), aggressive patch management strategies, and the threat intelligence visibility to prioritize those threats propagating most quickly in the wild to reduce overall risk. Adversaries rapidly targeting new vectors across the attack surface: Some lesser or low-lying threats have the potential to cause bigger problems in the future and are worthy of watching. An example is newly crafted malware designed to exploit Linux systems, often in the form of executable and linkable format (ELF) binaries. Linux runs the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications, and it is becoming a more popular target for attackers. In fact, the rate of new Linux malware signatures in Q4 quadrupled that of Q1 2021 with ELF variant Muhstik, RedXOR malware, and even Log4j being examples of threats targeting Linux. The prevalence of ELF and other Linux malware detections doubled during 2021. This growth in variants and volume suggests that Linux malware is increasingly part of adversaries’ arsenal. Linux needs to be secured, monitored and managed as any other endpoint in the network with advanced and automated endpoint protection, detection and response. In addition, security hygiene should be prioritized to provide active threat protection for systems that may be affected by low-lying threats. Botnet trends show a more sophisticated evolution of attack methods: Threat trends demonstrate that botnets are evolving to adopt newer and more evolved cybercriminal attack techniques. Instead of being primarily monolithic and focused mostly on DDoS attacks, botnets are now multipurpose attack vehicles leveraging a variety of more sophisticated attack techniques, including ransomware. For example, threat actors, including operators of botnets like Mirai, integrated exploits for the Log4j vulnerability into their attack kits. Also, botnet activity was tracked associated with a new variant of the RedXOR malware, which targets Linux systems for data exfiltration. Detections of botnets delivering a variant of RedLine Stealer malware also surged in early October morphing to find new targets using a COVID-themed file. To protect networks and applications, organizations must implement zero trust access solutions to provide least access privileges especially to secure IoT endpoints and devices entering the network as well as automated detection and response capabilities to monitor anomalous behavior. “Cybersecurity is a fast-moving and dynamic industry, but recent threat events show unparalleled speeds at which cyber adversaries are developing and executing attacks today. New and evolving attack techniques span the entire kill chain but especially in the weaponization phase, showing an evolution to a more advanced persistent cybercrime strategy that is more destructive and unpredictable. To protect against this broad scope of threats, organizations need to implement AIpowered prevention, detection, and response strategies based on a cybersecurity mesh architecture allowing for much tighter integration, increased automation, as well as a more rapid, coordinated, and effective response to threats across the extended network” Michael Joseph Director System Engineering, India & SAARC, Fortinet Malware trends show cybercriminals maximizing ‘remote everything:’ Evaluating the prevalence of malware variants by region reveals a sustained interest by cyber adversaries in maximizing the remote work and learning attack vector. In particular, various forms of browser-based malware were prevalent. This often takes the form of phishing lures or scripts that inject code or redirect users to malicious sites. Specific detections vary across global regions, but can be largely grouped into leveraging three broad distribution mechanisms: Microsoft Office executables (MSExcel/ MSOffice), PDF files, and browser scripts (HTML/ JS). Such techniques continue to be a popular way for cybercriminals to exploit people’s desire for the latest news about the pandemic, politics, sports, or other headlines, and to then find entryways back to corporate networks. With hybrid work and learning remaining a reality, there are fewer layers of protection between malware and would-be victims. Organizations must take a ‘work-from-anywhere’ approach to their security by deploying solutions capable of following, enabling, and protecting users no matter where they are located. They need advanced security on the endpoint (EDR) combined with zero trust access solutions, including ZTNA. Secure SD-WAN is also critical to ensure secure WAN connectivity for the extended network. Ransomware activity still high and continues to get more destructive: FortiGuard Labs data reveals that ransomware has not subsided from peak levels over the last year and instead, the sophistication, aggressiveness, and impact of ransomware is increasing. Threat actors continue to attack organizations with a variety of new as well as previously seen ransomware strains, often leaving a trail of destruction. Old ransomware is being actively updated and enhanced, sometimes with wiper malware included, while other ransomware is evolving to adopt Ransomware-as-as-Service (RaaS) business models. RaaS enables more threat actors to leverage and distribute the malware without having to create the ransomware themselves. FortiGuard Labs observed a consistent level…

Read More

Hikvision AX-HUB Wireless Intrusion Alarm Panel

Hikvision’s AX-HUB is an innovative product in intruder alarm systems segment, which ensures complete security for your home, retail outlets, warehouses, commercial offices and many more. It can be integrated to centralized surveillance and remote monitoring solutions as well. These devices are designed for catering residential and small commercial applications, the AX-HUB connects security peripherals such as motion detectors, magnetic contacts, and displacement sensors, alongside safety devices like smoke and gas sensors to keep people and your premises safe. Hikvision cameras and the AX-HUB alarm systems work seamlessly together to provide a recorded video clip or live HD video footage, directly through Hik-Connect, iVMS or instantly to monitoring stations. This allows active decisions to be made faster and more reliably in the event of an activation. Simple to install and use, the AX-HUB provides voice prompts locally to assist during installation, as well as alert the end user to any events. The AX-HUB is also compatible with the smart device App, in addition to a wide range of communication pathways and multiport IP communications via either the Cloud or CMS for added peace of mind. AX-HUB can be integrated with Wireless Smoke Detectors to provide sophisticated and cost effective fire protection solution. This Cloud connectivity allows full control of the system from anywhere via Hik-Connect, to easily and remotely arm, disarm and monitor the system. The Cloud also enables the use of revolutionary IVaaS (Intruder Verification as a Service), which allows end users and monitoring stations to quickly and efficiently confirm system events through HD video verification. Ax-Hub Intrusion Alarm Kit Ds-Pwa32-Kg USP’s of AX-HUB: Wireless Intrusion Panel with CCTV integration + Mobile App. Voice guiding for ease of operations. Ease of programming Via Web/ App. Two-way wireless communication. 32 wireless inputs, 8 keyfobs, 2 wireless sirens. In-built GPRS + SMS + voice dialing facility. Inbuilt LAN and Wi-Fi modules. Supports 2 nos. of Hikvision IP cameras for video verification. Supports viewing events video via mobile App. Transmission distance 800m in open area. 128-bit data encryption. In-built battery back-up upto 12Hrs. Mobile App. 3rd party CMS software compatibility. Solution AX-HUB DS-PWA32-KG package provides built-in of IoT modules AX-HUB with in-built GPRS module, Wi-Fi & LAN modules. Wireless pet immune motion sensor. Wireless magnetic contact. Key fob – a small security device with built-in authentication used to control and secure access to network services and data. HikConnect mobile App + SMS + Auto dialing voice call. Supports web browser for integrating Hikvision IP cameras with AX-HUB. IP cameras to be purchased separately. AX-HUB: Benefits WEB configuration The AX-HUB has a built-in web server which enables the device to be configured through a web browser over the local IP network. This offers more flexibility and time saving on site, as setup can be done quickly and efficiently using a laptop or compatible smart device. Easy setup and installation Setting up the system could not be simpler, with an intuitive and easy to use interface. Connect to the panel directly via our web-browser or with iVMS on a laptop for on-site setup or, alternatively, program the system using the Hik-Connect App. Learning devices and sensors onto the system is also easy using the one-push-to-learn feature on all Hikvision wireless intrusion devices, to save time and money. Multiple communication paths The variety of communication pathways available with the AX-HUB is unmatched. It offers LAN, Wi-Fi & GPRS connections with on-board communication modules and connectors for a simpler and more cost-effective installation. With multiport IP communications, the AX-HUB can also communicate simultaneously with multiple devices, to ensure alarm messages are sent to all that need them. The AX-HUB can also notify up to 6 phone numbers in the event of an alarm through voice calls, offering greater flexibility in the way that end users are notified about events on the system. ARC linkage If ARC connectivity is required, the AX-HUB can communicate alarms and other messages in Contact ID format for a rapid and efficient response. Two-way wireless devices With the AX-HUB, you can add up to 32 two-way wireless devices. This provides a system which is secure and flexible; allowing even larger premises to be secured with a wide range of indoor and outdoor Hikvision peripherals. Hik-Connect The end-user App, Hik-Connect, brings together an intrusion alarm and video functions like never before. Linking detectors and sensors to cameras for video verification, as well as providing the end user with the ability to monitor the system from anywhere in the world; remotely checking system status, receiving alerts, arming, disarming, HD video monitoring and more, to remain informed and in complete control at all times. IVaaS (Intruder Verification as a Service) This revolutionary service provides video verification (from any Hikvision or ONVIF IP camera on the premises) for users to quickly and efficiently confirm an alarm event on the system. During the configuration of the panel, 2 cameras can be linked to the AX-HUB, which incorporates a rolling video buffer. Where other video verification methods rely on sending low-quality static images to confirm events, IVaaS utilises Cloud technology alongside the buffer to link previously separate video and intruder systems to one platform. This provides a 7 second clip in the event of an alarm; 5 seconds pre-alarm and 2 seconds post-alarm. Hik-Connect advantages Simple arming and disarming with user friendly interface. Quickly view events and video recordings. Easily configure the system from the App. See wireless devices in each partition. View cameras and alarms in one App. Simplifying the experience for the end user, you can view and manage both your camera and alarm systems from one App in one screen. Check the status of wireless devices in each partition quickly and simply whilst being able to make changes to settings, bypass zones and more from inside the App. Set up system options and make changes in programming within Hik-Connect App, it helps to make configuration simple and easy to follow. The simple interface of the Hik-Connect App allows easy arming and disarming of the…

Read More

Teledyne FLIR launches Conservator™ Subscription Software to Accelerate AI Development with Thermal Imaging

Teledyne FLIR recently announced the release of Conservator™, a cloud-based dataset development subscription software for perception engineers using thermal infrared and visible image datasets to train neural networks. Subscribers also gain access to application specific segments of the Teledyne FLIR annotated image library of more than one million images with more than 100 object label categories. Designed to meet the workflow demands of data scientists in automotive, defense, security, and smart cities applications, Conservator scales to support enterprise artificial intelligence (AI) teams in the research and development of object detection models. “Conservator is a powerful application for data scientists developing datasets with a full complement of workflow functions including annotation, version control, data right access and model performance,” said Arthur Stout, Director of AI Product Management at Teledyne FLIR Infrared Imaging OEM, “AI starts with quality data and this application supports collaboration to advance multi-sensor neural network development in commercial and defense AI applications.” Conservator includes dataset workflow tools for annotation, curation, quality assurance, and dataset version control. Built on a scalable and stable database, Conservator can manage petabyte scale libraries. In addition, the included Conservator Insights™ desktop tool provides analysis and visualization of model performance against ground truth references. This empowers data scientists to quickly pinpoint the specific images in large datasets causing false positives or missed detections, enabling rapid dataset iteration and neural network re-training. Conservator follows the recent release of the Teledyne FLIR expanded free starter thermal dataset for Advanced Driver Assistance Systems (ADAS) and self-driving vehicle researchers and developers. With both thermal and visible annotated images across fifteen object categories, the free starter thermal dataset allows the automotive and academic community to quickly evaluate the vehicle safety algorithm performance, neural network testing, and thermal sensors, such as the FLIR ADK™.  

Read More

COVID Omicron Lure used to Distribute RedLine Stealer Malware Variant

The Omicron variant has a much higher transmission rate, and as a result, daily counts of new Omicron patients have become a global concern. This has again renewed heightened concern about the pandemic, and cyber threat actors don’t shy away from using the situation to their advantage. FortiGuard Labs recently came across a curiously named file, ‘Omicron Stats.exe,’ which turned out to be a variant of Redline Stealer malware. The first reports of RedLine Stealer go back to March 2020 and it quickly became one of the most popular infostealers sold in underground markets. The information harvested by RedLine Stealer is sold on the dark net marketplace for as low as 10 US dollars per set of user credentials. The malware emerged just as the world began to deal with increased numbers of COVID patients and the growing fear and uncertainty that can cause people to lower their guard, which may have prompted its developers to use COVID as its lure. Normally, victims whose systems have been infected with this stealer unknowingly have their account passwords and full browser details recorded, and then sent to marketplace operators. Generally, in such cases, each compromised user profile includes login credentials for accounts on online payment portals, e-banking services, file-sharing or social networking platforms. The file name of this current variant, ‘Omicron Stats.exe,’ was used just as the Omicron variant was becoming a global concern, following the pattern of its previous variants. FortiGuard Labs has concluded that email is the infection vector for this variant as this malware is embedded in a document designed to be opened by the victim. Based on the information collected potential victims are spread across 12 countries. The information that it steals can be used for malicious actions by the same cybercriminal or sold to another threat actor for future activities. Advised Rajesh Maurya, Regional Vice President, India & SAARC at Fortinet, “Stay outside of the red zone by exercising basic security practices. Look at the sender’s email address before clicking on emailed links or downloading attachments, even if they appear to come from a trusted source. In most cases, phishing emails are sent from addresses that do not contain the supposed sender’s organization’s legitimate web address. Educate employees, family members, and friends about what to avoid and keep devices updated with the latest security software.”  

Read More