North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware

North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware

A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry. Attributing the attacks with high confidence to the Lazarus Group, the new findings from Kaspersky signal an expansion of the APT actor’s tactics by going beyond the usual…

Oxford University says Covid-19 lab hacked, research not affected

Oxford University says Covid-19 lab hacked, research not affected

Oxford University said on Thursday it was investigating a digital intrusion after a researcher said he had seen evidence that a laboratory researching COVID-19 had been hacked. The breach took place in mid-February and occurred at the Division of Structural Biology, known as Strubi, which has been carrying out research into COVID-19, according to Alex…

Chinese Attack Tool Gains Gmail Access

Chinese Attack Tool Gains Gmail Access

Cybercrime , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Campaign Targets Tibetan Organizations Prajeet Nair (@prajeetspeaks) • February 26, 2021     Friarfox malicious browser extension was spotted targeting Tibetan organizations. (Source: Proofpoint) Proofpoint reports that Chinese state-sponsored hackers are using a new customized malicious Mozilla Firefox browser extension that facilitates access and…

Biochemical systems at Oxford University laboratory researching Covid are hacked

Biochemical systems at Oxford University laboratory researching Covid are hacked

Hackers break into biochemical systems at Oxford University laboratory that is researching Covid Oxford confirmed breach of  its Division of Structural Biology, known as Strubi  Clinical studies have not been compromised and the hack has been contained GCHQ’s National Cyber Security Centre has been alerted and will assist in probe By Jack Elsom For Mailonline…

Attackers scan for vulnerable VMware servers after PoC exploit release

Attackers scan for vulnerable VMware servers after PoC exploit release

After security researchers have developed and published proof-of-concept (PoC) exploit code targeting a critical vCenter remote code execution (RCE) vulnerability, attackers are now actively scanning for vulnerable Internet-exposed VMware servers. The scanning activity was spotted by threat intelligence company Bad Packets just one day after VMware patched the critical vulnerability.  Thousands of unpatched vCenter servers are…

NSA Issues Guidance on Zero Trust Implementation

NSA Issues Guidance on Zero Trust Implementation

Critical Infrastructure Security , Digital Identity , Endpoint Security Critical Networks Within National Security Systems Should Implement Zero Trust Akshaya Asokan (asokan_akshaya) • February 27, 2021     NSA: Consider Zero Trust models for all National Security Systems’ critical networks Source: NSA The US National Security Agency has issued its zero trust guidance aimed at…

Five nations issue global alert on vulnerabilities in Accellion FTA application

Five nations issue global alert on vulnerabilities in Accellion FTA application

Cybersecurity agencies across five countries have issued a global alert to organizations using the Accellion FTA file transfer application after a number of organizations in the past six weeks admitted to being hacked through vulnerabilities in the software. Organizations should temporarily isolate or block internet access to and from systems hosting Accellion FTA, says the…

Nasa: ‘Why we hid a message in the Perseverance parachute’

Nasa: ‘Why we hid a message in the Perseverance parachute’

After a journey of about seven months Nasa’s Perseverance rover landed on Mars last Thursday. Designed to look for signs of past microbial life, the rover has been sending back stunning images of the Red planet. But those who watched the rover’s descent onto the Martian surface may have spotted a coded message on the…