Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Cloud Servers. Show all posts

Scaleway Introduces First RISC-V Servers on the Cloud

 

The world's first line of RISC-V servers has been introduced by European cloud operator Scaleway, which claims this is a "firm commitment to technological independence" in a market where companies are increasingly vying for control over semiconductor production.

The University of California, Berkeley developed the free and open instruction set architecture known as RISC-V, which has the potential to completely transform the semiconductor industry. Even though RISC-V is a relatively new design, it is already producing high performance levels, which makes it a competitive substitute for more well-known architectures like ARM and x86. 

Alibaba's T-Head TH1520 SoC, 16GB RAM, and 128GB eMMC storage are included in Scaleway's RISC-V servers. Priced at an affordable €15.99 a month (or €0.042 per hour), these Elastic Metal RV1 servers run on Debian, Ubuntu, or Alpine Linux and offer a 100 Mbit/s Ethernet network card as well as public IPv4 and IPv6 addresses. 

"We're delighted to be the first to offer RISC-V servers in the cloud, opening up new opportunities for our customers to meet growing demands for sovereignty, efficiency and sustainability. This innovation is a further step towards our vision of an independent and competitive European cloud", stated Damien Lucas, CEO at Scaleway. 

These servers are energy-efficient, using between 0.96W and 1.9W per 1.8GHz core, and dense, with a 52U rack able to accommodate up to 672 EM-RV1s. The intricate design consists of hand-soldered parts, 3D-printed blades, and a laser-cut chassis.

Scaleway claims that these servers are the outcome of months of research and development in its Paris laboratories. However, the decision to employ eMMC storage may be unfortunate. While inexpensive, eMMC storage is slower and less dependable than other types of storage, such as SSDs. This could affect the server's performance and lifetime. 

Scaleway introduced Arm servers in 2015, but eventually discontinued them in favour of AMD and Intel-based servers. With the introduction of these RISC-V servers, the company is clearly ready to try something new in the cloud server industry.

Rival Cybercrime Groups Offer Conflicting Accounts of Casino Attack

 

In the latest development, members of the hacking group Scattered Spider have asserted that they were the initial perpetrators of the MGM network breach last week. 

However, the ransomware gang Alphv, also known as Black Cat, countered this claim with a detailed statement on their dark-web platform, insisting that they were the true culprits.

Alphv's statement, while claiming responsibility, left a crucial question unanswered: whether Scattered Spider was acting as an affiliate of Alphv or an independent group utilizing Alphv-developed ransomware. This conflicting narrative is further muddying an already tumultuous news cycle, marked by speculative discussions on social media.

Definitive confirmation regarding the identity of the MGM attacker remains elusive until either the company or law enforcement authorities release public details about the incident. 

Both Scattered Spider and Alphv represent significant cyber threats in their own right, according to experts. Scattered Spider, believed to be comprised of young adults in the U.S. and the U.K., is notorious for employing social engineering tactics in their attacks. 

Charles Carmakal, CTO at Google Cloud's Mandiant, noted their recent use of Alphv's encryption. Their past exploits include a high-profile attack affecting over 130 organizations, resulting in the theft of more than 10,000 employees' login credentials.

Meanwhile, Alphv, thought to be based in Russia, has earned a reputation for conducting ruthless and widespread attacks. Their tactics have included releasing sensitive images from breast cancer patients' examinations while extorting the Lehigh Valley Health Network earlier this year. Notable victims have also included Western Digital and Sun Pharmaceuticals.

In the realm of ransomware, identities are intentionally obscured to hinder law enforcement's efforts to trace attacks back to their source. It's not uncommon for a major ransomware operator to claim credit for an attack initiated by an affiliate. Additionally, a larger group like Alphv could independently carry out an entire attack internally.

Ultimately, MGM, in conjunction with the FBI and third-party cyber incident response firms, will possess the most reliable information regarding the assailant's identity and the specifics of how the breach occurred.

Threat from Cyberspace Pushing Data Budgets Up and Delaying Digital Transformation

 

A new report has revealed that the cost of data backup is rising due to the growing threat from cybercrime. This includes the requirement to guarantee the consistency and dependability of hybrid cloud data protection in order to counteract potential losses from a ransomware attack. 

More than 4,300 IT leaders were polled for the Data Protection Trends Report, and many of them claimed that there was a "availability gap" between how quickly their businesses needed a system to be recovered and how quickly IT could get it back online. This issue is serious because, according to the survey, 85% of respondents experienced a cyberattack in the previous year. 

Making sure the data protection provided by Infrastructure as a Service and Software as a Service solutions corresponds with that provided by workloads focused on data centres was one of the top priorities for IT leaders polled for the survey this year.

More than half of those surveyed in the study, which was commissioned by data protection software vendor Veeam, also mentioned a "protection gap" between the amount of data they can lose and the frequency with which IT protects it. These gaps, according to more than half of those surveyed, have led them to consider switching primary data protection providers this year.

Many of those surveyed claimed that ransomware is "winning," with cyberattacks causing the most significant outages for businesses in 2020, 2021, and 2022, despite all of these efforts to increase backup reliability and spend on cybersecurity tools. 

Hackers' increasing threat to data budgets

In the past 12 months, at least 85% of all study participants reported experiencing an attack, up from 76% the year before. Data recovery was noted as a major concern, with many claiming that only 55% of encrypted data was recoverable following a ransomware attack.

This was partially due to the increase in attacks. Due to the strain that ransomware protection and recovery put on budgets and staff, it is also harder to implement digital transformation. Resources intended for digital transformation initiatives have been diverted as IT teams must concentrate on the unstable cyber security landscape. 

According to Veeam's researchers, cyberattacks "not only drain operational budgets from ransoms to recovery efforts, but they also reduce organisations' ability to modernise for their future success, forcing them to pay for prevention and mitigation of the status quo."

With 52% of respondents already using containers and 40% of organisations planning to do so soon, Kubernetes is proving to be one of the major forces behind bettering data security strategies. Despite this, the report's authors discovered that most organisations only protect the underlying storage rather than the workloads themselves. 

The CTO and senior vice president of product strategy at Veeam, Danny Allan, stated that "IT leaders are facing a dual challenge. They are building and supporting increasingly complex hybrid environments, while the volume and sophistication of cyberattacks is increasing. This is a major concern as leaders think through how they mitigate and recover business operations from any type of disruption.”